Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Check Point Introduces New Firewall Appliances

Check Point Software Technologies introduced two new blade-form-factor firewall appliances Tuesday, along with an upgrade to its software to manage increasingly complex security environments. Check Point says the new 61000 and 21400 model firewall blades deliver not only firewall protection, but also deliver intrusion prevention, data loss protection and application control.

Check Point said the 61000 model, with a list price starting at $195,000, is scalable up to 1 Tbps of throughput, and is intended for enterprise data centers, telecommunications carriers and cloud service providers. The 21400, starting at $115,000, scales up to 100 Gbps. The performance measures are Check Point’s own numbers and not independently verified.

The software that runs on the blades, version R75.20, adds new features not in its predecessor, version R75.0, says Oded Gonda, VP of network security products at Check Point.

For one thing, it includes a new metric, created by Check Point, that measures the performance needed for the security IT infrastructure given the tasks it is assigned, says Gonda. Firewall performance is usually measured by throughput--how many gigabits of data pass through it per second. But for other tasks, such as data loss prevention (DLP), application control or intrusion prevention, throughput isn’t the appropriate measure.

Check Point has created the Security Power Unit (SPU), a tool that an IT administrator can use to enter the security tasks he or she wants provided. The administrator is then presented with an SPU of what the performance requirements would need to be. Each security solution would have its own SPU rating, and the administrator could throttle up the system to provide that performance, plus a little headroom for good measure.

"In a way, it allows you to play with different scenarios on what you need today and what you might need in the future, and then plan how much you want to invest in your hardware relative to the headroom you might want to have," Gonda explains.


Page:  1 | 2  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

WAN Security Reports

Research and Reports

Network Computing: April 2013



TechWeb Careers