Overview
What is Check Point Virtual Systems?
Check Point Virtual Systems enable organizations to consolidate infrastructure by creating multiple virtualized security gateways on a single hardware device, delivering deep cost savings, seamless security and infrastructure consolidation. Based on virtualized security design and the extensible Software Blade Architecture,…
Recent Reviews
Leaving a review helps other professionals like you evaluate Network Virtualization Software
Be the first one in your network to review Check Point Virtual Systems, and make your voice heard!
Get StartedProduct Details
- About
- Tech Details
What is Check Point Virtual Systems?
Check Point Virtual Systems enable organizations to consolidate infrastructure by creating multiple virtualized security gateways on a single hardware device, delivering deep cost savings, seamless security and infrastructure consolidation. Based on virtualized security design and the extensible Software Blade Architecture, Virtual Systems provide customized security protections to multiple networks and enterprise-wide policy by creating tailored policies for each network.
Virtual Systems can be deployed on multiple gateways ensuring secure, resilient, multi-gigabit throughput. Virtual System Load Sharing (VSLS) distributes traffic load within a cluster, providing the ability to distribute virtual systems across multiple cluster members, without requiring any change to existing topology. Every addition of a cluster member spreads the virtual system traffic load within the cluster, in order to provide the benefits of throughput, concurrent connections, redundancy, cost efficiency, configuration simplicity, priority designation, and system scalability.
Check Point Virtual Systems are offered either as a softwareonly option or in pre-configured bundles with Check Point Security Appliances and Software Blades.
Virtual Systems can be deployed on multiple gateways ensuring secure, resilient, multi-gigabit throughput. Virtual System Load Sharing (VSLS) distributes traffic load within a cluster, providing the ability to distribute virtual systems across multiple cluster members, without requiring any change to existing topology. Every addition of a cluster member spreads the virtual system traffic load within the cluster, in order to provide the benefits of throughput, concurrent connections, redundancy, cost efficiency, configuration simplicity, priority designation, and system scalability.
Check Point Virtual Systems are offered either as a softwareonly option or in pre-configured bundles with Check Point Security Appliances and Software Blades.
Check Point Virtual Systems Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |