Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Software Blades - a new generation IT security architecture revealed

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Say hello to a new security architecture called `software blades,' a new architecture that allows companies to select from a library of over 20 software-driven systems to create a tailored security gateway for specific environments.

Software blades allow companies to start with a single core, single blade firewall system, and add functionalities as they go along.

To meet their performance needs, the system can be upgraded into a two, four or eight core computing system, enabling multi-gigabit performance with the extended functionality.

Software blades are not physical but logical blades that can be configured into a solution based on your specific security needs.

This webinar will:

  • Explain the benefits of the Software Blade Architecture
  • Assist you in understanding the nature of this modular security gateway that can be managed centrally
  • Detail how the new architecture fits into the virtual environment
  • Help you understand the guaranteed performance levels this new technology offers companies.

This webinar is for:

  • IT and network managers looking for alternatives to traditional appliances.
  • IT professionals wanting more information on what is billed as a significant leap forward in blade technology.
  • Anyone looking for a flexible solution that can be rapidly deployed.


Alisha Dattani

Alisha Dattani Partner Manager, Check Point Software Technologies

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Simon Perry

      Simon Perry Principal Associate Analyst, Quocirca