background image

Network Security

Check Point network security 

solutions are the market- 

leading choice for securing the 

network infrastructure.

key benefitS

n

  Robust security to protect your 

network and business against 

increasingly sophisticated attacks 

and attack vectors

n

  Efficient management to overcome 

data overload with tools that provide 

direct, graphical focus only on impor-

tant security events associated with 

critical business systems

n

  Flexible deployment to deliver 

defense configurations to meet ever-

changing network dynamics and 

policy requirements

IPS-1

Robust and accurate intrusion prevention

Today’s networks operate in an environment that is ever changing, with dynamic 
configurations, policy requirements, deployment needs, and security threats. 
Check Point IPS-1

 is a dedicated intrusion detection and prevention system 

(IDS/IPS) that helps organizations secure their enterprise network, and protect 
servers and critical data against worms, automated malware, and blended 
threats both known and unknown.

IPS-1 provides the strong, robust, and dynamic security for which Check Point 
is known. In addition, IPS-1 features superior management tools that increase 
administrator efficiency and provide unique rapid-response mitigation. The 
highly intuitive IPS-1 centralized interface provides graphical management tools 
that allow a system administrator to quickly identify and act on threats to the 
network. IPS-1 management and enforcement are unified with the Check Point 
security architecture, so administrators can implement IPS defenses seamlessly 
across an entire network security infrastructure. Also, because of this unifica-
tion, the familiar, intuitive Check Point interface helps reduce IPS-1 training 
costs and increase administrator effectiveness.

IPS-1 solutions are available both as turnkey Check Point appliances and soft-
ware-only versions that can run on open servers. IPS-1 also offers multiple 
deployment modes—inline, bridge, IDS—that add to its flexibility.

the SecUrity to protect yoUr network

IPS-1 utilizes multiple methods of defense to protect your network and business 
against the multitude of increasingly sophisticated attacks and attack vectors.

accurate and granular attack prevention

Designed to provide immediate and reliable blocking of unwanted network traffic, 
IPS-1 systems not only stop backdoor and blended threats (such as Code Red, 
MS Blaster, Nimda, and SQL Slammer worms), but also attacks including SQL 
injection, command tampering, and polymorphic buffer overflows—in real time 
before they can affect your organization. From its core outward, IPS-1 is built to 
deliver trusted intrusion prevention while minimizing the time, costs, and staff 
requirements associated with intrusions.

hybrid Detection engine

At the heart of IPS-1 is the Hybrid Detection Engine, which uses multiple detection 
and analysis techniques including vulnerability signatures, exploit signatures, 

*

Summary of Contents for Power Sensor 2000

Page 1: ...or to quickly identify and act on threats to the network IPS 1 management and enforcement are unified with the Check Point security architecture so administrators can implement IPS defenses seamlessly across an entire network security infrastructure Also because of this unifica tion the familiar intuitive Check Point interface helps reduce IPS 1 training costs and increase administrator effectiven...

Page 2: ... SmartDefense Research Center continuously monitor the Internet for new exploits and vulnerabilities and rapidly develop and deliver new protections to help ensure that your network and business are protected from evolving threats THE MANAGEMENT TO SOLVE DATA OVERLOAD Only IPS 1 delivers the management tools required to keep your administrators from drowning in data and starving for critical actio...

Page 3: ... IDS and IPS chokepoint requirements Software only option Build your own sensor for deployment easy staging or as a quick hot spare with the IPS 1 software only option Leverage the fully hardened and secured Check Point operat ing system SecurePlatform which combines the simplicity and builtin security of an appliance with the flexibility of an open server Then you can turn an off the shelf server...

Page 4: ...bps 200 250 Mbps 500 Mbps 1 Gbps 1 3 2 3 Gbps 2 4 Gbps 100 200 Mbps 200 250 Mbps 500 Mbps 1 Gbps 1 2 Gbps Maximum number of CPU cores 1 2 4 8 Attributes Monitoring interfaces 2 x 10 100 1000 Mbps copper Copper 4 x 10 100 1000 Mbps or Mixed 4 10 100 1000 copper plus 4 1000 Mbps fiber Copper 8 x 10 100 1000 Mbps or Mixed 4 10 100 1000 copper plus 4 1000 Mbps fiber 8 x 10 100 1000 Mbps copper or 8 x ...

Reviews: