5400 Appliance
Small Enterprise Security
Product Benefits
- Enable the most advanced threat prevention security
- Optimal performance even when inspecting SSL encrypted traffic
- Future-proofed technology safeguards against tomorrow’s risks
- Centralized control and LOM improves serviceability
- High performance package optimizes platform performance
- Modular, expandable chassis with flexible I/O options
Product Features
- Simple deployment and management
- Secure remote access to corporate resources from a wide variety of devices
- One network expansion slot to add port density, fiber and fail-open IO card options
- Redundant appliance clustering technologies eliminate a single point of failure
OVERVIEW
The Check Point 5400 Appliance combines the most comprehensive security protections to safeguard your small enterprise. The 5400 is a 1U appliance with one I/O expansion slot for higher port capacity, a 500 GB hard disk, and Lights-Out Management (LOM) for remote management. This powerful security appliance is optimized to deliver real-world threat prevention to secure your critical assets and environments.
COMPREHENSIVE THREAT PREVENTION
The rapid growth of malware, growing attacker sophistication and the rise of new unknown zero-day threats require a different approach to keep enterprise networks and data secure. Check Point delivers fully integrated, comprehensive Threat Prevention with award-winning SandBlast™ Threat Emulation and Threat Extraction for complete protection against the most sophisticated threats and zero-day vulnerabilities.
Production Environment Performance1 |
|
SecurityPower™ Units (SPU) |
600 SPU |
Firewall throughput |
10 Gbps |
IPS throughput |
1.08 Mbps |
NGFW throughput (Firewall, Application Control, IPS) |
690 Mbps |
Threat prevention throughput2 |
330 Mbps |
Ideal Testing Conditions Performance (RFC 3511, 2544, 2647, 1242) |
|
Firewall throughput, 1518 byte UDP |
22 Gbps |
Connections per second |
150,000 |
Concurrent connections |
3.2 to 6.43 million |
VPN throughput, AES-128 |
2.16 Gbps |
IPS throughput |
3.9 Gbps |
NGFW throughput (Firewall, Application Control, IPS) |
3.4 Gbps |
1 Performance measured with real-world traffic blend and content, a typical rule base, updated recommended signatures, NAT and logging enabled, 2 FW, IPS, APPCTRL, AV, AB, URLF, 3 with maximum memory
ALL-INCLUSIVE SECURITY SOLUTIONS
Check Point 5400 Appliances offer a complete and consolidated security solution available in two complete packages:
- NGTP: prevent sophisticated cyber-threats with IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security.
- NGTX: NGTP with SandBlast Zero-Day Protection, which includes Threat Emulation and Threat Extraction.
PREVENT KNOWN AND ZERO-DAY THREATS
The 5400 Appliance protects organizations from both known and unknown threats with Antivirus, Anti-Bot, SandBlast Threat Emulation (sandboxing), and SandBlast Threat Extraction technologies.
As part of the Check Point SandBlast Zero-Day Protection solution, the cloud-based Threat Emulation engine detects malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines cloud-based CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.
Furthermore, SandBlast Threat Extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.
NGTP | NGTX | |
Prevent known threats | Prevent known and zero-day attacks | |
Firewall | ? | ? |
VPN (IPSec) | ? | ? |
IPS | ? | ? |
Application Control | ? | ? |
Anti-Bot | ? | ? |
Anti-Virus | ? | ? |
URL Filtering | ? | ? |
SandBlast Threat Emulation | ? | ? |
SandBlast Threat Extraction | ? | ? |
INSPECT ENCRYPTED CONNECTIONS
There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data.
INCLUSIVE HIGH PERFORMANCE PACKAGE
Customers with high connection capacity requirements can purchase the affordable High Performance Package (HPP). This includes the appliance plus one 4x 1Gb SFP interface card, transceivers and 16 GB of memory for high connection capacity.
Base | HPP | Max | |
1 GbE ports (Copper) | 6 | 6 | 14 |
1 GbE ports (Fiber) | 0 | 4 | 4 |
Transceivers (SR) | 0 | 4 | 4 |
RAM | 8GB | 8GB | 16GB |
Power Supply Units | 1 | 1 | 1 |
Lights Out Management | Optional | Included | Included |
REMOTE MANAGEMENT AND MONITORING
An optional Lights-Out-Management (LOM) card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location. Administrators can also use the LOM web interface to remotely install an OS image from an ISO file.
SECURE REMOTE ACCESS
Each Check Point appliance is configured with mobile access connectivity for up to 5 users, using the Mobile Access Blade. This license provides secure remote access to corporate resources from a wide variety of devices including smartphones, tablets, PCs, Mac and Linux.
INTEGRATED SECURITY MANAGEMENT
Every Check Point appliance can either be managed locally with its available integrated security management or via central unified management. Using local management, the appliance can manage itself and one adjacent appliance for high availability deployments.
Expansion Options Base Configuration |
|
Network Expansion Slot Options (1 slot available) |
|
Fail-Open/Bypass Network Options |
|
Virtual Systems 1 |
|
1 with the memory available in the base or HPP
Network
Network Connectivity |
|
High Availability |
|
IPv6 |
|
Routing
Unicast and Multicast Routing (see SK98226) |
|
Physical
Power Requirements |
|
Dimensions |
|
Operating Environmental Conditions |
|
Storage Conditions |
|
Certifications |
|