Network Security & Firewalls

Items 43 to 48 of 3292 total

Set Descending Direction
per page

Grid  List 

  • Barracuda 910 Web Filter Firewall - 1 x 10/100/1000Base-T

    The Barracuda 910 Web Filter Firewall is a complete content filtering and application blocking solution designed to enforce acceptable Internet usage policies. The Barracuda Web Filter includes powerful, award-winning spyware and virus protection. With no per user license fees, the Barracuda Web Filter offers the most affordable content and spyware protection available.

    Learn More
    $42,531.41

  • Check Point DDoS Protector - 10GBase-X - 10 Gigabit Ethernet - 24 Total Expansion Slots - 2U - Rack-mountable

    DDOS ATTACKS ARE ON THE RISE

    In today's info-security threat landscape, denial-of-service and distributed denial-ofservice (DoS/DDoS) attacks are a major cause of network downtime. Whether executed by hacktivists to draw attention to a cause, fraudsters trying to illegally obtain data or funds, or a result of geopolitical events, DDoS attacks are a destructive cyber weapon. Governments, utilities, financial services and commercial institutions face daily attacks.

    Preparing for "common" DDoS attacks is no longer enough. Thanks to the growing array of online marketplaces, it is now possible for hackers to wreak havoc with virtually no knowledge of computer programming or networks. Attack tools and services are easy to access, making the pool of possible assaults larger than ever.

    With Burst attacks and Advanced Persistent DDoS campaigns, hackers launch multivector, blended campaigns with high volume network vectors with more sophisticated application-layer attacks. In addition, recent IoT threats spawned the largest DDoS attack in history, propelling the industry into the 1Tbps DDoS era.

    With these new threats, it is critical to ensure your DDoS mitigation solution can protect your organization and customers from today and tomorrow's sophisticated attacks.

    INTEGRATED ON PREMISES AND CLOUD DDOS PROTECTION

    DDoS Protector is part of Check Point's Attack Mitigation Solution and is an awardwinning, real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.

    DDoS Protector provides the industry's most advanced, automated protection from fastmoving threats, including from recent IoT based attacks such as Mirai. It is uniquely built to overcome both the complexity and scale of today's sophisticated IoT-based botnets. DDoS Protector also helps organizations win the ongoing security battle against availability attacks, by detecting and mitigating known and zero-day DoS/DDoS attacks in real-time. It protects against other security threats that are usually undetected by traditional DDoS mitigation tools, such as SSL-based flood attacks, attacks on login pages and attacks behind CDNs.

    With DDoS Protector, Check Point's attack mitigation solution offers protection with the shortest mitigation time and broadest attack coverage. Check Point provides a hybrid solution combining on premise and cloud-based mitigation tools in a single integrated solution, designed to optimally block multiple attack vectors occurring in parallel.

    WHY DDOS PROTECTOR?

    DDoS Protector includes a comprehensive set of four essential security modules - anti-DDoS, network behavioral analysis (NBA), intrusion prevention system (IPS) and SSL-attack protection - to fully protect the application infrastructure against known and emerging network security attacks. It employs multiple detection and mitigation modules, including adaptive behavioral analysis, challenge response technologies and signature detection.

    Compared to standalone solutions, the synergy of multiple security modules on a single, hardware-accelerated platform enables effective protection against attackers who seek to systematically compromise business assets while providing unified reporting, forensics and compliance.

    Learn More
    $359,979.53

  • Check Point DDoS Protector - 6 Port - 10GBase-X, 10/100/1000Base-T - 10 Gigabit Ethernet - 6 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable

    DDOS ATTACKS ARE ON THE RISE

    In today's info-security threat landscape, denial-of-service and distributed denial-ofservice (DoS/DDoS) attacks are a major cause of network downtime. Whether executed by hacktivists to draw attention to a cause, fraudsters trying to illegally obtain data or funds, or a result of geopolitical events, DDoS attacks are a destructive cyber weapon. Governments, utilities, financial services and commercial institutions face daily attacks.

    Preparing for "common" DDoS attacks is no longer enough. Thanks to the growing array of online marketplaces, it is now possible for hackers to wreak havoc with virtually no knowledge of computer programming or networks. Attack tools and services are easy to access, making the pool of possible assaults larger than ever.

    With Burst attacks and Advanced Persistent DDoS campaigns, hackers launch multivector, blended campaigns with high volume network vectors with more sophisticated application-layer attacks. In addition, recent IoT threats spawned the largest DDoS attack in history, propelling the industry into the 1Tbps DDoS era.

    With these new threats, it is critical to ensure your DDoS mitigation solution can protect your organization and customers from today and tomorrow's sophisticated attacks.

    INTEGRATED ON PREMISES AND CLOUD DDOS PROTECTION

    DDoS Protector is part of Check Point's Attack Mitigation Solution and is an awardwinning, real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.

    DDoS Protector provides the industry's most advanced, automated protection from fastmoving threats, including from recent IoT based attacks such as Mirai. It is uniquely built to overcome both the complexity and scale of today's sophisticated IoT-based botnets. DDoS Protector also helps organizations win the ongoing security battle against availability attacks, by detecting and mitigating known and zero-day DoS/DDoS attacks in real-time. It protects against other security threats that are usually undetected by traditional DDoS mitigation tools, such as SSL-based flood attacks, attacks on login pages and attacks behind CDNs.

    With DDoS Protector, Check Point's attack mitigation solution offers protection with the shortest mitigation time and broadest attack coverage. Check Point provides a hybrid solution combining on premise and cloud-based mitigation tools in a single integrated solution, designed to optimally block multiple attack vectors occurring in parallel.

    WHY DDOS PROTECTOR?

    DDoS Protector includes a comprehensive set of four essential security modules - anti-DDoS, network behavioral analysis (NBA), intrusion prevention system (IPS) and SSL-attack protection - to fully protect the application infrastructure against known and emerging network security attacks. It employs multiple detection and mitigation modules, including adaptive behavioral analysis, challenge response technologies and signature detection.

    Compared to standalone solutions, the synergy of multiple security modules on a single, hardware-accelerated platform enables effective protection against attackers who seek to systematically compromise business assets while providing unified reporting, forensics and compliance.

    Learn More
    $123,706.33

  • Check Point Smart-1 405 Network Security/Firewall Appliance - 5 Port - 10/100/1000Base-T - Gigabit Ethernet - 5 x RJ-45 - 1U - Rack-mountable

    Check Point Smart-1 security management appliances realize Check Point Infinity security architecture, featuring consolidated security management in a single scalable appliance for superior threat visibility and control across Networks, Cloud and Mobile. Check Point Smart-1 appliances are designed to optimally manage Check Point's high-performance security gateways, enabling effective security management to keep you protected against any threat, anytime and anywhere.

    Benefits

    New security management platforms for policy segregation, log and threat analysis

    • Five new security management appliances to centrally manage Check Point security gateways
    • Greater policy segregation with up to 200 independent security domains
    • One-stop security management and monitoring for consolidated security with Firewall, IPS, Anti-Virus, Anti-Bot, Threat Emulation, URL Filtering and Application Control
    Detect threats in real time with advanced log and event analytic tools
    • Up to 44,000 logs per second with real-time indexing for immediate search results
    • Leverage Next Generation SmartEvent for generating views and reports in seconds
    • Facilitate forensic investigation with up to 24TB of internal storage
    Enterprise-grade scalable platform for business-critical networks
    • Wide variety of networking options including 1GbE and 10GbE and SAN interfaces
    • Maintain business continuity with redundant, hot-swappable power supplies, fans and hard drives
    Features

    Consolidated and Comprehensive Security Management

    Smart-1 appliances consolidate security, log, and event management into a single dedicated management appliance and a unified management console for one-stop security management and monitoring. From SmartConsole, an administrator can define and monitor security policies across multiple security functions including Firewall, IPS, Anti-Virus, Anti-Bot, Threat Emulation, URL Filtering, and Application control.

    Smart-1 Appliances provide central security management and the ability to view logs, track events, view reports and monitor security and network activity, see trends, and centrally distribute signatures and software updates.

    Organizations seeking to optimize their security management can leverage the Compliance Software Blade on their Smart-1 Appliances. Security best practices provided by the Compliance Software Blade deliver continuous feedback to organizations to help them ensure that gateways and Software Blades are configured and managed correctly. The Compliance Software Blade simulates the security impact of configuration or policy changes before installation, and provides real-time notifications to administrators alerting them to potential risks. The Compliance Software Blade provides a valuable tool for organizations seeking to consolidate their security management and stay on top of your security posture.

    Multi-Domain Security Management

    Smart-1 Appliances allow IT administrators to segment security management into as many as 200 independent domains. Easily create domains based on geography, business unit or security function to strengthen security and simplify management by segregating administration and policies.

    Smart-1 Appliances with Multi-Domain Log Management host log files in segregated domains and improve performance by isolating log traffic from management traffic.

    Learn More
    $7,039.26

  • Check Point Quantum 6000-XL Network Security Appliance - Security Management - 4 Port - 1000Base-T - Gigabit Ethernet - 4 x RJ-45 - 2U - Rack-mountable

    All-in-one security management solution, with integrated policy management, threat visibility and orchestration, enabling security consolidation across any IT environment.

    • Scalable Management on Demand
    • Faster Response to Threats
    • Efficient Security Operations


    R81 | SmartEvent | Compliance | Multi-domain Management | Automation

    Growing networks, disruptive technologies, and the proliferation of interconnected devices demand a new approach to managing security. Check Point Infinity architecture consolidates management of multiple security layers, providing superior policy efficiency and enabling you to manage security through a single pane of glass. The single management centrally correlates all types of events across all network environments, cloud services and mobile infrastructures.

    The Quantum Smart-1 6000-L | 6000-XL dedicated appliances are optimized for performance and scalability with both hardware and OS (operating system) hardened from the core.

    Smart-1 security management platforms double management capacity and boost performance, increasing security efficiency.

    Key Features and Benefits

    • Scale the number of managed gateways on demand
    • Respond to threats quickly with real-time event investigation, compliance, and reporting
    • Faster system response and load time with increased memory (RAM) by 50% and new SSD


    Unified Console to Manage Everything

    With one console, security teams can manage all aspects of security from policy to threat prevention - across the entire organization - on both physical and virtual environments. Consolidated management means increased operational efficiency.

    In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. Access, controlled in one policy.

    Reports & Compliance

    Take control and monitor all your gateways in real time. Easily generate and schedule reports. Over 300 Security Best Practices, regulatory compliance checks.

    Security Efficient Operations and APIs

    Improve productivity with automation API that orchestrates workflows and aligns security with IT processes and systems.

    Real Time Integrated Threat Management

    For deep forensic analysis, we've integrated logging, monitoring, events, governance and compliance. R81 SmartConsole gives you full visibility and control across your network.

    Multi-domain Management

    Easily manage hundreds of private networks within the same infrastructure and create up to 200 domains based on geography, business unit or security function.

    Modular and Scalable

    Manage thousands of simultaneous sources, thousands of rules and millions of transactions with up to 48 TB of data storage in a single machine.

    Modular platform supporting up to 192 or 384GB RAM and 48TB of storage for any deployment environment.

    Learn More
    $119,090.00

  • Check Point Quantum 6000-XL Network Security Appliance - Security Management - 4 Port - 1000Base-T - Gigabit Ethernet - 4 x RJ-45 - 2U - Rack-mountable

    All-in-one security management solution, with integrated policy management, threat visibility and orchestration, enabling security consolidation across any IT environment.

    • Scalable Management on Demand
    • Faster Response to Threats
    • Efficient Security Operations


    R81 | SmartEvent | Compliance | Multi-domain Management | Automation

    Growing networks, disruptive technologies, and the proliferation of interconnected devices demand a new approach to managing security. Check Point Infinity architecture consolidates management of multiple security layers, providing superior policy efficiency and enabling you to manage security through a single pane of glass. The single management centrally correlates all types of events across all network environments, cloud services and mobile infrastructures.

    The Quantum Smart-1 6000-L | 6000-XL dedicated appliances are optimized for performance and scalability with both hardware and OS (operating system) hardened from the core.

    Smart-1 security management platforms double management capacity and boost performance, increasing security efficiency.

    Key Features and Benefits

    • Scale the number of managed gateways on demand
    • Respond to threats quickly with real-time event investigation, compliance, and reporting
    • Faster system response and load time with increased memory (RAM) by 50% and new SSD


    Unified Console to Manage Everything

    With one console, security teams can manage all aspects of security from policy to threat prevention - across the entire organization - on both physical and virtual environments. Consolidated management means increased operational efficiency.

    In addition to a unified console, you also now have a unified policy to manage everything from users to data to gateways. Access, controlled in one policy.

    Reports & Compliance

    Take control and monitor all your gateways in real time. Easily generate and schedule reports. Over 300 Security Best Practices, regulatory compliance checks.

    Security Efficient Operations and APIs

    Improve productivity with automation API that orchestrates workflows and aligns security with IT processes and systems.

    Real Time Integrated Threat Management

    For deep forensic analysis, we've integrated logging, monitoring, events, governance and compliance. R81 SmartConsole gives you full visibility and control across your network.

    Multi-domain Management

    Easily manage hundreds of private networks within the same infrastructure and create up to 200 domains based on geography, business unit or security function.

    Modular and Scalable

    Manage thousands of simultaneous sources, thousands of rules and millions of transactions with up to 48 TB of data storage in a single machine.

    Modular platform supporting up to 192 or 384GB RAM and 48TB of storage for any deployment environment.

    Learn More
    $156,883.23

Items 43 to 48 of 3292 total

Set Descending Direction
per page

Grid  List