Software Blades - a new generation IT security architecture revealed

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Say hello to a new security architecture called `software blades,' a new architecture that allows companies to select from a library of over 20 software-driven systems to create a tailored security gateway for specific environments.

Software blades allow companies to start with a single core, single blade firewall system, and add functionalities as they go along.

To meet their performance needs, the system can be upgraded into a two, four or eight core computing system, enabling multi-gigabit performance with the extended functionality.

Software blades are not physical but logical blades that can be configured into a solution based on your specific security needs.

This webinar will:

  • Explain the benefits of the Software Blade Architecture
  • Assist you in understanding the nature of this modular security gateway that can be managed centrally
  • Detail how the new architecture fits into the virtual environment
  • Help you understand the guaranteed performance levels this new technology offers companies.

This webinar is for:

  • IT and network managers looking for alternatives to traditional appliances.
  • IT professionals wanting more information on what is billed as a significant leap forward in blade technology.
  • Anyone looking for a flexible solution that can be rapidly deployed.


Alisha Dattani

Partner Manager, Check Point Software Technologies

Steve Gold

Infosecurity Magazine

Simon Perry

Principal Associate Analyst, Quocirca

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.