Software Blades - a new generation IT security architecture revealed

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Say hello to a new security architecture called `software blades,' a new architecture that allows companies to select from a library of over 20 software-driven systems to create a tailored security gateway for specific environments.

Software blades allow companies to start with a single core, single blade firewall system, and add functionalities as they go along.

To meet their performance needs, the system can be upgraded into a two, four or eight core computing system, enabling multi-gigabit performance with the extended functionality.

Software blades are not physical but logical blades that can be configured into a solution based on your specific security needs.

This webinar will:

  • Explain the benefits of the Software Blade Architecture
  • Assist you in understanding the nature of this modular security gateway that can be managed centrally
  • Detail how the new architecture fits into the virtual environment
  • Help you understand the guaranteed performance levels this new technology offers companies.

This webinar is for:

  • IT and network managers looking for alternatives to traditional appliances.
  • IT professionals wanting more information on what is billed as a significant leap forward in blade technology.
  • Anyone looking for a flexible solution that can be rapidly deployed.


Alisha Dattani

Alisha Dattani Partner Manager, Check Point Software Technologies

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Simon Perry

      Simon Perry Principal Associate Analyst, Quocirca