A Solar Solution for Africa\’s Mobile Problem http://t.co/DuInJ1tQ via @CiscoSystems
@HackersMagazine @bipeen_parma…
@HackersMagazine @bipeen_parmar @DellEnterprise @ _echo0 thanks for the follow
Checkpoint supports cloud based security for Amazon Web Services
4th January 2012
Check Point and Amazon Web Services are teaming up to enable Check Point Security Gateway functionality to boost cloud security for business assets.
The arrangement has Amazon supplying the physical platform for a virtual version of Check Point’s security gateway appliance, which customers can configure and manage via their Check Point management platform.
Virtual Appliance for Amazon Web Services supports the security features of Check Point’s Security Gateway, which includes firewall, VPN, anti-virus and other applications that can be added to the platform via what the company calls software blades.
In order to use Virtual Appliance for Amazon Web Services, customers must have a valid Check Point license bought either specifically for use in the Amazon cloud or that they bought for use in their private network. Once Amazon is presented with the license, it provides the virtual appliance to the customer.
Installing the appliance requires the cooperation of Amazon because the Check Point software needs bare metal installation of the Check Point operating system that the security gateway runs on. Amazon had to create an Amazon machine image to accommodate the gateway appliance, Check Point says.
To the Check Point management platform, a virtual appliance in the cloud looks the same as an actual appliance deployed in customers’ networks. The platform can control configurations and enforce the same policies, Check Point says.
The company’s security blade architecture includes more than 30 software security applications including firewall, IPS, VPN, URL filtering and data loss prevention. Customers pay according to how may blades they license. Pricing for Virtual Appliance for Amazon Web Services starts at $2,000.
Barry Hesk
Chip ahoy! Are RFID credit car…
Chip ahoy! Are RFID credit cards secure? – Fox Business http://t.co/amoxi2rj — CompSecurityPRO (@CompSecurityPRO)
RT @TelegraphTech Microsoft mo…
RT @TelegraphTech Microsoft moves to avoid further drunken shame http://t.co/l7B2Ni5a
RT @etherealmind Blog Post: Ci…
RT @etherealmind Blog Post: Cisco IOS CLI Shortcuts http://t.co/F4mHKUrK
Application and Database Secur…
Application and Database Security: Two Halves Of A Whole – repost of an article from Dark Reading http://t.co/N0KUMfdB
Anonymous, hacking and RSA Lea…
Anonymous, hacking and RSA Lead the Top IT Security News of 2011 – eWeek http://t.co/HXbjBUtk What will 2012 bring?
RT @ReutersTech RIP Technology…
RT @ReutersTech RIP Technology: 10 Products and Services That Died in 2011 http://t.co/y9CUNdex
NEW: Cisco ASA Licensing Expla…
NEW: Cisco ASA Licensing Explained http://t.co/Uvf3Gwna | yes, it really is that complicated – CheckPoint still much worse