Virtual Systems

Check Point Virtual Systems taps the power of virtualization to consolidate and simplify security for private clouds while delivering a lower total cost of ownership. It enables customized security against evolving network threats with the extensible Software Blade Architecture. Virtual Systems is supported on Check Point Appliances, including the 61000 Security System as well as open servers.



Simplify and consolidate network security with Virtual Systems

  • Add Virtual System to any gateway or leverage pre-configured Virtual System Appliances to secure multiple network segments
  • Simplify enterprise-wide policy by creating tailored policies for each Virtual System
  • Resource monitoring for each Virtual System; easily add, provision and upgrade without downtime

Deploy any Software Blades on any virtual system for customized protection

  • Advanced protections now include: Next Generation Threat Prevention and SandBlast Threat Emulation to protect against zero-day threats
  • Flexibility to enable Software Blades uniquely for each Virtual System with customized protections
  • Enable separation of IT duties with dedicated Virtual Systems for Web Security, Threat Prevention, Firewall and Remote Access

Boost performance using the latest Check Point technologies

  • Over eight times more concurrent connections with 64-Bit GAiA OS
  • Increased throughput by utilizing multi-core processors with CoreXL technology
  • Cluster up to eight gateways using patented VSLS technology for unmatched scalability


Security Consolidation

For years, Check Point’s Virtual Systems technology has been providing value and protection for enterprises and service providers. This proven technology enables organizations to consolidate up to 250 gateways into a hardware platform providing savings on both capital equipment investments and ongoing support and maintenance. The streamlined management of the virtualized gateways further improves the operational efficiency of a resource-challenged IT department, bringing the needed simplicity to network security.

Customizable Security Policies per Virtual System

The ability to tailor security policies for each Virtual System enable administrators to break down large complex network security policies into smaller more granular and more manageable policies. Customizing security policy base on business requirements minimize the complexity and create better security practice to meet the business needs.

High Performance Security

Combining the latest security solutions with the patented CoreXL technology and the 64-bit GAiA OS, performance for virtual security deployments is greatly enhanced. Up to eight times more concurrent connection capacity and the multi-gigabit per second performance for firewall and IPS throughput are just a few examples of the outstanding performance the solution will deliver. The new Check Point Virtual Systems are designed to meet the requirements for the most demanding network environments.

Simple Deployment and Streamlined Central Management

Easily deploy Virtual Systems with preconfigured appliances or upgrading existing gateways using One-Click Conversion, effectively manage these Virtual Systems with simplified and central management using Check Point Security Management and Multi-Domain Security Management.

  • One-Click Conversion
    Enabling Virtual Systems from a physical system is simple and fast with a single click to launch the Virtual System Conversion Wizard.
  • Centralized Management and Provisioning
    • Integration with Check Point Security Management and Multi-Domain Security Management solutions
    • One-click conversion with Virtual SystemsWizard
    • Simple provisioning using the creation templates
    • Separate per virtual system management and data segregation enable cloud-based security-as-a-service offerings

Integrated Virtual Routers and Switches

Simplify deployment, configuration and save costs of external network routers and switches. The integrated virtual routers and switches direct inter-Virtual System traffics to their intended destinations with higher efficiency.

Flexible Packaging Options

Check Point Virtual Systems are offered either as a software-only option or in pre-configured bundles with Check Point Security Appliances and Software Blades, providing the flexibility and convenience for different deployment situations.The software only option allows customers to upgrade their existing Check Point Appliances and open servers to a Virtual System environment, or to build a customized Virtual System for their specific network security needs. The pre-configured bundles offer a quick turn-key solution that is easy to purchase and deploy.

Linear Scalability

Today’s networks require flexibility and expandability to support the fast-evolving business needs. To meet this demanding business environment, Virtual Systems can be deployed on multiple gateways using Check Point’ high-performance technologies, ensuring secure, resilient, multi-gigabit throughput. Virtual Systems leverage the following features and technologies to maximize performance, capacity and system scalability:

  • Virtual System Load Sharing (VSLS) distributes traffic load within a cluster, providing the ability to distribute virtual systems across multiple cluster members. Additional cluster members effectively share the virtual system traffic loads within the cluster, providing improved throughputs, connection capacity, high availability, simplified management and linear scalability
  • Resource Control allows administrators to manage the processing load by guaranteeing that each virtual system will receive only the memory and CPU allocation it needs to deliver its functions. Resources not needed by one virtual system are automatically made available to other virtual systems. Administrators can also limit the CPU resource available to a lower-priority virtual system and assign more capacity to mission-critical virtual systems.

Per Virtual System Resource Utilization Monitoring

Need to understand how your Virtual Systems are used to better plan your security resources, or want to create billable customer services based on their usage? Granular resource monitoring of CPU and memory for each virtual system gives you the necessary insights to effectively plan for your network security resources, or to provide usage-based services to your customers.

Learn More

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO