Business | Canvas

Check Point - DDoS Protector Appliances Services

Contact Us
Check Point DDoS Protector Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 12Gbps of performance.
Modern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company's security perimeters to block destructive DDoS attacks before they cause damage.

Features

Multi-layer Protection Against DDoS Attacks

Armed with sophisticated technologies and advanced DoS detection and prevention techniques, Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including:
Non-vulnerability-based attacks that misuse server resources, such as Application DoS HTTP , SIP, and other flood attacks
DoS/DDoS flood attacks that misuse network bandwidth resources
Rapid response and real-time update of custom filters to protect against emerging attacks

Accurate Attack Prevention

Real-time signatures are generated for each attack pattern, using up to 20 different parameters
Block attacks without blocking legitimate user traffic
Intelligent flash traffic detection sees the difference between legitimate spikes in traffic and attacks

High Performance

Wide range of DDoS Protector appliances provides up to 12Gbps capacity for full network traffic inspection and protection, with dedicated hardware acceleration against DDoS attacks.

Flexible Deployment Options

Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed locally, through an ISP, or both.

Protection Against Network-Based Attacks

Effectively identify and stop brute-force flood attacks at the network level.

Integrated Security Management

Check Point unified security management system simplifies critical management activities with a real-time threat analysis tool, an advanced log analyzer and comprehensive auditing and reporting all from a single console.

Benefits

Blocks a wide range of attacks with customized multi-layered protection

Behavioral protection base-lining multiple elements and blocking abnormal traffic
Automatically generated and pre-defined signatures
Using advanced challenge/response techniques

Fast response time protects against attacks within seconds

Automatically defends against network flood and application layer attacks
Customized protection optimized to meet specific network environment and security needs
Quickly filters traffic before it reaches the firewall to protect networks, servers and block exploits

Flexible deployment options to protect any business

Appliances easily fit into existing network topology (layer-2 bridge)
Ready to protect any size network in minutes
A family of 7 new appliances offering:
Low-latency (less than 60 microseconds)
High-performance (up to 12 Gbps)
Port density of up to 16 ports (12x1GbE and 4x10GbE)

Integrated with Check Point Security Management

Leverage SmartEvent, SmartLog and SmartView Tracker for real-time and historic view of overall network security and DDoS attack status
Standalone policy management with both Web UI and command line interface
Team of security experts provide immediate response during DoS attacks