Check Point wants to protect SMBs from cyber attacks

New appliances will offer 'enterprise grade' security for smaller businesses

Check Point has launched a new range of security appliances that it claims can offer SMBs enterprise-grade protection against sophisticated cyber attacks.

The Check Point 700 Series includes two appliance models, the 730 and 750, that come with a firewall, VPN, anti-bot, intrusion prevention, anti-virus, anti-spam, application control, URL filtering, and the ability to enable security monitoring out of the box.

There is also the option to equip them with 802.11ac Wi-Fi, with VDSL connectivity coming later in the year.

The company claims that while 90 per cent of businesses globally are SMBs, they "have typically seen limited options for affordable, robust security solutions".

The built-in features of the 700 Series, the company said, help provide offices with up to 100 employees with protection against sophisticated, incremental, difficult to detect network attacks while still being easy to run and maintain, thanks to a web-based management platform.

Check Point 730 and 750 also promise to maintain fast internet speeds, with up to 4Gbps firewall throughput traffic and up to 200Mbps when all threat prevention functions are activated.

"Cybercriminals are not only employing increasingly sophisticated means of stealing data - they are also increasingly targeting the entrepreneurial spirit of small-business IT," said Gabi Reish, vice president of product management at Check Point.

"The new Check Point 700 Series appliances provide an enterprise-grade solution that meets the agility and evolving needs of the small business," he added.

The Check Point 730 and 750 appliances cost 350 and 550 respectively before tax or the addition of any additional features.

Featured Resources

Become a digital service provider

How to transform your business from network core to edge

Download now

Optimal business results with the cloud

Evaluating the best approaches to hybrid cloud adoption

Download now

Virtualisation that enables choices, not compromises

Harness the virtualisation technology that's right for your hybrid infrastructure

Download now

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Security

Mimecast admits hackers accessed users’ Microsoft accounts

13 Jan 2021
What is public key infrastructure (PKI)?
Security

What is public key infrastructure (PKI)?

12 Jan 2021

Most Popular

150,000 arrest records accidentally deleted from police database
data management

150,000 arrest records accidentally deleted from police database

15 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021