UTM-1™ Total Security™ appliances are all-inclusive, turnkey solutions with
everything you need to secure your network in a simple, cost-effective way.
Each solution includes the proven security features you need along with complete
security updates, hardware warranty, and reduced support rates for up to three
years. Based on the same Check Point technologies that secure the Fortune 500,
UTM-1 appliances deliver uncompromising security with streamlined deployment
and administration.
Industry-leading application- and
network-layer firewall secures hundreds
Industry-leading firewall
of applications and protocols including VoIP,
instant messaging (IM), and peer-to-peer
(P2P) applications
Network Security
Check Point network security
solutions are the marketleading choice for securing the
network infrastructure.
KEY BENEFITS
n
Everything you need to secure your
network for up to three years
n
Provides peace of mind with
proven technologies trusted by
the Fortune 500
n
Protects networks, systems, and
users from multiple types of attacks
n
Streamlines security deployment
and administration
VPN (site-to-site and
remote access)
Gateway antivirus/
anti-spyware
Intrusion prevention
Web security
Messaging security*
Centralized, multisite
management
* Standard UTM-1 appliances may be upgraded to either the one- or three-year UTM-1 Total Security
models, which include messaging security.
Feature-rich, easy-to-configure
IPSec and SSL VPNs
Signature-based antivirus and
anti-spyware protection
Intrusion prevention with SmartDefense®
type-based protections and security updates
Web security with URL filtering and
integrated security for Web applications
Messaging security and anti-spam
including the Check Point six dimensions
of comprehensive messaging security for
protecting the messaging infrastructure
Centralized management via a single
console for multiple sites—preinstalled on
Check Point appliances
The NGX platform delivers a unified
security architecture for Check Point.
UTM-1 Total Security
puresecurity
™
THE SECURITY YOU NEED
Proven application control and attack protection
UTM-1 includes the most proven firewall and can examine
hundreds of applications, protocols, and services out-of-thebox. Integrated SmartDefense
protocol-anomaly-based intrusion prevention to protect
business-critical services like FTP, HTTP, and VoIP from
known and unknown attacks. Similarly, UTM-1 Total Security
can block nonbusiness applications like IM and P2P.
Gateway antivirus, anti-spyware
Gateway antivirus and anti-spyware are core components of
UTM-1, complementing desktop endpoint security. UTM-1
Total Security uses an up-to-date list of antivirus and antispyware signatures and anomaly-based protection to stop
viruses and other malware at the gateway. To check for threats
hidden inside legitimate content, real-time antivirus scans are
performed on POP3, SMTP, FTP, and HTTP services.
Comprehensive messaging security with anti-spam
Messaging Security from Check Point provides comprehensive protection for an organization's messaging infra struc ture.
The multidimensional approach protects the email infrastructure, provides highly accurate spam protection, and defends
organizations from a wide variety of virus and malware threats
within email.
IP reputation
anti-spam
Blocks spam and malware at the connection level by checking the sender's
reputation against a dynamic database
of known malicious IP addresses
Content-based
anti-spam
Protects against advanced forms of
spam, including image-based and
foreign-language spam, using patternbased detection
Block/allow list
anti-spam
Utilizes block or allow lists to deny
obvious email offenders and allow
trusted senders
Mail antivirusProtects against a wide range of viruses
and malware, including scans of
message content and attachments
Zero-hour
outbreak
protection
Defends against new spam and
malware outbreaks by using advanced
pattern matching and distribution
analysis engine
SmartDefense
email IPS
Protects against a broad range of
threats, including DoS and buffer overflow attacks, that target the messaging
infrastructure itself
™
IPS utilizes signature- and
Secure, flexible remote access
UTM-1 Total Security appliances can connect employees and
business partners to your trusted network through flexible
IPSec or SSL-based remote access, working seamlessly with
a variety of VPN agents.
THE SIMPLICITY YOU WANT
All-inclusive turnkey solution
Everything you need in a UTM network security solution is
provided by UTM-1 Total Security appliances—for up to three
years. This includes:
• Allsecurityprotections
• Allsecurityupdates
• Hardwarewarranty
Integrated SmartCenter management
UTM-1 Total Security appliances come with integrated
SmartCenter
manage multiple appliances and other Check Point products
from a single console. It centrally stores and distributes
security policy for the entire infrastructure, eliminating the
need to maintain each site and gateway separately, reducing
administrative burden and errors, ensuring consistency
across the network. Through the intuitive SmartDashboard,
administrators define and manage elements of a security
policy: firewall security, network address translation, Quality
of Service (QoS), VPN agent security, and VPNs.
Centralized, automatic updates
SmartDefense Services enable you to configure UTM-1
into a preemptive security solution, capable of ensuring
your networks are safe from new attacks via ongoing and
automatic defense updates.
Quick setup
UTM-1 Total Security appliances can be easily set up with the
first-time configuration wizard. This truly simple deployment
process is as easy as:
• Plugginginandturningontheappliance
• Followingtheonscreenwizard
• LaunchingtheSmartCentermanagementinterface
™
management, offering the ability to centrally
Web filtering
UTM-1 Total Security appliances stop inappropriate Web
surfing with best-of-breed Web filtering that covers 20million-plus URLs, so you can define an online
acceptable-use policy for your organization.
Simple site-to-site connectivity
With UTM-1 Total Security appliances, you can simplify the
setup of site-to-site VPNs and remote access. Manual setup
of node-to-node VPN tunnels and security for an entire VPN
is replaced by a One-Click process, where new sites and
remote users are added automatically.
The first-time configuration wizard makes configuring UTM-1 Total
Security appliances easy.
puresecurity
™
All-inclusive, all secured
SUPPORT OPTIONS
Check Point offers many technical support options for customers. These range from the Standard support plan that provides
telephone assistance during normal business hours with next-day shipment of replacement appliances, to the Premium support
plan providing 24/7 assistance with same-day replacement shipment, up to the Premium+4H plan that provides a qualified engineer
on-site within four hours to solve any appliance-related issues. For more information on these or other service and support offerings
available in your geography, please contact your Check Point representative or visit the Support section of the Check Point Web site.
UTM-1 TOTAL SECURITY SPECIFICATIONS
Protection Details
Firewall
Protocol/application support200-plus
VoIP protectionSIP, H.323, MGCP, and SCCP with NAT support
Instant messaging controlMSN, Yahoo, ICQ, and Skype
Peer-to-peer blockingKazaa, Gnutella, BitTorrent
Network address translationStatic/hide NAT support with manual and automatic rules
IPSec VPN
Encryption supportAES 128-256 bit, 3DES 56-168 bit
Authentication methodsPassword, RADIUS, TACACS, X.509, SecurID
Certificate authorityIntegrated certificate authority (X.509)
VPN communitiesAutomatically sets up site-to-site connections as objects are created
Topology supportStar and mesh
Route-based VPNUtilizes virtual tunnel interfaces; numbered/unnumbered interfaces
VPN agent supportComplete endpoint security with VPN, desktop firewall
SSL VPN
SSL-based remote accessFully integrated SSL VPN gateway provides on-demand SSL-based access
SSL-based endpoint scanningScans endpoint for compliance/malware prior to admission to the network
Intrusion prevention
Network-layer protectionBlocks attacks such as DoS, port scanning, IP/ICMP/TCP-related
Application-layer protectionBlocks attacks such as DNS cache poisoning, FTP bounce, improper commands
Detection methodsSignature-based and protocol anomaly
Antivirus/anti-spyware
Antivirus protectionProtects HTTP, FTP, POP3, and SMTP protocols
Anti-spyware blocksPattern-based spyware blocking at the gateway
UpdatesCentralized, daily updates
Web filtering
URL database20 million-plus URLs covering 3 billion-plus Web pages
Language supportMore than 70 languages spanning 200 countries
UpdatesCentralized, daily updates (100,000-plus new sites a week)
Messaging security
Email IPSSMTP, POP3, and IMAP attack protection
Pattern-based anti-spamDetects spam based on dynamic database of signatures
IP reputation checkingBlocks spam and malware by sender
Signature-based antivirusFirst layer of protection from viruses and malware
Zero-hour outbreak protectionComplements signature-based protection to block new outbreaks
Block/allow listsProvides granular control over specific domains and users
DHCP supportSecurePlatform
ISP redundancyProtocol-based, source/destination and port route decisions
Routing supportOSPF, BGP, RIP v1/2, Multicast
Layer-2 bridge supportTransparently integrates into existing network
Performance and availability
High availabilityActive/passive and active/active failover options
Load balancingClusterXL
Quality of ServiceFloodgate-1
ISP redundancyAutomatically reroutes traffic to second interface