Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Check Point Targets Low Latency Environments with ‘Security Acceleration Module’

New Security Acceleration Module Boasts 108 Security Cores for High Performance in Low Latency Environments

New Security Acceleration Module Boasts 108 Security Cores for High Performance in Low Latency Environments

Network security firm Check Point Software Technologies on Thursday introduced a new “Security Acceleration Module” that features purpose-built hardware in order to achieve high performance firewall throughput with very low latency. The module is designed to be an add-on to the Check Point 21400 Appliance.

Targeted for customers that require high-performance and low latency environments, the Security Acceleration Module provides customers with up to 110 Gbps of firewall throughput and sub-five micro second (5 µs) latency from a two rack-unit.

CheckPoint 21400 ApplianceFor example, in high frequency trading operations when a fraction of a second can have a big impact on profits, a high-speed connection with low network latency is critical.

The on-board, purpose-built SecurityCore™ hardware makes use of parallel processing to accelerate key security operations. Boasting 108 security cores, Check Point says network security traffic can be offloaded from the general purpose CPU to the Security Acceleration Module, an ideal architecture for customers that need to to run many security functions in highly-demanding environments.

“Many companies running high-performance network applications are faced with the competing demands of security and speed,” said Dorit Dor, vice president of products at Check Point Software Technologies.

According to the company’s numbers, the Check Point 21400 with the acceleration module enables customers to achieve a session rate of 300,000 connections per second and a forwarding rate of 60 million packets per second, still with only microseconds of network latency.

More about the Check Point Security Acceleration Module is available here, and information on the Check Point 21400 Appliance is available here

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...