Description
Check Point 1590 Network Security/Firewall Appliance
Secure. Powerful. Simple. The Check Point 1590 Network Security/Firewall Appliance is designed for small businesses that demand enterprise-grade protection in a compact, easy-to-manage package. This all-in-one security gateway combines best-in-class firewall technology with layered threat prevention to keep your network safe from evolving threats, while maintaining performance and reliability for everyday business operations. From branch offices to remote sites, the 1590 delivers comprehensive protection without complexity, so you can focus on growing your business.
- All-in-one security gateway: The 1590 fuses firewall, VPN, antivirus, application visibility and control, URL filtering, email security and SandBlast ZeroDay Protection into a single, compact appliance—delivering robust protection without multiple devices or licenses.
- Enterprise-grade protection for small business environments: Engineered to defend against modern threats with security features that scale as your network grows, while remaining simple to configure and manage through a centralized console.
- High performance in a small footprint: Designed for small offices and remote sites, the 1590 blends powerful threat prevention with a compact form factor, ensuring low latency and reliable throughput for day-to-day operations.
- Threat intelligence and SandBlast ZeroDay Protection: Proactively stops known and unknown threats, including zero-day exploits, using advanced sandboxing and real-time threat intelligence to prevent breaches before they happen.
- Simple deployment and ongoing management: Quick start guides, policy templates, and an intuitive management interface enable fast deployment, straightforward policy creation, and ongoing visibility across users, apps, and traffic.
Technical Details of Check Point 1590 Network Security/Firewall Appliance
- Security features: Built-in firewall, site-to-site and remote access VPN, antivirus, SandBlast ZeroDay Protection, application visibility and control, URL filtering, and email security to defend users and data across the network.
- Threat prevention: Integrated threat prevention with real-time updates to protect against malware, exploits, phishing, and other evolving attack vectors.
- Web and email protection: URL filtering and email security capabilities help block malicious sites and suspicious messages before they reach end users.
- Visibility and control: Application visibility and control allow administrators to identify and manage application use, prioritize business-critical apps, and enforce acceptable-use policies.
- Management and deployment: Centralized management with scalable policy templates, rapid deployment options, and straightforward ongoing policy optimization to suit changing business needs.
how to install Check Point 1590 Network Security/Firewall Appliance
Getting started with the Check Point 1590 is designed to be straightforward for IT teams of any size. Begin with the quick-start guidance and move through configuration at your own pace as you tailor protections to your environment.
Step 1: Unbox and connect. Place the appliance in a secure location, connect power, and attach your network interfaces to the appropriate internal and external networks. If you have a management network, ensure the device can be reached from your administration workstation via the default management interface.
Step 2: Access the management portal. Use a supported browser to reach the device’s management console and complete the initial setup wizard. This will guide you through the essential steps: licensing, firmware updates, and baseline network configuration.
Step 3: Apply licenses and update firmware. Import your security licenses and check for firmware updates to ensure you have the latest protections, performance improvements, and bug fixes. Regularly monitor for updates to maintain optimal threat prevention.
Step 4: Define security policies. Create firewall rules, VPN configurations, and security profiles for antivirus, SandBlast, URL filtering, and application control. Use policy templates to accelerate deployment and ensure consistent enforcement across users and devices.
Step 5: Enable threat prevention and logging. Activate SandBlast ZeroDay Protection and continuous threat intelligence feeds. Configure logging and alerting so you receive timely notifications about detected events and policy changes. Validate traffic flows to confirm legitimate business services are not impeded.
Step 6: Validate access and optimization. Run a health check to verify connectivity, VPN tunnels, and user access. Review dashboards for bandwidth usage, event trends, and policy effectiveness. Adjust rules and time-based restrictions as needed to balance security with productivity.
Step 7: Ongoing maintenance and support. Schedule periodic reviews of security policies, apply updates, and leverage Check Point’s centralized management for scalable administration as your network evolves. Training resources and documentation are available to help IT staff stay current with best practices.
Frequently asked questions
Q: What is the Check Point 1590 Network Security/Firewall Appliance?
A: It is a compact, all-in-one security gateway designed for small businesses. It combines firewall, VPN, antivirus, application visibility and control, URL filtering, email security, and SandBlast ZeroDay Protection in a single device, delivering enterprise-grade protection in a form factor suited for smaller networks.
Q: Which features make the 1590 suitable for small offices?
A: The appliance offers powerful threat prevention, easy deployment, centralized management, and a broad set of protections—without the complexity of large enterprise deployments. It supports scalable policies, quick licensing, and straightforward maintenance, keeping security strong while reducing administrative overhead.
Q: How does SandBlast ZeroDay Protection work on this device?
A: SandBlast ZeroDay Protection uses advanced sandboxing and threat intelligence to detect and block zero-day exploits and unknown malware. By analyzing suspicious files and traffic in a secure environment, it prevents novel threats from reaching endpoints and users.
Q: Can the 1590 handle multiple VPN tunnels and remote users?
A: Yes. The appliance is designed to support site-to-site and remote access VPN connections, providing encrypted tunnels for remote workers and distributed offices while maintaining performance for business-critical applications.
Q: What kind of management is used to configure and monitor the 1590?
A: The 1590 is managed through a centralized, intuitive management console that offers policy templates, clear dashboards, and continuous monitoring. This reduces the time to deploy, simplifies ongoing administration, and provides visibility across users, applications, and traffic.
Q: Is the 1590 suitable for upgrades and scaling?
A: Yes. The appliance is designed to adapt as your network grows, with scalable security policies and modular protection layers that can be adjusted to meet increasing bandwidth, user counts, and protection requirements without replacing the core hardware.
Customer reviews
Showing - Of Reviews