Digital Edition

SYS-CON.TV
Check Point Extends Security to Protect Virtualization Applications
New Check Point VPN-1 VE - A Secure Way to Protect Applications within Virtualization Environments

Check Point announced VPN-1 Virtual Edition (VE), which delivers the same best-of-class security for virtual applications that Fortune 500 companies depend on to secure their corporate networks and data centers. Check Point is a company that provides unified security management for both physical networks and virtual applications.

Virtualization of multiple servers into a single appliance creates an entirely new type of environment that requires new ways to protect segregated applications and information from one another without the use of physical security appliances. Check Point’s VPN-1 VE restores the separation and security of applications as if they were still located on separate servers. VPN-1 VE also integrates completely into a customer’s overall Check Point security infrastructure, making it possible to manage Check Point appliances and software for open servers, “Secured by Check Point” appliances and VPN-1 VE from a single interface -- reducing the cost and strain of management.

“Virtual systems are part of the overall network and need to be protected with the same level of security provided for physical appliances,” said Ofer Raz, director of platforms and infrastructure at Check Point. “VPN-1 VE demonstrates Check Point’s commitment to protecting corporations as new technologies enter the network. Check Point’s open architecture provides customers with unparalleled, centrally managed security across both physical networks and virtual environments.”

VPN-1 VE provides businesses and organizations numerous benefits, including:

  • Secures virtual environments with a preconfigured solution that is tailored for VMware ESX or ESXi environments to help ensure an easy, optimal deployment
  • Eliminates the need for additional security appliances to protect virtual applications, thereby lowering costs
  • Integrates with the same unified interface as other Check Point security gateways
  • Strengthens auditing, compliance and risk management with unified logging for the entire security infrastructure, including virtual environments
  • Enables quick deployment for provisioning or disaster recovery

“Check Point customers can deploy the VPN-1 VE with confidence, knowing that it is optimized for VMware environments,” said William Shelton, director of emerging products and solutions at VMware. “We welcome Check Point’s contribution to the more than 800 virtual appliances currently available from the VMware virtual appliance marketplace.”

About Virtualization News
SYS-CON's Virtualization News Desk trawls the news sources of the world for the latest details of virtualization technologies, products, and market trends, and provides breaking news updates from the Virtualization Conference & Expo.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

CI/CD is conceptually straightforward, yet often technically intricate to implement since it require...
Fact: storage performance problems have only gotten more complicated, as applications not only have ...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ag...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems ...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can ...
When building large, cloud-based applications that operate at a high scale, it’s important to mainta...
While some developers care passionately about how data centers and clouds are architected, for most,...
"Peak 10 is a hybrid infrastructure provider across the nation. We are in the thick of things when i...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use ...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and ap...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO an...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...
In this presentation, you will learn first hand what works and what doesn't while architecting and d...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: D...
The now mainstream platform changes stemming from the first Internet boom brought many changes but d...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018,...
The Internet of Things will challenge the status quo of how IT and development organizations operate...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news an...
More and more companies are looking to microservices as an architectural pattern for breaking apart ...