How are Check Point Software Blades deployed?
Software Blades can be deployed on Check Point UTM-1 and Power-1 appliances, open servers and within virtualized environments. New blades can be added simply enabling their functionality in software; no additional hardware, firmware or drivers are necessary. This enables organizations to deploy security dynamically, as needed, with lower total cost of deployment.