Simplify and consolidate network security with Virtual Systems
Deploy any Software Blades on any virtual system for customized protection
Boost performance using the latest Check Point technologies
For years, Check Point’s Virtual Systems technology has been providing value and protection for enterprises and service providers. This proven technology enables organizations to consolidate up to 250 gateways into a hardware platform providing savings on both capital equipment investments and ongoing support and maintenance. The streamlined management of the virtualized gateways further improves the operational efficiency of a resource-challenged IT department, bringing the needed simplicity to network security.
Supporting the latest Check Point Software Blade Architecture on every Virtual System, this solution delivers comprehensive and customized protection to multiple networks or virtual LANs (VLANs) within complex network infrastructures. Supporting Software Blades including Firewall, VPN, Intrusion Prevention (IPS), Identity Awareness, Application Control, URL Filtering, Antivirus and Anti-bot, administrators have the flexibility to configure any Software Blades with any security policy to any Virtual System.
The ability to tailor security policies for each Virtual System enable administrators to break down large complex network security policies into smaller more granular and more manageable policies. Customizing security policy base on business requirements minimize the complexity and create better security practice to meet the business needs.
Easily deploy Virtual Systems with preconfigured appliances or upgrading existing gateways using One-Click Conversion, effectively manage these Virtual Systems with simplified and central management using Check Point Security Management and Multi-Domain Security Management.
Combining the latest security solutions with the patented CoreXL technology and the 64-bit GAiA OS, performance for virtual security deployments is greatly enhanced. Up to eight times more concurrent connection capacity and the multi-gigabit per second performance for firewall and IPS throughput are just a few examples of the outstanding performance the solution will deliver. The new Check Point Virtual Systems are designed to meet the requirements for the most demanding network environments.
Today’s networks require flexibility and expandability to support the fast-evolving business needs. To meet this demanding business environment, Virtual Systems can be deployed on multiple gateways using Check Point’ high-performance technologies, ensuring secure, resilient, multi-gigabit throughput. Virtual Systems leverage the following features and technologies to maximize performance, capacity and system scalability:
Simplify deployment, configuration and save costs of external network routers and switches. The integrated virtual routers and switches direct inter-Virtual System traffics to their intended destinations with higher efficiency.
Need to understand how your Virtual Systems are used to better plan your security resources, or want to create billable customer services based on their usage? Granular resource monitoring of CPU and memory for each virtual system gives you the necessary insights to effectively plan for your network security resources, or to provide usage-based services to your customers.
Check Point Virtual Systems are offered either as a software-only option or in pre-configured bundles with Check Point Security Appliances and Software Blades, providing the flexibility and convenience for different deployment situations.The software only option allows customers to upgrade their existing Check Point Appliances and open servers to a Virtual System environment, or to build a customized Virtual System for their specific network security needs. The pre-configured bundles offer a quick turn-key solution that is easy to purchase and deploy.
|Operating System||Release GAiA (R75.40VS) or later|
|Supported Gateways||Check Point Appliances and Open Servers1|
|Supported Technologies||ClusterXL, CoreXL, SSL inspection|
|Monitoring||Resource monitoring (CPU & Memory), per Virtual System SNMP monitoring|
|1 Please see the Appliance Comparison Chart for additional details.|
|Supported Appliances Appliance Memory (Default / Max)||Appliance Memory (Default / Max)||Maximum VS Supported (with Default / Max memory)|
|2200||2 / 2 GB||3 / 3|
|4200||4 / 4 GB||3 / 3|
|4400||4 / 4 GB||10 / 10|
|4600||4 / 4 GB||10 / 10|
|4800||4 / 8 GB||20 / 25|
|12200||4 / 12 GB||20 / 50|
|12400||4 / 12 GB||25 / 75|
|12600||6 / 12 GB||75 / 150|
|13500||16 / 64 GB||150 / 250|
|13800||16 / 64 GB||150 / 250|
|21400||12 / 24 GB||125 / 250|
|21600||16 / 64 GB||150 / 250|
|21700||16 / 64 GB||150 / 250|
|21800||16 / 64 GB||150 / 250|
|41000||64 / 64GB||250 / 250|
|61000||12 / 64GB||125 / 250|