Check Point Software Blade Architecture
The industry's first flexible, extensible security architecture

Why Software Blade architecture?
Security environments become more complex as companies of all sizes defend themselves against new and varied threats. With these new threats come new security solutions, new vendors, costly new hardware, and increasing complexity. As IT comes under increasing pressure to do more with existing hardware and human resources, this approach becomes increasingly unacceptable.
Check Point's Software Blade architecture offers a better way, enabling organizations to efficiently tailor targeted managed solutions that meet targeted business security needs. All solutions are centrally managed through a single console that reduces complexity and operational overhead. And as new threats emerge, Check Point's Software blade architecture quickly and flexibly expands services as needed without the addition of new hardware or management complexity.
The Check Point Software Blade architecture is the first and only security architecture that delivers total, flexible and manageable security to companies of any size. With this unprecedented capability, Check Point Software Blades deliver lower cost of ownership and cost-efficient protection that meet any network security or endpoint security need, today and in the future.
What is a software blade?
A software blade is a logical security building block that is independent, modular and centrally managed. Software Blades can be quickly enabled and configured into a solution based on specific business needs. And as needs evolve, additional blades can be quickly activated to extend security to an existing configuration within the same hardware foundation.
Key Benefits of the Check Point Software Blade Architecture
- Flexibility – Provides the right level of protection at the right level of investment
- Manageability – Enables fast deployment of security services. Increases productivity through centralized blade management.
- Total Security – Provides the right level of security, at all enforcement points, and at all layers of the network
- Lower TCO - Protects investment through consolidation and use of existing hardware infrastructure
- Guaranteed performance – Enables provisioning of resources that guarantee service levels
How are Check Point Software Blades deployed?
Software Blades can be deployed on Check Point 2012 Models,UTM-1 and Power-1 security appliances, IP appliances, open servers, within virtualized environments, and on endpoints. New blades can be added simply by enabling their functionality in software; no additional hardware, firmware or drivers are necessary. This enables organizations to deploy security dynamically, as needed, with lower total cost of deployment.
Building a security solution using Software Blades
Check Point’s Software Blade Architecture enables customization of tailored systems or quick selection of predefined turnkey solutions.
Tailoring a security gateway or security management solution:
Step 1: Choose a container |
Step 2: Select software blades |
Step 3: Configure and deploy |
|---|---|---|
Security Gateway Blades |
![]() |
|
Endpoint Security Blades |
![]() |
|
![]() |
Security Management Blades |
![]() |
Whether designing a solution for corporate headquarters, a data center or a branch office, creating a system takes just three easy steps:
Step 1: Choose a security management or Security Gateway Container
Step 2: Select needed Software Blades
Step 3: Configure and Deploy system
The result is a complete gateway or management system configured precisely to a specific business need.
Software Blade Containers
There are three varieties of Software Blade Containers; Security Gateway Containers, Endpoint Security Containers and security management Containers. Each Security Gateway Container comes with all of the necessary services required to run the software blade environment along with the Check Point Firewall blade which provides Check Point's patented and award-winning FireWall technology. Each Endpoint Security Container comes with the Firewall / Compliance Check Software Blade.
There are 4 Security Gateway Containers, 4 Endpoint Security Containers and 3 security management Containers available:
Software Blade Containers
Security Gateway Containers |
||
|---|---|---|
Name |
Cores |
Environment |
SG101 |
1 |
Small Office |
SG201 |
2 |
Mid-Size Organizations |
SG401 |
4 |
Enterprise Performance |
SG801 |
8 |
Data Center Performance |
SG1201 |
12 |
Ultra High-end Performance |
Endpoint Security Containers |
||
Name |
Managed Endpoints |
Environment |
CPEP-C1-1TO100 |
1-100 |
Small Office |
CPEP-C1-101TO1000 |
101-1000 |
Mid-Size Organizations |
CPEP-C1-1001TO2500 |
1001-2500 |
High Performance |
CPEP-C1-2501TOU |
2500-Unlimited |
Highest Performance |
Security Management Containers |
||
Name |
Gateways Managed |
Environment |
SM1000 |
10 |
Small Companies |
SM2500 |
25 |
Mid-Size Companies |
SMU000 |
Unlimited |
Large Enterprises |
Software Blade Container Features
|
||
Choosing a predefined turnkey system
Check Point also offers 9 predefined security gateway and management systems, each aimed at specific security objective common to many organizations. Each turnkey system consists of a software blade container and specific sets of Software Blades. These include lower-end single core systems for protecting remote bureaus to full featured eight core systems destine for more complex and demanding environments such as large enterprises and service providers.
Endpoint Blades
Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.

| Endpoint Security Software Blades |
|---|
|
Gateway Blades
The Check Point Software Blade Architecture supports a complete and increasing selection of Software Blades, each delivering a modular security gateway or security management function. Because Software Blades are modular and moveable, Software Blades enable users to efficiently and quickly tailor Security Gateway and Management functionality to specific and changing security needs. New blades are quickly licensed as needed without the addition of new hardware.
Security Gateway and security management blades available today include:
| Security Gateway Software Blades |
|---|
|
| Security Management Software Blades |
|---|
|
Security Gateway Systems
To help ease configuration, Check Point has developed several pre-defined bundles composed of a container and software blades.
SG407i

- Small offices and branches
- Medium sized companies and offices
- High performance offices of any size
- Large enterprises, campuses and data centers with demanding performance needs
Check Point Security Gateway Systems
Series 100 - An ideal security solution for the small office. A 1 core system, limited to 50 users and recommended up to 8 ports
Series 200 - A cost-effective security platform for mid-size companies and offices. A 2 core system, limited to 500 users or unlimited users and recommended up to 12 ports.
Series 400 - Designed for environments that demand high performance. Ideal for the large campus networks and data centers, it is optimized for an 4 core system.
Series 800 - Designed for the most demanding highest performance environments, the Series 800 security gateway is ideal for the large campus and data center. It is optimized for 8 core system.
Series 1200 - Supporting the ultra-high performance environments, the Series 1200 security gateway is ideal for the large campus and data center. It is optimized for 12 core system.
Check Point Security Management Systems
SM2506

- Small offices and branches
- Medium sized companies and offices
- SM2506 security management
- High performance offices of any size
- Large enterprises, campuses and data centers with demanding performance needs
Check Point Multi-Domain Security Management Systems
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite
Next Steps
- Find a Partner
- Call US sales: 1-866-488-6691
- Contact Us Online
Resources
Migrate to Check Point Software Blades At No Cost- Check Point Software Blade Architecture Brochure
- Introducing Software Blades
- Software Blade Architecture White Paper
Security Gateway Software Blades
- Firewall
- IPSEC VPN
- Mobile Access
- Identity Awareness
- Application Control
- IPS
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Threat Emulation
- Antivirus & Anti-Malware
- Anti-Spam & Email Security
- Advanced Networking
- Acceleration & Clustering
- Voice over IP (VoIP)
- Security Gateway Virtual Edition
Security Management Software Blades
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
Endpoint Software Blades






