Check Point Collaborates with VMware to Provide Network Security for the Private Cloud

Check Point Automates Network Security for VMware Virtualization and Cloud Environments

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced that the company is collaborating with VMware to automate and simplify the provisioning and deployment of network security in private clouds. Check Point will make its security protection solutions interoperable with VMware infrastructure.

As today’s data center moves quickly down the path of virtualization, it is important for security to keep pace with virtual environments. Virtualization has greatly increased the speed at which applications can be deployed, and delivers the added benefits of agility and mobility to meet changing business requirements. Network security for virtualized environments must match this speed and agility through automated security management and provisioning, while enabling seamless support for existing security operational processes and policy.

Check Point Virtual Edition (VE) is a unique security solution that provides comprehensive protections and rapid deployment of security services in virtualized environments. By closely aligning Check Point’s security with VMware vSphere® 5.5, organizations will benefit from a fully automated security solution for a VMware virtualized environment. Virtual machines will be safeguarded through the breadth of Check Point’s multi-layered security protections without changing network topology. Additionally, the interoperability of Check Point solutions and VMware vCloud® Suite will enable simplified and automatic virtual application protections.

“As enterprises deploy their network infrastructure in the cloud, having security services be provisioned quickly for these virtual environments is of utmost importance,” said Gabi Reish, vice president of product management at Check Point Software Technologies. “The collaboration with VMware enables strong protection for network security through the evolution of our customers’ virtual environments.”

Available in Q1 2014, the new Check Point VE is just one part of Check Point’s larger cloud and virtualization security strategy, which will bring further interoperability with VMware solutions.

“VMware is delivering virtualization solutions across compute, networking, storage and management designed to help customers accelerate the path to the software-defined data center,” said Hatem Naguib, vice president, networking and security at VMware.

“The new release of Check Point Virtual Edition, when combined with the latest release of vSphere or our new VMware NSX™ network virtualization platform, will offer our customers a simple solution to secure, manage and automate their virtualization and cloud environments..”


Features of the Check Point VE include:

  • Interoperability with VMware vSphere 5.1 and 5.5, vCenter Server™, vCloud Suite and VMware NSX™ network virtualization
  • Centralized security management for all Check Point virtual and physical security gateways
  • Inspection of Inter-VM traffic without changing network topology
  • Automated deployment and provisioning of Check Point’s VE gateways
  • Automated protection of new virtual machines
  • Use of VMware objects in Check Point policy rules
  • Constant protection of VMs, regardless of IP address changes
  • VM migration without breaking application connectivity


“Check Point is committed to delivering powerful, rapid security deployments for virtualization and cloud infrastructure. Check Point VE brings that network security through the full range of our award-winning Software Blade Architecture,” concluded Reish.

For more information on Check Point VE and the collaboration with VMware

Follow Check Point via TwitterFacebook, or YouTube

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd, the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization.

Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.


VMware, VMworld, vSphere, vCloud, vCenter Server and VMware NSX are registered trademarks or trademarks of VMware, Inc. in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. The use of the word “partner” or “partnership” does not imply a legal partnership relationship between VMware and any other company.

Join the CSO newsletter!

Error: Please check your email address.

Tags check pointsecurityprovate cloudVMwarevirtualisation

More about Check Point Software TechnologiesCheck Point Software TechnologiesCheck Point Software TechnologiesFacebookInc.Point Software TechnologiesSoftware TechnologiesVMware Australia

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by CSO staff

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place