Check Point UTM-1 security appliances are all-inclusive, turn-key unified threat management solutions that include everything you need to secure your network. Each appliance includes integrated centralized management, along with complete security updates, hardware and customer support.
All-in-one network security in a proven, turn-key solution
- Includes security protections, updates, management and hardware warranty
- Secure remote access and site-to-site communication ensure confidentiality
- Trusted by 100% of the Fortune 100 as a leader in network security
Simplified administration with centralized management
- Easy plug-and-play installation and simple web-based management
- Manage multiple Check Point gateways from a single console
- Centralized, automatic defense updates protect networks from new attacks
Extensible, on-demand security via Software Blade Architecture
- Protect against emerging threats with optional Software Blades
- Adjustable to include Application Control and other XTM protections
- Includes full UTM security—including firewall, intrusion prevention (IPS), antivirus, anti-spyware, URL filtering, Web security and anti-spam Software Blades
All-Inclusive, Turn-key Solution
Check Point UTM-1 security appliances offer unified threat management solutions with everything you need to secure your network, including security protections, updates and management and hardware warranty.
Integrated Security Management
Check Point UTM-1 security appliances include integrated gateway management, offering the ability to centrally manage multiple Check Point gateways from a single console.
Centralized, Automatic Updates
Centralized, automatic defense updates via the Check Point Update Service protect your networks from new attacks.
Intuitive Start-up Wizard
An intuitive start-up wizard simplifies first-time deployment and configuration.
Integrated into Flexible Software Blade Architecture
Designed for the Check Point Software Blade Architecture, UTM-1 security appliances deliver flexibility and low total cost of ownership by allowing customers to quickly expand security protections to meet changing requirements.