Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer

Check Point Software Blade Architecture

The industry's first flexible, extensible security architecture

Check Point Software Blade Architecture

Why Software Blade architecture?

Security environments become more complex as companies of all sizes defend themselves against new and varied threats. With these new threats come new security solutions, new vendors, costly new hardware, and increasing complexity. As IT comes under increasing pressure to do more with existing hardware and human resources, this approach becomes increasingly unacceptable.

Check Point's Software Blade architecture offers a better way, enabling organizations to efficiently tailor targeted managed solutions that meet targeted business security needs. All solutions are centrally managed through a single console that reduces complexity and operational overhead. And as new threats emerge, Check Point's Software blade architecture quickly and flexibly expands services as needed without the addition of new hardware or management complexity. Our pre-defined Software Blade Bundles take the guesswork out of choosing the right security with targeted, comprehensive security protections.

The Check Point Software Blade architecture is the first and only security architecture that delivers total, flexible and manageable security to companies of any size. With this unprecedented capability, Check Point Software Blades deliver lower cost of ownership and cost-efficient protection that meet any network security or endpoint security need, today and in the future. 

What is a software blade?

A software blade is a logical security building block that is independent, modular and centrally managed. Software Blades can be quickly enabled and configured into a solution based on specific business needs. And as needs evolve, additional blades can be quickly activated to extend security to an existing configuration within the same hardware foundation.

Key Benefits of the Check Point Software Blade Architecture

  • Flexibility – Provides the right level of protection at the right level of investment
  • Manageability – Enables fast deployment of security services. Increases productivity through centralized blade management.
  • Total Security – Provides the right level of security, at all enforcement points, and at all layers of the network
  • Lower TCO - Protects investment through consolidation and use of existing hardware infrastructure
  • Guaranteed performance – Enables provisioning of resources that guarantee service levels

How are Check Point Software Blades deployed?

Software Blades can be deployed on Check Point 2012 Models,UTM-1 and Power-1 security appliances, IP appliances, open servers, within virtualized environments, and on endpoints. New blades can be added simply by enabling their functionality in software; no additional hardware, firmware or drivers are necessary. This enables organizations to deploy security dynamically, as needed, with lower total cost of deployment.

Building a security solution using Software Blades

Check Point’s Software Blade Architecture enables customization of tailored systems or quick selection of predefined turnkey solutions.

Tailoring a security gateway or security management solution:

Step 1:
Choose a container
Step 2:
Select software blades
Step 3:
Configure and deploy
1 Core
2 Core
4 Core
8 Core
8 Core

Security Gateway Blades

Security Gateway Software Blades

4 Core Configuration
Up to 10 Gateways
Up to 25 Gateways
Unlimited Number of Gateways
Unlimited Number of Gateways

Endpoint Security Blades

Security Management Software Blades

Up to 25 Gateways
Up to 10 Gateways
Up to 25 Gateways
Unlimited Number of Gateways

Security Management Blades

Security Management Software Blades

Up to 25 Gateways

Whether designing a solution for corporate headquarters, a data center or a branch office, creating a system takes just three easy steps:

Step 1: Choose a security management or Security Gateway Container
Step 2: Select needed Software Blades
Step 3: Configure and Deploy system

The result is a complete gateway or management system configured precisely to a specific business need.

Software Blade Bundles

Next Generation Firewall extends the power of the firewall with IPS and Application Control protections. Next Generation Firewalls come in many sizes and offer throughput up to 110Gbps.

Next Generation Threat Prevention prevents advanced threats and malware by controlling access to millions of web sites and stopping application-specific attacks, botnets, targeted attacks, APTs, and zero-day threats.

Next Generation Secure Web Gateway enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware using the largest application coverage in the industry.

Next Generation Data Protection provides comprehensive data protection by combining firewall, VPN, IPS and advanced networking technologies to deliver high-performance security protection.

Software Blade Containers

There are three varieties of Software Blade Containers; Security Gateway Containers, Endpoint Security Containers and security management Containers. Each Security Gateway Container comes with all of the necessary services required to run the software blade environment along with the Check Point Firewall blade which provides Check Point's patented and award-winning FireWall technology. Each Endpoint Security Container comes with the Firewall / Compliance Check Software Blade.

There are 4 Security Gateway Containers, 4 Endpoint Security Containers and 3 security management Containers available:

Software Blade Containers

Security Gateway Containers
Name
Cores
Environment
SG101
1
Small Office
SG201
2
Mid-Size Organizations
SG401
4
Enterprise Performance
SG801
8
Data Center Performance
SG1201
12
Ultra High-end Performance
Endpoint Security Containers
Name
Managed Endpoints
Environment
CPEP-C1-1TO100
1-100
Small Office
CPEP-C1-101TO1000
101-1000
Mid-Size Organizations
CPEP-C1-1001TO2500
1001-2500
High Performance
CPEP-C1-2501TOU
2500-Unlimited
Highest Performance
Security Management Containers
Name
Gateways Managed
Environment
SM1000
10
Small Companies
SM2500
25
Mid-Size Companies
SMU000
Unlimited
Large Enterprises

Software Blade Container Features

  • CoreXL, a patent pending technology delivering near-linear performance scalability (not included in SG101)
  • An update service that keeps current with the latest software
  • Software blade license management that facilitates blade activation and migration
  • SecurePlatform, a pre-hardened operating system that enables quick and easy deployment anywhere in the network
  • Web-based administrative interface
  • Integrated backup, restore and upgrade capabilities

Choosing a predefined turnkey system

Check Point also offers 9 predefined security gateway and management systems, each aimed at specific security objective common to many organizations. Each turnkey system consists of a software blade container and specific sets of Software Blades. These include lower-end single core systems for protecting remote bureaus to full featured eight core systems destine for more complex and demanding environments such as large enterprises and service providers.

Endpoint Blades

Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from various Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.

Endpoint Security Software Blades
  • Full Disk Encryption - Automatically and transparently secures all information on endpoint hard drives. Multi-factor pre-boot authentication ensures user identity.
  • Media Encryption - Provides centrally enforceable encryption of removable storage media. Port control enables central management of all endpoint ports, including centralized logging of port activity.
  • Remote Access - Provides users with secure, seamless access to corporate networks and resources when traveling or working remotely.
  • Anti-Malware / Program Control - Efficiently detects and removes malware from endpoints with a single scan. Program Control assures that only legitimate and approved programs run on endpoints.
  • Firewall / Compliance Check - Proactive protection for inbound and outbound traffic prevent malware from infecting endpoint systems, block targeted attacks and stop unwanted traffic.

Gateway Blades

The Check Point Software Blade Architecture supports a complete and increasing selection of Software Blades, each delivering a modular security gateway or security management function. Because Software Blades are modular and moveable, Software Blades enable users to efficiently and quickly tailor Security Gateway and Management functionality to specific and changing security needs. New blades are quickly licensed as needed without the addition of new hardware.

Security Gateway and security management blades available today include:

Security Gateway Software Blades
  • Firewall - World's most proven firewall secures more than 200 applications, protocols and services featuring the most adaptive and intelligent inspection technology.
  • IPsec VPN - Secure connectivity for offices and end users via sophisticated but easy to manage Site-to-Site VPN and flexible remote access.
  • Mobile Access - The safe and easy solution to connect to corporate applications over the Internet with Smartphones or PCs.
  • IPS - The highest performing integrated IPS solution with the industry's best threat coverage
  • Application Control - Provides strong application and identity controls by allowing organizations to create policies which identify, block or limit usage of thousands of applications, based on user identity.
  • Identity Awareness - Provides granular security policy at a per user, per group and per machine level.  It centralizes the management, monitoring and reporting of user actions across the internal network, its perimeter and beyond.
  • DLP - Combines technology and processes to prevent data loss of critical business information
  • Threat Emulation - The first technology to stop zero-day attacks using a virtual sandbox to discover malicious behavior in files and stop them.
  • Web Security - Advanced protection for the entire Web environment featuring the strongest protection against buffer-overflow attacks.
  • URL Filtering - Best-of-breed Web filtering covering more than 20 million URLs protects users and enterprises by restricting access to dangerous Web sites.
  • Anti-Bot - Detect bot-infected machines and prevent bot damages by blocking bot C&C communications.
  • Antivirus - Leading antivirus protection including heuristic virus analysis stops viruses, worms and other malware at the gateway
  • Anti-Spam & Email Security - Multi-dimensional protection for the messaging infrastructure stops spam, protects servers and eliminates attacks through email.
  • Advanced Networking & Clustering - Combining the features and capabilities of the Advanced Networking and Acceleration & Clustering, this Blade is supported on the Check Point 2000, 4000 & 12000 Appliances.
  • Voice over IP - Advanced connectivity and security features for VoIP deployments, featuring enhanced Rate Limiting protections, Far end NAT and inspection of SIP TLS.
  •  

Security Management Software Blades
  • Network Policy Management - Comprehensive network security policy management for Check Point gateways and blades via SmartDashboard, a single, unified console
  • Endpoint Policy Management - Centrally deploy, manage, monitor and enforce security policy for all endpoint devices across any sized organization.
  • Logging & Status - Comprehensive information in the form of logs and a complete visual picture of changes to gateways, tunnels, remove users and security activities
  • SmartWorkflow - Provides a formal process of policy change management that helps administrators reduce errors and enhance compliance.
  • Monitoring - A complete view of network and security performance, enabling fast response to changes in traffic patterns and security events.
  • Management Portal - Extends a browser-based view of security policies to outside groups such as support staff while maintaining central policy control
  • User Directory - Enables Check Point gateways to leverage LDAP-based user information stores, eliminating the risks associated with manually maintaining and synchronizing redundant data stores.
  • SmartProvisioning - Provides centralized administration and provisioning of Check Point security devices via a single management console.
  • SmartReporter - Turns vast amounts of security and network data into graphical, easy-to-understand reports.
  • SmartEvent - SmartEvent translates security information into action.

Security Gateway Systems

To help ease configuration, Check Point has developed several pre-defined bundles composed of a container and software blades.

SG407i
SG405 - Firewall, IPSEC Virtual Private Network (IPSEC VPN), Intrusion Prevention System (IPS), Advanced Networking, Acceleration and Clustering

  • Small offices and branches
  • Medium sized companies and offices
  • High performance offices of any size
  • Large enterprises, campuses and data centers with demanding performance needs

Check Point Security Gateway Systems

Series 100 - An ideal security solution for the small office. A 1 core system, limited to 50 users and recommended up to 8 ports

Model Software Blades Description
SG103
Firewall, VPN, IPS, Application Control, Identity Awareness An entry level security gateway to provide critical protection the small or branch offices
SG108
Firewall, VPN, IPS, Application Control, Identity Awareness , Anti-Spam & Email Security, URL Filtering, Antivirus An ideal XTM ( eXtensible Threat Management) security gateway providing Total Security for the small and branch office

Series 200 - A cost-effective security platform for mid-size companies and offices. A 2 core system, limited to 500 users or unlimited users and recommended up to 12 ports.

Model Software Blades Description
SG205i
Firewall, VPN, IPS, Application Control, Identity Awareness An entry level security gateway to provide critical protection for mid-sized companies and offices
SG205U
Firewall, VPN, IPS, Application Control, Identity Awareness An entry level security gateway to provide critical protection for mid-sized companies and offices with more than 500 users
SG207i
Firewall, IPSEC VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering High-performance security gateway for mid-sized companies and offices with demanding network environments
SG209
Firewall, VPN, IPS, Application Control, Identity Awareness, Anti-Spam & Email Security, URL Filtering, Antivirus, Acceleration & Clustering Most comprehensive XTM (extensible Threat Management) security gateway with high performance capabilities for mid-sized companies and offices

Series 400 - Designed for environments that demand high performance. Ideal for the large campus networks and data centers, it is optimized for an 4 core system.

Model Software Blades Description
SG407i
Firewall, VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering High performance security gateway for company of any size
SG409
Firewall, VPN, IPS, Application Control, Identity Awareness, Anti-Spam & Email Security, URL Filtering, Antivirus, Acceleration & Clustering Most comprehensive XTM (eXtensible Threat Management) security gateway for offices of any size requiring high performance

Series 800 - Designed for the most demanding highest performance environments, the Series 800 security gateway is ideal for the large campus and data center. It is optimized for 8 core system.

Model Software Blades Description
SG807
Firewall, VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering High-performance security gateway for demanding performance environments.

Series 1200 - Supporting the ultra-high performance environments, the Series 1200 security gateway is ideal for the large campus and data center. It is optimized for 12 core system.

Model Software Blades Description
SG1207
Firewall, VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering Highest-performance security gateway for the most demanding performance environments.

Check Point Security Management Systems

SM2506
SM2506 - Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring, IPS Event Analysis, and Provisioning

  • Small offices and branches
  • Medium sized companies and offices
  • High performance offices of any size
  • Large enterprises, campuses and data centers with demanding performance needs
Model Software Blades Description
SM205
Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring and User Directory Ideal entry level central security management solution with 5 management blades for small organizations Up to 2 gateways and 100 endpoints..
SM1003
Network Policy Management, Endpoint Policy Management, and Logging and Status Ideal central security management solution for small organizations.
Manages up to 10 gateways
SM1007
Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring, IPS Event Analysis, SmartProvisioning and User Directory Ideal central security management solution for small organizations with advanced requirements.
Manages up to 10 gateways
SM2506
Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring, IPS Event Analysis and SmartProvisioning. Ideal central security management solution for medium-sized organizations with advanced requirements.
Manages up to 25 gateways
SMU003
Network Policy Management, Endpoint Policy Management, and Logging and Status Industry leading central security management solutions for large enterprises.
Unlimited number of gateways
SMU007
Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring, IPS Event Analysis, SmartProvisioning and User Directory Industry leading central security management solutions for large enterprises with advanced requirements.
Unlimited number of gateways

 

Check Point Multi-Domain Security Management Systems

Model Software Blades Description
MD1004
Network Policy Management, Endpoint Policy Management, Logging & Status, Global Policy, Virtual Management Domains

Pre-defined Multi-Domain system with 10 unlimited domains

MLOGS10

Logging & Status, Virtual Management Domains

Pre-defined Multi-Domain Log Management with 10 log servers

Next Steps

Resources

Software Blade Bundles

Security Gateway Software Blades

Security Management Software Blades

Endpoint Software Blades