Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Check Point Targets Low Latency Environments with ‘Security Acceleration Module’

New Security Acceleration Module Boasts 108 Security Cores for High Performance in Low Latency Environments

New Security Acceleration Module Boasts 108 Security Cores for High Performance in Low Latency Environments

Network security firm Check Point Software Technologies on Thursday introduced a new “Security Acceleration Module” that features purpose-built hardware in order to achieve high performance firewall throughput with very low latency. The module is designed to be an add-on to the Check Point 21400 Appliance.

Targeted for customers that require high-performance and low latency environments, the Security Acceleration Module provides customers with up to 110 Gbps of firewall throughput and sub-five micro second (5 µs) latency from a two rack-unit.

CheckPoint 21400 ApplianceFor example, in high frequency trading operations when a fraction of a second can have a big impact on profits, a high-speed connection with low network latency is critical.

The on-board, purpose-built SecurityCore™ hardware makes use of parallel processing to accelerate key security operations. Boasting 108 security cores, Check Point says network security traffic can be offloaded from the general purpose CPU to the Security Acceleration Module, an ideal architecture for customers that need to to run many security functions in highly-demanding environments.

“Many companies running high-performance network applications are faced with the competing demands of security and speed,” said Dorit Dor, vice president of products at Check Point Software Technologies.

According to the company’s numbers, the Check Point 21400 with the acceleration module enables customers to achieve a session rate of 300,000 connections per second and a forwarding rate of 60 million packets per second, still with only microseconds of network latency.

More about the Check Point Security Acceleration Module is available here, and information on the Check Point 21400 Appliance is available here

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Searchlight Cyber has appointed Tim Warner as VP of Global Enterprise Sales.

Morgan M. Adamski has been named the Executive Director of USCYBERCOM.

Passwordless authentication firm Hawcx has appointed Lakshmi Sharma as Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...