Check Point UTM-1 Edge NW - security appliance

Mfg. Part: CPUTMEDGENW8FCCATS | CDW Part: 2535669 | UNSPSC: 43222501
Request Pricing

Have leasing questions? Let us know how can we help.

Note: Leasing is available to organizations only. Leasing is not available to individuals.
Mon-Fri 7am-7:30pm CT
Call for availability
  • Security appliance
  • with 1 year TotalSecure
  • 8 users
  • 10Mb LAN
  • 100Mb LAN
  • GigE
  • 802.11b/g/n
View More
Product Overview
Main Features
  • Security appliance
  • with 1 year TotalSecure
  • 8 users
  • 10Mb LAN
  • 100Mb LAN
  • GigE
  • 802.11b/g/n
Check Point UTM-1 Edge appliances deliver all-inclusive, centrally managed, security solution to provide the perfect blend of simplicity and security for branch offices and remote-sites. The Check Point appliances offer extended UTM capabilities, superb reliability and unprecedented ease of use. UTM-1 Edge has the most flexible centralized management system and is built with the same enterprise-class technology used by 100 percent of Fortune 100 companies.

Technical Specifications
Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings.
Antenna Form Factor: External detachable
Antenna Qty: 2
Directivity: Omni-directional

Type: None

Bay Provided
Type: None

Chassis Built-in Devices: Wireless access point

Type: Concurrent connections
Value: 60000

Type: VPN tunnels
Value: 400

Type: Connection / user qty
Value: 8

Type: VPN tunnels (remote access)
Value: Unlimited

Dimensions & Weight
Depth: 4.8 in
Height: 8 in
Weight: 1.54 lbs
Width: 1.2 in

Environmental Parameters
Humidity Range Operating: 10 - 90% (non-condensing)
Max Operating Temperature: 104 °F
Min Operating Temperature: 32 °F

Brand: Check Point
Compatibility: PC
Manufacturer: Check Point Software
Model: NW
Packaged Quantity: 1
Product Line: Check Point UTM-1 Edge

Interface Provided
Connector Type: RJ-45
Qty: 1
Type: 1000Base-T

Qty: 4


Connector Type: Type A
Qty: 2
Type: USB

Type: Management

Authentication Method: RADIUS
Compliant Standards: FCC Part 15 B , RoHS
Encryption Algorithm: AES , DES , IKE , MD5 , RSA , SHA-1 , Triple DES , WPA , WPA-PSK , WPA2
License Qty: 8 users
Mounting Kit: Included
MTBF: 68,000 hours

Compliant Standards: IEEE 802.11b , IEEE 802.11g , IEEE 802.11i , IEEE 802.11n , IEEE 802.1x
Connectivity Technology: Wired , Wireless
Data Link Protocol: Ethernet , Fast Ethernet , Gigabit Ethernet , IEEE 802.11b , IEEE 802.11g , IEEE 802.11n
Features: Anti-spam protection , Antivirus analysis , Built-in hot-spot detector , DHCP support , Dynamic DNS server , Firewall protection , High Availability , Interrupt status port (ISP) , Intrusion Detection System (IDS) , Intrusion Prevention System (IPS) , IPSec NAT-Traversal (NAT-T) , IPSec over WLAN , Load balancing , MAC address filtering , Manageable , Print server , Quality of Service (QoS) , Stateful Packet Inspection (SPI) , URL filtering , VLAN support , Wall mountable , Wi-Fi Multimedia (WMM) support , Wireless Distribution System (WDS) support
Form Factor: External
Network Transport Protocol: DHCP , DNS , FTP , IMAP , IPSec , L2TP , POP3 , PPPoE , PPTP , SMTP , TCP/IP , UDP/IP
Remote Management Protocol: HTTP , HTTPS , SNMP , SSH
Routing Protocol: BGP , DVMRP , OSPF , PIM-SM , RIP , Static IP routing
Status Indicators: Link activity
Switching Protocol: Ethernet
Type: Security appliance
Wireless Protocol: 802.11b/g/n

Optical Storage
Type: None

Type: Firewall throughput
Value: 1 Gbps

Type: VPN throughput
Value: 200 Mbps

Power Device
Frequency Required: 50/60 Hz
Nominal Voltage: AC 120/230 V
Type: Internal power supply

Support Details Full Contract Period: 1 year
Support Details Type: Virus definitions update

Support Details Type: New releases update

Support Details Type: Spam filter update

Support Details Type: E-mail database update

Support Details Type: Limited warranty

Service & Support
Bundled Services: 1 year TotalSecure
Type: 1 year warranty

Slot Provided
Type: None

Slot Required
Type: None

Product Reviews
Rated 4.2 out of 5 by 5reviewers.
Rated 4 out of 5 by Mobile access is valuable to us, but the GUI needs to be worked on. Valuable Features:* Application Filtering* URL Filtering* IPS* Mobile accessImprovements to My Organization:Browsing speed has picked up considerably as users now have to do their official work and cannot browse social sites instead. Additionally, remote connections are now more secure and controlled.Room for Improvement:The entire GUI, look and feel of the application.Use of Solution:I've been using it for two years.Deployment Issues:No, it was deployed by the local support company here in Nigeria.Stability Issues:No issues encountered.Scalability Issues:No issues encountered.Customer Service:9/10.Technical Support:9/10.Previous Solutions:We used Checkpoint 1075 UTM1. We switched as we needed a bigger box that can handle more traffic without slowing down browsing speed.Initial Setup:The setup was done by their support reps here in Nigeria. It was straightforward, you just have to Install it and then configure your rules.Implementation Team:We used a vendor who I would rate 6/10.Other Solutions Considered:We also looked at Cyberoam, Cisco ASA and Fortinet.Other Advice:Get a sound Check Point specialist to implement it , do a proper handover, and training for the product.Disclaimer: I am a real user, and this review is based on my own experience and opinions. September 16, 2015
Rated 5 out of 5 by It presents information clearly and doesn't require command code, but VPN and IPS have room for improvement. Valuable Features:* Firewalls* IPSImprovements to My Organization:As a security information analyst, it helps me to see information in a very clear way. You don’t have to use command code. The platform is very simple, and you don’t need to be an expert to understand the reports.Room for Improvement:* VPN - It's not that good, so I moved to Juniper.* IPS - It has room for improvement, as sometimes hackers are able to get through.Use of Solution:I've used it for two years.Deployment Issues:My web infrastructure is different than in other places, therefore the version provided by CheckPoint did not fit a first. I needed to report the bugs to CheckPoint for them to fix them and update the version.Stability Issues:I have two clusters, so even in the rare situation that I have a problem with the stability, it will switch to the cluster. The end users would not notice a switch.Customer Service:Customer service is not their strong suite. It takes a lot of time until they fix anything, and it can be better to try and fix the issue without them. They have many clients, most of them are large companies, so it’s hard for small-medium companies.Technical Support:Technical support is not their strong suite. It takes a lot of time until they fix anything, and it can be better to try and fix the issue without them. They have many clients, most of them are large companies, so it’s hard for small-medium companies.Previous Solutions:I am using both CheckPoint and Fortigate as result of my complex web infrastructure. Every ISP exits through a different firewall.Initial Setup:It was complex. I initially received two different firewalls from CheckPoint due to my web infrastructure. Every firewall got configured with different rules, and at the point when we wanted to merge them, problems occurred.Implementation Team:Our integrator did great work, integrating 1500 rules.ROI:It's the best of breed with a good return.Cost and Licensing Advice:You don’t have to buy the cluster immediately. I waited for a year before buying it. By doing that, I’ve split the budget, and was able to convince my managers to buy the solution.Other Solutions Considered:I bought only the hardware, and used an open server license for the rest. CheckPoint would not suggest it, but it works for me.Disclaimer: I am a real user, and this review is based on my own experience and opinions. July 25, 2015
Rated 5 out of 5 by It performs reliably and you can watch it block hacks, but it needs more customization options for network threat management. Valuable Features:* Reliability* Performance* SecurityImprovements to My Organization:It keeps the bad guys out.Room for Improvement:They should provide better customization options for network threat management.Use of Solution:I've used it from 2003 to date.Deployment Issues:At first, we tried to implement it not as a cluster, but when we decided to implement as a cluster, it required us to change our entire network infrastructure.Stability Issues:Since I was a beta tester, it had a lot of bugs, which I helped fix.Scalability Issues:It depends if you buy the hardware from Check Point or not. I didn’t, so I didn’t have any issues with scalability.Customer Service:Horrible. It takes them days, sometimes weeks, until they try to help, and then they don't help enough. I have a limited support help. Generally speaking, though, they don’t have problems, and I’m really satisfied.Technical Support:Not good. They have one of the top engineers, who told me to change something and now I’m buying something else from them.Previous Solutions:I’ve just bought FortiGate, and am trying to compare the two to determine which has better features.Initial Setup:It's straightforward, as I did a course for a year with Check Point.ROI:Excellent. Best in their market.Cost and Licensing Advice:Price is 170,000 Shekels/year. Day-to-day is one and a half people for licensing.Other Advice:This is my favorite product that I use, and I think it's one of the best in the world. Watching it block hacks is very interesting. It's a great product and fun to work with. Keep innovating, Check Point.Disclaimer: I am a real user, and this review is based on my own experience and opinions. July 20, 2015
Rated 4 out of 5 by It's not cheap when compared to other solutions, but it has some valuable features, such as SSL VPN, and IPS. Valuable Features:* Threat prevention* IPS* Application Control and URL filtering* SSL VPN* Mobile Access* Anti Spam* MailImprovements to My Organization:IPS prevents many unwanted, malicious objects from our web sites. It provides high level security for our network, and by using AppWiki, thousands of application can be controlled over the network. Also, the anti-spam engine provides effective solutions for spam mails.Room for Improvement:The physical memory is insufficient for installing policies and some other operations. It would be better to put 4GB RAM into the appliance.Use of Solution:We have been using Check Point solutions for 15 years, and this appliance since 2014.Deployment Issues:There were some memory bottleneck problems.Stability Issues:No issues encountered.Scalability Issues:No issues encountered.Customer Service:It's satisfactory.Technical Support:It's satisfactory.Previous Solutions:No previous solution used.Initial Setup:We have upgraded from a UTM-1 appliance to a Next Generation one. This process has taken some time.Implementation Team:We implemented our solution through an official vendor in our country. They helped us through every stage of our purchase and installation. The service was satisfactory.Cost and Licensing Advice:Check Point is not cheap when compared to other solutions, but it provides high level security. As an organization we are fully satisfied with this product.Other Solutions Considered:No other options were evaluated.Other Advice:I would highly recommend others to implement or try Check Point products for their security solutions.Disclaimer: I am a real user, and this review is based on my own experience and opinions. July 7, 2015
Rated 3 out of 5 by It has an easy to use VPN but about once a year we have a catastrophic failure. Valuable Features:* Firewall* Mobile AccessImprovements to My Organization:The firewall allows the logging of traffic, and it has an easy to use VPN. We can NAT onto the firewall instead of our router.Room for Improvement:The CLI is good.Use of Solution:I've used it for four years.Deployment Issues:No issues encountered.Stability Issues:Yes, about once a year we have a catastrophic failure. It's pretty random.Scalability Issues:No issues encountered.Customer Service:7/10.Technical Support:6/10.Previous Solutions:No previous solution was used.Implementation Team:A third-party vendor set it up who were knowledgeable about the solution.Other Advice:Be patient, there's always a solution to whatever issue you are having.Disclaimer: I am a real user, and this review is based on my own experience and opinions. April 15, 2015
  • 2016-10-27 T09:19:44.180-05:00
  • bvseo_lps, prod_bvrr, vn_prr_5.6
  • cp-1, bvpage1
  • co_hasreviews, tv_5, tr_5
  • loc_en_US, sid_2535669, prod, sort_default
1-5 of 5
Adding to Cart...
10/28/2016 5:17:38 AM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.


Something went wrong.

Please try again later.

License Selector

    The license selector is not currently available. Please try again later.