Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

Check Point Unveils New Threat Prevention Appliances

Check Point Targets Data Centers and Large Enterprise Networks With Integrated Threat Prevention Appliances

Check Point Targets Data Centers and Large Enterprise Networks With Integrated Threat Prevention Appliances

Network security firm Check Point has released new hardware appliances designed to provide advanced monitoring and threat prevention, including protection against zero-day threats targeting enterprise networks.

Unveiled on Tuesday, the new Check Point 15000 and 23000 Series appliances are designed for large enterprise and data center networks, and include integrated firewall, IPS, Application Control, AV, AnitBot, URL Filtering, and Check Point’s sandbox solution, SandBlast.

Check Point 23800 Threat Prevention ApplianceAccording to Donald Meyer, head of data center marketing at Check Point, the new platforms are more than just a refresh of the old hardware.

“The hardware is optimized for running all protections simultaneously – including full SSL traffic inspection – without creating a performance bottleneck or compromising security effectiveness,” Meyer noted in a blog post.

The Check Point 15000 Series includes two models, the 15400 and 15600; and the 23000 Series includes two models, the 23500 and 23800.

Here is how the hardware and performance specifications stack up for each:

The Check Point 23500 and 23800 both come as 2U appliances, with five I/O expansion slots for high port capacity, redundant power supplies, a 2x 1TB RAID1 disk array, and Lights-Out Management (LOM), which enables administrators to diagnose, start, restart and manage the appliances remotely.

The 23500 delivers real-world firewall throughput of 33 Gbps and 2.9 Gbps of threat prevention throughput, while the larger 23800 can deliver real-world firewall throughput of 43 Gbps, and 3.6 Gbps of threat prevention throughput, according to Check Point’s specs. 

The Check Point 15400 provides 23 Gbps of real-world firewall throughput and 1.5 Gbps of real-world threat prevention throughput, while the 15400 touts 28 Gbps of real-world firewall throughput and 2.2 Gbps of threat prevention throughput. Both are also 2U appliances and include LOM.

Check Point determines maximum production throughput using real-world traffic blend, a typical rule-base size, NAT and logging enabled and the “most secure” threat prevention protection settings.

All of the new appliances allow customers to connect 10 GbE server uplinks to a 40 GbE core network with up to 4x 40 GbE ports.

Additionally, all support Check Point Virtual Systems, which enable enterprises to consolidate infrastructure by creating multiple virtualized security gateways on a single appliance.

All four of the new security appliances are available immediately.  

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

A new report finds that barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.

Application Security

A security vulnerability identified on AliExpress, the wholesale marketplace owned by the Chinese e-commerce giant Alibaba, could have been exploited by hackers to hijack...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...