Share this: 

Scalable X-Series Platform

An open, scalable, network infrastructure solution for best-in-class security applications. Your company’s network security should be tailored to meet your specific requirements. That’s why we created the X-Series—an open, adaptable network security platform that provides blazing-fast, reliable processing and throughput for best-in-class security applications.

The X-Series utilizes a flexible, high-performance network architecture that consolidates multiple security appliances into a single platform so you can consolidate equipment and eliminate the appliance sprawl that has overtaken your data center. It frees you to run world-class security applications from Check Point, and allows you to scale up and adapt performance on-demand to match your business needs.

The X-Series Platform provides the following benefits:

Simplifies your Data Center Security

  • The X-Series platform simplifies your data center security deployment by consolidating multiple instances of the Check Point Security Gateway while eliminating the need for associated switches and load balancers. It dramatically reduces the footprint of network security appliances and associated networking equipment. Too, it integrates with and enhances existing data center and network perimeter environments.
  • The X-Series provides the ability to integrate with existing data center and perimeter environments and enhance private cloud deployments with its dynamic, resilient and virtualized capabilities. The unique platform quickly enables new security services without the need for re-architecting, maximizing the return on investment (ROI) of your network security infrastructure.

Maximizes Service Uptime within the Data Center

  • The X-Series platform is specifically designed to maximize network and service uptime within increasingly demanding data center environments. Offering unsurpassed operational efficiency, it provides virtually 100% availability for business-critical networks.
  • The X-Series provides the ability to integrate with existing data center and perimeter environments and enhance private cloud deployments with its dynamic, resilient and virtualized capabilities. The unique platform quickly enables new security services without the need for re-architecting, maximizing the return on investment (ROI) of your network security infrastructure.

How We Do It

Secure Flow Processing

  • Eliminates the need for routers, switches, taps, and other equipment because their functions are performed by the X-Series Network Processor Module.
  • Simplifies changing network security applications without changing the network topology.
  • Consolidate security devices and surrounding equipment, reducing the number of devices to manage and making any changes and troubleshooting straightforward.

Virtual Application Processing

  • Makes it possible to seamlessly implement and scale multiple applications in a single chassis.
  • Allows security application performance to be scaled from 5 to 140 Gbps—so you can keep pace with the most aggressive traffic growth.
  • Makes expansion easy by enabling true linear scalability for multiple applications in a single chassis, eliminating time-consuming and risky forklift upgrades.

Network Flow Distribution

  • Ensures efficient use of all processing cores regardless of the source or destination port, yielding consolidation ratios that are impossible with other platforms.
  • Decouples physical ports from processing resources, allowing you to design the security architecture around your existing network.

Adaptive Healing Technology

  • Lets you prioritize resources in the case that one or more components fails, reducing the amount of spare equipment sitting on the shelf.
  • Gives you the flexibility to customize availability levels from 5-9’s redundancy in a single chassis to virtually zero downtime with multiple chasses.
  • Automatically keeps critical environments running at full capacity and provides protection against environmental failure or local disaster.

Thought Leadership: Degrees of Freedom in the Age of Advanced Threats

In statistics, a degree of freedom is a variable in an equation that can change without impacting the outcome. In security, we often struggle to define what variables truly matter and which ones are free to change. Here, Dr. Hugh Thompson looks at how we can identify and leverage degrees of freedom in the age of advanced threats.