Check Point DDoS Protector
Check Point DDoS Protector
SKU: 1027425119 MFR: Check Point Software Technologies Ltd
Product Description
Check Point DDoS Protector - 4 Port - 1000Base-T 1000Base-X - Gigabit Ethernet - 4 x RJ-45 - 2 Total Expansion Slots
Manufacturer : Check Point Software Technologies Ltd
Manufacturer Part No : CPAP-DP2006DC-D-SME
Features
- Quickly set up a secure network with 4 ports Firewall
- Gigabit Ethernet port for ultra-fast network speeds
Product Details
Features
Multi-layer Protection Against DDoS Attacks
Armed with sophisticated technologies and advanced DoS detection and prevention techniques the Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including:
- Non-vulnerability-based attacks that misuse server resources such as
- Application DoS - HTTP SIP and other flood attacks
- DoS/DDoS flood attacks that misuse network bandwidth resources
- Rapid response and real-time update of custom filters to protect against emerging attacks
High Performance
The wide range of DDoS Protector appliances provides up to 40Gbps capacity for full network traffic inspection and protection with dedicated hardware acceleration against DDoS attacks that can block high packets-per-second attacks that overuse the CPU resources of networking and security equipment. Excellent user response time is maintained even when under attack - there's no need to risk compromising on legitimate user access when DDoS attacks occur.
Protection Against Network-Based Attacks
Effectively identify and stop brute-force flood attacks at the network level.
Overwhelming the network resources with a large-scale botnet to shut down its normal services is an old yet still effective method for launching network flood attacks. The Check Point DDoS Protector can quickly identify and mitigate these types of network flood attacks.
Flexible Deployment Options
With seven models to choose from Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed inline locally through an ISP or both.
Accurate Attack Prevention
- Real-time signatures are generated for each attack pattern using up to 20 different parameters
- Block attacks without blocking legitimate user traffic
- Intelligent flash traffic detection sees the difference between legitimate spikes in traffic and attacks
The DDoS Protector has the ability to differentiate between a sudden flash traffic and a real DDoS attack and uses a real-time behavioral signature created on-the-fly to mitigate DDoS attacks. The DDoS Protector allows legitimate spikes in traffic that simpler rate-based technologies would block.
Integrated Security Management
Check Point's unified security management solution includes:
SmartEvent
Unified security and analysis solution that delivers real-time threat management information to instantly stop threats and block attacks with on-the-fly protections. Move from business view to forensics in just three clicks.
SmartLog
Advanced log analyzer that delivers proactive security intelligence with split-second search results from any log field for instant visibility into billions of log records over multiple time periods and domains.
SmartView Tracker
Comprehensive auditing solution to troubleshoot system and security issues gather information for legal or audit purposes and generate reports to analyze network traffic patterns. In the case of an attack or other suspicious network activity use SmartView Tracker to temporarily or permanently terminate connections from specific IP addresses.
Dropship
Get it by Fri, Dec 13 - Wed, Dec 18
Update
Check Point DDoS Protector - 4 Port - 1000Base-T 1000Base-X - Gigabit Ethernet - 4 x RJ-45 - 2 Total Expansion Slots
Manufacturer : Check Point Software Technologies Ltd
Manufacturer Part No : CPAP-DP2006DC-D-SME
Features
- Quickly set up a secure network with 4 ports Firewall
- Gigabit Ethernet port for ultra-fast network speeds
Product Details
Features
Multi-layer Protection Against DDoS Attacks
Armed with sophisticated technologies and advanced DoS detection and prevention techniques the Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including:
- Non-vulnerability-based attacks that misuse server resources such as
- Application DoS - HTTP SIP and other flood attacks
- DoS/DDoS flood attacks that misuse network bandwidth resources
- Rapid response and real-time update of custom filters to protect against emerging attacks
High Performance
The wide range of DDoS Protector appliances provides up to 40Gbps capacity for full network traffic inspection and protection with dedicated hardware acceleration against DDoS attacks that can block high packets-per-second attacks that overuse the CPU resources of networking and security equipment. Excellent user response time is maintained even when under attack - there's no need to risk compromising on legitimate user access when DDoS attacks occur.
Protection Against Network-Based Attacks
Effectively identify and stop brute-force flood attacks at the network level.
Overwhelming the network resources with a large-scale botnet to shut down its normal services is an old yet still effective method for launching network flood attacks. The Check Point DDoS Protector can quickly identify and mitigate these types of network flood attacks.
Flexible Deployment Options
With seven models to choose from Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed inline locally through an ISP or both.
Accurate Attack Prevention
- Real-time signatures are generated for each attack pattern using up to 20 different parameters
- Block attacks without blocking legitimate user traffic
- Intelligent flash traffic detection sees the difference between legitimate spikes in traffic and attacks
The DDoS Protector has the ability to differentiate between a sudden flash traffic and a real DDoS attack and uses a real-time behavioral signature created on-the-fly to mitigate DDoS attacks. The DDoS Protector allows legitimate spikes in traffic that simpler rate-based technologies would block.
Integrated Security Management
Check Point's unified security management solution includes:
SmartEvent
Unified security and analysis solution that delivers real-time threat management information to instantly stop threats and block attacks with on-the-fly protections. Move from business view to forensics in just three clicks.
SmartLog
Advanced log analyzer that delivers proactive security intelligence with split-second search results from any log field for instant visibility into billions of log records over multiple time periods and domains.
SmartView Tracker
Comprehensive auditing solution to troubleshoot system and security issues gather information for legal or audit purposes and generate reports to analyze network traffic patterns. In the case of an attack or other suspicious network activity use SmartView Tracker to temporarily or permanently terminate connections from specific IP addresses.
Recently Viewed
We’re a veteran-owned small business with full-stack expertise. We’ll help you design, coordinate, and manage technology solutions that will drive your business forward.
- About Us
- Contact Us
- My Account
- Prospective Investors
Quick Links
Contracts
Contact Us
-
6402 Corporate Dr, Suite 103,
Indianapolis, IN 46278 - (317) 243-1750
- sales@tekmentum.com
- Mon-Fri: 8:00am-5:00pm
© 2005-2023, Tekmentum. All Rights Reserved. A KPaul, LLC Company.
- Choosing a selection results in a full page refresh.
- Opens in a new window.