Check Point taps the power of virtualisation to simplify security for private clouds

New virtual systems enable software blades for customised protections

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today introduced Check Point Virtual Systems that allow businesses to consolidate security gateways onto a single appliance or open server -- simplifying security, reducing costs and boosting performance for private cloud environments.

With Check Point Virtual Systems, customers can secure multiple network segments by selecting any combination of Check Point software blade protections -- such as Firewall, VPN, Intrusion Prevention (IPS), Application Control, URL Filtering, Anti-Bot, Antivirus and Identity Awareness -- providing customers with the widest range of virtualised security protections available.

“From enterprises to large service providers, administrators often have multiple security appliances in place, each requiring separate maintenance and management, which can make security expensive, difficult to manage and inefficient. An effective way to minimize complexity and cost is through security virtualisation,” said Dorit Dor, vice president of products at Check Point Software Technologies.

“Check Point has been providing customers with virtual firewalls on dedicated systems for years. Now, Check Point is taking virtualisation to the next level -- enabling customers to provision virtual systems on every gateway and with the breadth of software blade protections.”

With Check Point Virtual Systems, customers can build secure private clouds on any gateway or open server and reduce complexity by consolidating up to 250 Virtual Systems on a single gateway -- each with customised software blade protections and policies tailored to specific business needs.

For enterprises who manage multiple groups or business units, or MSPs who service multiple customers from a single system, Check Point allows customers to benefit from security consolidation through virtualization, while maintaining a separation of IT duties with dedicated Virtual Systems for Web Security, Threat Prevention, Firewall and Remote Access.

Customers can also cluster up to eight gateways using Check Point’s patented Virtual System Load Sharing (VSLS) technology, for unmatched scalability. As customers’ business needs grow, Check Point enables companies to leverage the power of virtualised security to reduce costs and improve operational efficiency.

“For many companies, virtualized security has become a strategic technology investment. Consolidating multiple security functions onto a single gateway can result in significant cost savings,” said Chris Christiansen, Program VP for Security Products and Services at IDC. “Check Point’s security expertise, combined with its Software Blade Architecture, offers customers a solution to ease network strain and complexity when securing private cloud environments.”

With Check Point Virtual Systems, customers can boost performance for virtualised security based on the company’s new 64-bit GAiA™ operating system, enabling organisations to benefit from over eight times more concurrent connections than previous versions (VSX). In addition, the solution utilises multi-core processors with CoreXL technology, allowing customers to achieve higher performance.

The Virtual Systems are supported on all the new Check Point enterprise and data center appliances. For more information, visit

“With Check Point Virtual Systems, we’re pleased to provide customers a way to consolidate multiple gateways on one device, while offering enhanced security performance and scalability based on GAiAOS and patented VSLS technology. For the first time, organisations have the ability to truly leverage the power of virtualised security and deploy all of the protections they need using virtual systems just as they do with their physical gateways,” concluded Dor.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

More about Check Point Software TechnologiesCheck Point Software TechnologiesCheck Point Software TechnologiesetworkIDC AustraliaIntrusionIPSPoint Software TechnologiesSoftware TechnologiesWeb Security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by CSO staff

Latest Videos

More videos

Blog Posts