The world's leading check Point Software Technology Co., Ltd. has recently launched a new security Gateway Virtual edition™ (VE) at the VMworld 2010 conference, which integrates Vmsafe, Use the industry's most advanced firewall to provide security to the cloud environment to help protect the dynamic virtual environment against internal and external security threats. The new security Gateway VE employs a check Point Software blade architecture that enables organizations to leverage the flexible, comprehensive security solutions (including firewalls, VPNs, and intrusion detection) that are used in physical networks to meet the specific safety, network, and management needs of the virtual environment. The new security Gateway ve is designed to ensure that enterprises can protect the communication and external networks between VMS through fine-grained firewall policies and integrated intrusion detection capabilities, preventing malicious and unwanted network behavior. In addition, the enterprise can automatically apply security policies to all existing or future machines, and there is no need to change existing network topologies during dynamic migration and no downtime. By adopting security Gateway VE, customers will not only be able to meet the traditional network communication requirements, but also meet dynamic requirements, protect data at the hypervisor level, and ensure the most comprehensive protection for the customer's virtual environment. "Defending against network external threats and detecting communication between virtual machines is two of the challenges of protecting the virtual environment," says Dorit Dor, vice president of products at Check Point Software Technologies, new Check Point security Gateway ve can detect communication between VMS at the hypervisor level, providing comprehensive protection for the entire organization's environment. In addition, administrators can more transparently prevent viruses, trojans, and keyboard trackers from invading into virtual machines. "Security has always been the most concern of the virtual environment, and we have secured secure communications on 29 VMware hosts through the VE solution with Check point," said Predrag Petrovic, senior system administrator QSs D.O.O, a leading system integrator. , enabling us to enjoy all the benefits of virtualization. "The security Gateway ve, integrated with VMware Vmsafe™,check Point, can be easily deployed throughout the infrastructure in a consistent way to achieve better visibility, manageability, and better implementation of standard security policies." Now that businesses have access to all data securely, better system protection can help protect against new, existing threats in the virtual environment. "Security is a concern for any company seeking to deploy virtualization," said Parag Patel, vice president of VMware Global Strategy. By working with Check Point, customers benefit from the various security solutions for VMware environments provided by Check point. With a decade of expertise in virtualization and security, VMware and check Point will continue to provide customers with the tools they need to protect the virtual environment and continue to move towards the goal of it as a service. "Customers can easily deploy security Gateway ve to their existing secure infrastructure and virtual environments, dramatically reducing deployment time and reducing costs." Organizations can centrally manage physical and virtual gateways from a single console, simplifying management. In addition, organizations can distinguish between virtualization and security administrator-specific areas, while applying the same global policies across different environments throughout the organization. Dor concluded that "by adopting the security Gateway VE, customers can simplify the dynamic virtual environment and use the same infrastructure and unified management and protection of the physical network." "Responsible editor: Xu Fengli TEL: (010) 68476606" Original: Check point new security Gateway Virtual version Simplify cloud security return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.