Suppose you’re in a real zero-trust, high-traffic environment. You have multiple roaming users where not only east west but north south traffic is huge. You’re required to monitor every traffic flow, in multiple branch offices. They must be able to connect centrally, all the while being easy to monitor. Oh, and you need to be able to defend against newly-created attacks. Are your demands starting to outgrow the capabilities of a desktop, SMB firewall? Not if it’s the Check Point 1590!
It’s important to understand that Check Point’s focus is on prevention rather than detection. In other words, blocking known and unknown cyber-attacks to ensure business continuity.
Their Advanced Threat Prevention is packaged with zero-day protection and next-generation firewall technologies. It includes application control, advanced URL filtering, IPS, antivirus, anti-bot. In addition, there’s email security, policy management, monitoring and event management.
The 1590 boasts stateful firewall inspection capability from Layer L3-L7. And, among other excellent features, are its’ Application Control, URL Filtering, and IPS/IDS.
Additionally, SandBlast Threat Emulation and SandBlast Threat Extraction stop Zero-day attacks in their tracks.
Highly customizable
The Check Point 1590 is not intended to be as plug-and-play as some other vendors. However, if you decide to simply use the default setting, you can be up and running in just a minute or two. Check Points are devices you build around and customize into your environment. And that customization is the beauty of the Check Point 1590. The thing is, you can use the defaults if you like. But, if you do need to tune the system to do something just for your environment, then you can find a way to do it with the Checkpoint. This granularity also gives you better visibility into your environment that many other vendors.
And, they have an excellent Engineering and Professional Services team in place to help you to realize your goals. So there’s no guesswork; no crossing your fingers and hoping it works. These professionals will get you there. Just remember, to get the very most out of the Check Point 1590, you’ll need someone with an IT background. Or at least a good technical acumen. Then again, there’s so much you can get out of one!
Tech Support
Their support teams are top of the line. They are highly trained to take those deep dives with you. They will understand your needs. This truly is one of Check Point’s strengths.
Check Point 1590 by the numbers
The Check Point 1590 moves Threat Protection Throughput at 660 Mbps, Next-Gen Firewall Throughput at 1.3 Gbps, and IPS Throughput at 1.4 Gbps. Firewall Throughput is 2.8 Gbps. The Wi-Fi option is 802.11ac.
The downside to plug-and-play firewalls is that sometimes they are less configurable. And it really just comes down to what your organization needs. With Check Point, you have flexibility to get what you want. However, your needs may be served perfectly well with a device that just powers up and goes to town.
Either way, why not give us a call at 877-449-0458, or reach out at [email protected]? We would love to help you decide what sort of security solution is a perfect fit for you. And we have a great deal of experience as a Check Point partner! Thanks for reading!
Highlights of the Check Point 1590
1.3 Gbps Next-Gen firewall throughput |
660 Mbps Threat Prevention |
2.8 Gbps Max Firewall Throughput |
1.4 Gbps IPS Throughput |
Highly customizable |