Integrated security solutions for next generation networks Check Point and IBM — delivering integrated security solutions for Telecom Service Providers Many telecommunications service providers are facing the accelerating adoption of pervasive wireless and the proliferation of broadband on to a converged IP-based network which is impacting every element of their network infrastructure. This impact of this transformation to an NGN infrastructure is particularly noticeable in the area of security. The traditional view of well-defined demarcation lines between secure corporate networks and the untrusted Internet are ill suited for today’s converging network infrastructure. As consumers and corporate users continue to push for access to content anywhere, anytime on any device — the world of information security needs to expand beyond silos into an integrated, security service infrastructure that can change as the security landscape changes with time. • Designed for carrier environments, Check Point security solutions on the IBM BladeCenter platform protects mobile and fixed-line messaging infrastructures from spam, phishing and viruses • The accuracy and efficiency of the Check Point solution reduces hardware and operational costs while improving subscriber satisfaction • The IBM BladeCenter family provides a scalable platform to deliver open multi-services framework for next generation network and messaging security applications Highlights Security is increasingly becoming more integrated into converged networks and business processes. Many businesses and telecom service providers are seeking integrated security solutions that eliminate the cost and complexity associated with traditional security offerings. Check Point Integrated Appliance Solutions enable IT departments and telecom service providers to design a total security solution specifically tailored for their needs. They combine proven Check Point security software solutions built on high performance, IBM BladeCenter and IBM System x platforms — all delivered as an integrated security solution with support from Check Point. These custom security appliances can be combined with other Check Point offerings like the Check Point UTM-1 appliance, as well as those from Check Point appliance partners. This helps provide unprecedented flexibility in the design of a security architecture specifically designed to meet your unique needs. Designed for your needs Check Point can help you design specific security systems that match your architectural and security policy vision. By matching the appropriate Check Point software with the appropriate platform, Check Point can provide you with the flexibility to create
4
Embed
Check Point and IBM — delivering integrated security ... · PDF fileIntegrated security solutions for next generation networks Check Point and IBM — delivering integrated security
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Integrated security solutions for next generation networks
Check Point and IBM — delivering integrated security solutions for Telecom Service Providers
Many telecommunications service
providers are facing the accelerating
adoption of pervasive wireless and
the proliferation of broadband on to a
converged IP-based network which
is impacting every element of their
network infrastructure. This impact
of this transformation to an NGN
infrastructure is particularly noticeable
in the area of security. The traditional
view of well-defined demarcation
lines between secure corporate
networks and the untrusted Internet
are ill suited for today’s converging
network infrastructure. As consumers
and corporate users continue to push
for access to content anywhere,
anytime on any device — the world of
information security needs to expand
beyond silos into an integrated,
security service infrastructure that
can change as the security landscape
changes with time.
• Designed for carrier
environments, Check Point
security solutions on the IBM
BladeCenter platform protects
mobile and fixed-line messaging
infrastructures from spam,
phishing and viruses
• The accuracy and efficiency of
the Check Point solution reduces
hardware and operational costs
while improving subscriber
satisfaction
• The IBM BladeCenter family
provides a scalable platform to
deliver open multi-services
framework for next generation
network and messaging security
applications
Highlights
Security is increasingly becoming
more integrated into converged
networks and business processes.
Many businesses and telecom service
providers are seeking integrated
security solutions that eliminate the
cost and complexity associated with
traditional security offerings.
Check Point Integrated Appliance
Solutions enable IT departments and
telecom service providers to design
a total security solution specifically
tailored for their needs. They combine
proven Check Point security software
solutions built on high performance,
IBM BladeCenter and IBM System
x platforms — all delivered as an
integrated security solution with
support from Check Point. These
custom security appliances can be
combined with other Check Point
offerings like the Check Point UTM-1
appliance, as well as those from Check
Point appliance partners. This helps
provide unprecedented flexibility in
the design of a security architecture
specifically designed to meet your
unique needs.
Designed for your needs
Check Point can help you design
specific security systems that match
your architectural and security policy
vision. By matching the appropriate
Check Point software with the
appropriate platform, Check Point can
provide you with the flexibility to create
customized security solutions to your
specific security needs — ranging from
remote offices to large data centers
or telecom central offices. Check
Point can integrate the software and
hardware into a single, certified solution
for simple, effective deployment within
your network.
Check Point also offers the M series
within the Integrated Appliance
Solutions. With three models, the
M series provides a base to quickly
customize a rack-mounted, server-
based system that meets your needs.
“Intel is working with industry leaders like IBM and Check Point to enhance the network security workload throughput on multi-core Intel® Xeon® processor-based platforms. This has lead to exceptional application layer security processing performance benefiting Enterprises and Service Providers.”
— Rose SchoolerGeneral Manager
Embedded and Communications Group
Intel Corporation
The simplicity you need
Check Point provides total support for
the Integrated Appliance Solutions,
including 3 levels of global advance
replacement based on your support
level and location. Additionally, Check
Point includes a 3 year software
subscription to ensure that your
Integrated Appliance Solution is always
running the most up to date software
— helping to keep you secure. The
optional Check Point SmartDefense
Services subscription provides the
latest threat mitigation capabilities for
SmartDefense integrated intrusion
prevention capabilities.
M2 M6 M8
Firewall throughput 4.2 Gbps 7.0 Gbps 12.0 Gbps
VPN ThroughputConcurrent sessions 600,000 900,000 1.2 Million
HTTP Connections/Second 30,000 45,000 50,000
VLANs 255 255 255
CPU 3.0 Ghz Dual-Core
Intel Xeon 3060
2x 3.0 Ghz Dual-Core
Intel Xeon 5160
2x 3.0 Ghz Dual-Core
Intel Xeon 5160
Standard Memory 1 GB PC5300-DDR2 667 Mhz
2 GB PC5300-DDR2 667 Mhz
4 GB PC5300-DDR2 667 Mhz
Storage Capacity 2 x 73 GB SATA 2 x 73 GB SATA 2 x 73 GB SATA
1 gigabit (10/100/1000) interfaces
4 on board + 6 optional
4 on board +6 optional
4 on board + 14 optional
Enclosure 1U 1U 2U
Power (watts, std/max) 350W, 1/1 585W, 1/2 625W, 2/2
Check Point integrated appliance solution overview
IBM Systems and Technology GroupDepartment XVXA3039 Cornwallis RoadResearch Triangle Park, NCU.S.A., 27709
April 2008All Rights Reserved.
BladeCenter, IBM, and the IBM logo are trademarks of International Business Machines Corporation in the United States, other countries or both.
Intel and Xeon are trademarks of Intel Corporation In the United Slates, other countries or both.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Other company product and service names may be trademarks or service marks of others.
References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates.
IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. For a copy of applicable product warranties, write to: Warranty Information, P.O. Box 12195, RTP, NC 27709, Attn: Dept. JDJA/B203.
The information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
[1] For additional details, please refer to Underwriter’s Laboratory (UL) certified NEBS Level 3 / ETSI test report.
Printed in the United States of America on recycled paper containing 10% recovered post-consumer fiber.