Introduction
10 | UTM-1 Getting Started Guide
UTM-1 supports the Check Point Software Blade architecture, providing independent, modular
and centrally managed security building blocks. Software Blades can be quickly enabled and
configured into a solution based on specific security needs.
The following Software Blades are included in UTM-1:
Security Gateway Software Blades
Firewall – proven, enterprise-class firewall.
IPSec VPN – encrypted secure connectivity to corporate networks, remote users, branch
offices and business partners.
IPS – High performance integrated IPS solution with extensive threat coverage.
URL Filtering – Best-of-breed Web filtering covering more than 20 million URLs. Protects
users and enterprises by restricting access to dangerous Web sites.
Anti-Virus & Anti-Malware – Leading anti-virus protection including heuristic virus analysis.
Stops viruses, worms and other malware at the gateway.
Anti-Spam & Email Security – Multi-dimensional protection for the messaging
infrastructure. Stops spam, protects servers and eliminates attacks through email.
Security Management Software Blades
Network Policy Management – Comprehensive network security policy management for
Check Point gateways and blades, via SmartDashboard, a single, unified console.
Endpoint Policy Management – Centrally deploy, manage, monitor and enforce security
policy for all endpoint devices across any sized organization.
Logging & Status – Comprehensive information in the form of logs, and a complete visual
picture of changes to gateways, tunnels, remote users and security activities.
For additional software blades, see the Check Point Web site
(http://www.checkpoint.com/products/softwareblades/architecture/)
This document provides:
A brief overview of essential UTM-1 concepts and features.
A step by step guide to getting UTM-1 up and running.
Note - This guide applies to all UTM-1 models.
However, screen shots may apply only to the highest
model in the range.