DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Home » Latest News Releases » Check Point Software Technologies Announces New Smart-1 Appliances to Power ‘Gen V’ Security Management

Check Point Software Technologies Announces New Smart-1 Appliances to Power ‘Gen V’ Security Management

By: DevOps.com on January 29, 2018 1 Comment

New Appliances Deliver True All-in-One Security Management

Recent Posts By DevOps.com
  • Global Next-Generation Software Engineering Conference
  • Akamai Security Research: Financial Services Continues Getting Bombarded with Credential Stuffing and Web Application Attacks
  • Vulcan Cyber Announces New Chief Revenue Officer and Internal Promotions to Accelerate Rapid Growth
More from DevOps.com
Related Posts
  • Check Point Software Technologies Announces New Smart-1 Appliances to Power ‘Gen V’ Security Management
  • Kasten by Veeam Announces NEW Kasten K10 V5.0 with Enhanced Kubernetes Security, Streamlined CI/CD Pipelines and Ecosystem Advancements
  • How DevSecOps Teams Can Level Up
    Related Categories
  • Latest News Releases
Show more
Show less

CPX 360, BARCELONA, SPAIN  —  Thu, 25 Jan 2018

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, today announced three new Smart-1 security management appliances.

DevOps Connect:DevSecOps @ RSAC 2022

This follows on the heels of the company’s announcement of Check Point Infinity Total Protection, a unique New Security Model to prevent ‘Gen V’ threats and attacks.  The new appliances enable centralized, unified policy management, and advanced log and threat analysis for real-time, enterprise-wide security monitoring and control, for Gen V (5th Generation) cyber-protection.

All business sectors are now experiencing Gen V cyber-attacks, defined as large-scale and fast moving attacks across mobile, cloud and on-premise networks.  These sophisticated attacks easily bypass the conventional, static detection-based defenses being used by most organizations today.  The new Smart-1 appliances, deliver management storage capacity of up to 48TB, logging rates of up to 100,000 logs/sec and a performance boost of up to 8x compared to previous models. This enables  unprecedented security management performance across network, cloud and mobile environments for efficient Gen V cyber protection.

The three new appliances, Smart-1 525, Smart-1 5050 and Smart-1 5150 provide enterprise IT teams with holistic, single-console security management and the ability to correlate, store and analyze huge amounts of new and historic data from thousands of network devices.  This streamlines and accelerates security management processes, and strengthens organizations’ security postures in response to the current Gen V cyber-attack landscape.

“The Smart-1 Appliance family gives customers an agile, high-capacity security management solution that delivers in-depth visibility into their security posture,” said Gabi Reish, VP product management and product marketing at Check Point.  “This makes it even easier for organizations to keep themselves fully protected against Gen V cyber-threats, by deploying and managing security with unrivaled performance, all on a single device.”

The new Smart-1 appliances are part of the Check Point Infinity architecture, which combines real-time threat prevention, shared intelligence and the most advanced security across networks, cloud and mobile.

The appliances were announced at CPX 360 Barcelona, Check Point’s annual cyber-security summit and expo for customers and partners.  CPX 360 is dedicated to addressing today’s most pressing cyber security challenges and helping customers of all sizes develop strategies to stay one step ahead of new and emerging cyberthreats and sophisticated hackers.

Read more about the new Check Point Smart-1 appliances.

Check Point Blog: http://blog.checkpoint.com/
Twitter: http://www.twitter.com/checkpointsw
Facebook: http://www.facebook.com/checkpointsoftware
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
YouTube: http://www.youtube.com/user/CPGlobal

 

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

Filed Under: Latest News Releases

Sponsored Content
Featured eBook
The Automated Enterprise

The Automated Enterprise

“The Automated Enterprise” e-book shows the important role IT automation plays in business today. Optimize resources and speed development with Red Hat® management solutions, powered by Red Hat Ansible® Automation. IT automation helps your business better serve your customers, so you can be successful as you: Optimize resources by automating ... Read More
« Red Hat Rises to Data Management Challenges
BigID Closes $14 Million Series A Funding to Transform Protection and Privacy of Personal Data »

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Continuous Deployment
Monday, July 11, 2022 - 1:00 pm EDT
Using External Tables to Store and Query Data on MinIO With SQL Server 2022
Tuesday, July 12, 2022 - 11:00 am EDT
Goldilocks and the 3 Levels of Cardinality: Getting it Just Right
Tuesday, July 12, 2022 - 1:00 pm EDT

Latest from DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New Normal’
June 30, 2022 | Richi Jennings
Moving From Lift-and-Shift to Cloud-Native
June 30, 2022 | Alexander Gallagher
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

Hybrid Cloud Security 101
New call-to-action

Most Read on DevOps.com

Developer’s Guide to Web Application Security
June 24, 2022 | Anas Baig
What Is User Acceptance Testing and Why Is it so Important?
June 27, 2022 | Ron Stefanski
Chip-to-Cloud IoT: A Step Toward Web3
June 28, 2022 | Nahla Davies
DevOps Connect: DevSecOps — Building a Modern Cybersecurity ...
June 27, 2022 | Veronica Haggar
Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New No...
June 30, 2022 | Richi Jennings

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.