Check Point taps the power of virtualisation to simplify security for private clouds

New virtual systems enable software blades for customised protections

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today introduced Check Point Virtual Systems that allow businesses to consolidate security gateways onto a single appliance or open server -- simplifying security, reducing costs and boosting performance for private cloud environments.

With Check Point Virtual Systems, customers can secure multiple network segments by selecting any combination of Check Point software blade protections -- such as Firewall, VPN, Intrusion Prevention (IPS), Application Control, URL Filtering, Anti-Bot, Antivirus and Identity Awareness -- providing customers with the widest range of virtualised security protections available.

“From enterprises to large service providers, administrators often have multiple security appliances in place, each requiring separate maintenance and management, which can make security expensive, difficult to manage and inefficient. An effective way to minimize complexity and cost is through security virtualisation,” said Dorit Dor, vice president of products at Check Point Software Technologies.

“Check Point has been providing customers with virtual firewalls on dedicated systems for years. Now, Check Point is taking virtualisation to the next level -- enabling customers to provision virtual systems on every gateway and with the breadth of software blade protections.”

With Check Point Virtual Systems, customers can build secure private clouds on any gateway or open server and reduce complexity by consolidating up to 250 Virtual Systems on a single gateway -- each with customised software blade protections and policies tailored to specific business needs.

For enterprises who manage multiple groups or business units, or MSPs who service multiple customers from a single system, Check Point allows customers to benefit from security consolidation through virtualization, while maintaining a separation of IT duties with dedicated Virtual Systems for Web Security, Threat Prevention, Firewall and Remote Access.

Customers can also cluster up to eight gateways using Check Point’s patented Virtual System Load Sharing (VSLS) technology, for unmatched scalability. As customers’ business needs grow, Check Point enables companies to leverage the power of virtualised security to reduce costs and improve operational efficiency.

“For many companies, virtualized security has become a strategic technology investment. Consolidating multiple security functions onto a single gateway can result in significant cost savings,” said Chris Christiansen, Program VP for Security Products and Services at IDC. “Check Point’s security expertise, combined with its Software Blade Architecture, offers customers a solution to ease network strain and complexity when securing private cloud environments.”

With Check Point Virtual Systems, customers can boost performance for virtualised security based on the company’s new 64-bit GAiA™ operating system, enabling organisations to benefit from over eight times more concurrent connections than previous versions (VSX). In addition, the solution utilises multi-core processors with CoreXL technology, allowing customers to achieve higher performance.

The Virtual Systems are supported on all the new Check Point enterprise and data center appliances. For more information, visit

“With Check Point Virtual Systems, we’re pleased to provide customers a way to consolidate multiple gateways on one device, while offering enhanced security performance and scalability based on GAiAOS and patented VSLS technology. For the first time, organisations have the ability to truly leverage the power of virtualised security and deploy all of the protections they need using virtual systems just as they do with their physical gateways,” concluded Dor.

Join the CSO newsletter!

Error: Please check your email address.

More about Check Point Software TechnologiesCheck Point Software TechnologiesCheck Point Software TechnologiesetworkIDC AustraliaIntrusionIPSPoint Software TechnologiesSoftware TechnologiesWeb Security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by CSO staff

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place