Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
The HP TippingPoint NGFW S1050F features 500 Mbps throughput and 250,000 concurrent connections for use in branch network deployments. The HP TippingPoint NGFW S3010F and 3020F feature 1 Gbps / 2 Gbps throughput and 500,000 / 1,000,000 concurrent connections for use in branch and campus network deployments -- and the HP TippingPoint NGFW S8005F and S8010F feature 5 Gbps / 10 Gbps throughput and 10 / 20 million concurrent connections for use in core and data center network deployments.
The firewall appliances leverage the same HP TippingPoint Security Management System (SMS) that manages the HP TippingPoint Next-Generation Intrusion Pevention System (NGIPS), allowing them to be centrally managed from the network edge to the data center.
"In a world where personal mobile devices dominate the workplace and organizations have less control of network access points, security solutions must extend protection beyond the perimeter to disrupt the adversary on all fronts," Rob Greer, vice president and general manager for Enterprise Security Products, TippingPoint, HP, said in a statement [PDF]. "The introduction of the HP TippingPoint Next-Generation Firewall is a natural extension of our leading network solutions portfolio, enabling us to stop the attacks at every control point across and beyond the enterprise network."
The company also introduced HP Threat Central, a security intelligence platform designed to help organizations collaborate in real time to share threat data, analysis and mitigations in order to combat cyber threats. The solution is currently being piloted with a group of HP ArcSight ESM customers.
"Adversaries today organize around an underground marketplace for sharing resources and techniques to mount increasingly advanced attacks that cause extensive damage to organizations around the globe," Jacob West, chief technology officer for Enterprise Security Products at HP, said in a statement [PDF]. "To combat collaborative attackers, enterprises must join together by sharing targeted intelligence confidentially and in real time to create a unified industry defense."