Check Point Power-1™ appliances enable organizations to maximize security
in high-performance environments such as large campuses or data centers.
They combine firewall, IPSec VPN, and intrusion prevention with advanced
acceleration technologies, delivering a high-performance security platform for
multi-Gbps environments.
VPN/firewall protection secures hundreds of
Industry-leading firewall
applications and protocols including VoIP,
instant messaging (IM), and peer-to-peer (P2P)
applications
Network Security
Check Point network security
solutions are the marketleading choice for securing the
network infrastructure.
KEY BENEFITS
n
Delivers gateway throughput up to
14 Gbps and intrusion prevention
throughput up to 6.1 Gbps
n
Streamlines deployment of enterprise
security with a hardware/software
solution from a single vendor
n
Centrally manages security
policy for all sites with a single
management console
n
Protects against emerging threats
with SmartDefense™ Services
subscription
n
Offers additional UTM capabilities
as options
VPN (site-to-site, remote
access)
Centralized, multisite
management
Intrusion prevention
system (IPS)
High availability, load
balancing, and dynamic
routing
Web application
security*
Web filtering*
Messaging security,
including email security
and anti-spam*
*Available as an optional license.
Feature-rich, easy-to-configure IPSec and
SSL VPNs*
Streamlines policy management for all sites via
single console
Advanced IPS with both signature- and
protocol-anomaly-based detection
Reliability for critical applications and sites
Protection against Web attacks such as buffer
overflow, SQL injection and cross-site scripting
Best-of-breed Web filtering protects against
threats such as spyware, viruses, and
inappropriate Web content
Protection against the three major messaging
attack vectors: spam, malware delivered in
messages, and attacks against the messaging
infrastructure
The NGX platform delivers a unified
security architecture for Check Point.
Power-1 Appliances
puresecurity
™
SECURITY FOR HIGH-PERFORMANCE
ENVIRONMENTS
Proven application control
Power-1 appliances include technology from VPN-1®, the
most proven VPN/firewall available. They can examine hundreds of applications, protocols, and services out of the box.
As new applications and network-layer threats appear, Power-1
appliances can be updated to add more security features.
Integrated intrusion prevention
The integrated SmartDefense IPS utilizes signature- and
protocol-anomaly-based intrusion prevention to protect
business-critical services like FTP, HTTP, and VoIP from
known and unknown attacks. Similarly, Power-1 can control
policy for applications such as IM and P2P. Additionally, Web
Intelligence™ Web application security can be added to block
attacks such as buffer overflows, SQL injection, and crosssite scripting.
inspection by removing the latency introduced as network
traffic passes through a security device
• ClusterXL™ enables near-linear performance increases by
clustering together multiple systems running VPN-1
These three technologies work together to fully accelerate
security inspection along a unified path that ensures both high
performance and high security.
INTEGRATED SMARTDEFENSE
INTRUSION PREVENTION
SmartDefense intrusion prevention stops attacks against
advanced applications such as SIP-based VoIP.
SmartDefense Services enable you to configure Power-1 into
a preemptive security solution, capable of ensuring your networks are safe from new attacks via ongoing and automatic
defense updates.
Power-1 appliances can also be easily expanded to add
optional security features such as antivirus, anti-spyware
and anti-spam protections.
Advanced acceleration technologies
To ensure a high service level for business applications,
Power-1 appliances include software-based acceleration
technologies. These technologies accelerate network-layer
functions, such as firewall access control, and applicationlayer functions, such as intrusion prevention. Power-1
appliances currently deliver firewall throughput of up to
14 Gbps and intrusion prevention throughput of up to
6.1 Gbps. The key to achieving these numbers is the combination of patented Check Point acceleration technologies
and the underlying state-of-the-art hardware designed
for performance:
• CoreXL™ multi-core acceleration is the first security
technology designed to fully leverage multi-core
processors. It does this by sharing security inspection
duties throughout all cores
SmartDefense performance improves with patented security
acceleration technologies from Check Point.
Data center reliability
Power-1 includes technologies to ensure availability of services and applications. Multiple Power-1 appliances can be
clustered together to improve performance as well as provide
a high level of resilience. Each appliance has integrated
dynamic routing to increase reliability of connections.
Power-1 appliances also include integrated Quality of Service
(QoS). Applications or users can be given priority to ensure
proper performance. For example, multimedia applications
can be prioritized over non-time-sensitive applications such
as email.
Powerful site-to-site connectivity
Power-1 appliances can be linked to form advanced virtual
networks through IPSec VPNs. Manual setup of VPN tunnels
is replaced by a One-Click process, where new sites are
added automatically. These VPNs can include other Check
Point solutions or can be linked to third-party solutions to
simplify the transition to your Check Point infrastructure.
Secure, flexible remote access
Power-1 appliances can connect employees and business
partners to your trusted network through flexible remote access,
working seamlessly with a variety of Check Point VPN
puresecurity
™
clients. For on-demand access, Power-1 appliances can be
extended with optional licenses for SSL VPN remote access.
Single management console
Power-1 is managed from the Check Point SmartCenter™
management server, enabling you to centrally manage
security policy for all sites with a single management console.
Using this unified management, you can define a cohesive,
comprehensive security policy for a distributed architecture
across your entire environment. For auditing purposes, all
logs can be centrally viewed in a single interface.
SUPPORT OPTIONS
Check Point offers many technical support options for
customers. These range from the Standard support plan
that provides telephone assistance during normal business
hours with next-day shipment of replacement appliances,
to the Premium support plan providing 24/7 assistance with
same-day replacement shipment, up to the Premium+4H plan
that provides a qualified engineer on-site within four hours to
solve any appliance-related issues. For more information on
these or other service and support offerings available in your
geography, please contact your Check Point representative or
visit the Support section of the Check Point Web site.
Security for high-performance environments
Single console for multisite management
of all security functions
POWER-1 SECURITY SPECIFICATIONS
Protection Details
Firewall
Protocol/application supportSecures more than 200 applications and protocols
VoIP protectionSIP, H.323, MGCP, and SIP with NAT support
Instant Messaging controlMSN, Yahoo, ICQ, and Skype (including over HTTP and SSL)
Peer-to-peer blockingKazaa, Gnutella, BitTorrent, eMule, IRC (including over HTTP)
Network Address TranslationStatic/hide NAT support with manual or automatic rules
IPSec VPN
Encryption supportAES 128–256 bit, 3DES 56–168 bit
Authentication methodsPassword, RADIUS, TACACS, X.509, SecurID
Certificate authorityIntegrated X.509 certificate authority
VPN communitiesAutomatically sets up site-to-site connections when objects are created
Topology supportStar and mesh
Route-based VPNUtilizes virtual tunnel interfaces, numbered/unnumbered interfaces
VPN agentCheck Point Endpoint Security™, VPN-1 SecureClient™, VPN-1 SecuRemote
SSL-based endpoint scanningScans endpoint for compliance/malware prior to admission to the network
Intrusion prevention
Network-layer protectionBlocks attacks such as DoS, port scanning, IP/ICMP/TCP-related
Application-layer protectionBlocks attacks such as DNS cache poisoning, FTP bounce, improper commands, and more
Detection methodsSignature- and protocol-anomaly based