Network Security & Firewalls
-
Check Point DDoS Protector - 10GBase-X - 10 Gigabit Ethernet - 24 Total Expansion Slots - 2U - Rack-mountable
DDOS ATTACKS ARE ON THE RISE
Learn More
In today's info-security threat landscape, denial-of-service and distributed denial-ofservice (DoS/DDoS) attacks are a major cause of network downtime. Whether executed by hacktivists to draw attention to a cause, fraudsters trying to illegally obtain data or funds, or a result of geopolitical events, DDoS attacks are a destructive cyber weapon. Governments, utilities, financial services and commercial institutions face daily attacks.
Preparing for "common" DDoS attacks is no longer enough. Thanks to the growing array of online marketplaces, it is now possible for hackers to wreak havoc with virtually no knowledge of computer programming or networks. Attack tools and services are easy to access, making the pool of possible assaults larger than ever.
With Burst attacks and Advanced Persistent DDoS campaigns, hackers launch multivector, blended campaigns with high volume network vectors with more sophisticated application-layer attacks. In addition, recent IoT threats spawned the largest DDoS attack in history, propelling the industry into the 1Tbps DDoS era.
With these new threats, it is critical to ensure your DDoS mitigation solution can protect your organization and customers from today and tomorrow's sophisticated attacks.
INTEGRATED ON PREMISES AND CLOUD DDOS PROTECTION
DDoS Protector is part of Check Point's Attack Mitigation Solution and is an awardwinning, real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.
DDoS Protector provides the industry's most advanced, automated protection from fastmoving threats, including from recent IoT based attacks such as Mirai. It is uniquely built to overcome both the complexity and scale of today's sophisticated IoT-based botnets. DDoS Protector also helps organizations win the ongoing security battle against availability attacks, by detecting and mitigating known and zero-day DoS/DDoS attacks in real-time. It protects against other security threats that are usually undetected by traditional DDoS mitigation tools, such as SSL-based flood attacks, attacks on login pages and attacks behind CDNs.
With DDoS Protector, Check Point's attack mitigation solution offers protection with the shortest mitigation time and broadest attack coverage. Check Point provides a hybrid solution combining on premise and cloud-based mitigation tools in a single integrated solution, designed to optimally block multiple attack vectors occurring in parallel.
WHY DDOS PROTECTOR?
DDoS Protector includes a comprehensive set of four essential security modules - anti-DDoS, network behavioral analysis (NBA), intrusion prevention system (IPS) and SSL-attack protection - to fully protect the application infrastructure against known and emerging network security attacks. It employs multiple detection and mitigation modules, including adaptive behavioral analysis, challenge response technologies and signature detection.
Compared to standalone solutions, the synergy of multiple security modules on a single, hardware-accelerated platform enables effective protection against attackers who seek to systematically compromise business assets while providing unified reporting, forensics and compliance.$359,979.53 -
Check Point 1430 Network Security/Firewall Appliance - 8 Port - 10/100/1000Base-T - Gigabit Ethernet - Wireless LAN IEEE 802.11ac - AES (128-bit) - 8 x RJ-45 - Desktop, Rack-mountable
Small and remote branch offices need the same protections from sophisticated cyber attacks and zero-day threats as main corporate offices. The Check Point 1400 appliances are ideal for small and branch office deployments, delivering all-in-one advanced threat prevention, flexible network connectivity, and maximum port density-all in a compact, high-performance desktop form factor.
Big security in a compact footprint
- Fully integrated next-generation threat prevention including: firewall, IPS, IPsec VPN, application control, anti-spam, antivirus, anti-bot, URL filtering, email security, and user awareness
- Continuous security updates from Check Point ThreatCloud™
- Compact and quiet desktop form factor
Easy to deploy, centrally managed
- Rapid deployment via an intuitive, web-based management interface and pre-defined security policies
- Large scale, profile-based central management for maintaining hundreds of devices
Extensible security tailored for small and branch offices
- Optimized to deliver up to 1800 Mbps of real-world firewall throughput and up to 220 Mbps of real-world threat prevention throughput
- Flexible Internet access options include 1GbE copper or fiber ports and support for external 3G/4G/LTE wireless modems
- Up to 18 1GbE ports and 802.11ac Wi-Fi connectivity
$795.10 -
Check Point DDoS Protector - 6 Port - 10GBase-X, 10/100/1000Base-T - 10 Gigabit Ethernet - 6 x RJ-45 - 2 Total Expansion Slots - 1U - Rack-mountable
DDOS ATTACKS ARE ON THE RISE
Learn More
In today's info-security threat landscape, denial-of-service and distributed denial-ofservice (DoS/DDoS) attacks are a major cause of network downtime. Whether executed by hacktivists to draw attention to a cause, fraudsters trying to illegally obtain data or funds, or a result of geopolitical events, DDoS attacks are a destructive cyber weapon. Governments, utilities, financial services and commercial institutions face daily attacks.
Preparing for "common" DDoS attacks is no longer enough. Thanks to the growing array of online marketplaces, it is now possible for hackers to wreak havoc with virtually no knowledge of computer programming or networks. Attack tools and services are easy to access, making the pool of possible assaults larger than ever.
With Burst attacks and Advanced Persistent DDoS campaigns, hackers launch multivector, blended campaigns with high volume network vectors with more sophisticated application-layer attacks. In addition, recent IoT threats spawned the largest DDoS attack in history, propelling the industry into the 1Tbps DDoS era.
With these new threats, it is critical to ensure your DDoS mitigation solution can protect your organization and customers from today and tomorrow's sophisticated attacks.
INTEGRATED ON PREMISES AND CLOUD DDOS PROTECTION
DDoS Protector is part of Check Point's Attack Mitigation Solution and is an awardwinning, real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.
DDoS Protector provides the industry's most advanced, automated protection from fastmoving threats, including from recent IoT based attacks such as Mirai. It is uniquely built to overcome both the complexity and scale of today's sophisticated IoT-based botnets. DDoS Protector also helps organizations win the ongoing security battle against availability attacks, by detecting and mitigating known and zero-day DoS/DDoS attacks in real-time. It protects against other security threats that are usually undetected by traditional DDoS mitigation tools, such as SSL-based flood attacks, attacks on login pages and attacks behind CDNs.
With DDoS Protector, Check Point's attack mitigation solution offers protection with the shortest mitigation time and broadest attack coverage. Check Point provides a hybrid solution combining on premise and cloud-based mitigation tools in a single integrated solution, designed to optimally block multiple attack vectors occurring in parallel.
WHY DDOS PROTECTOR?
DDoS Protector includes a comprehensive set of four essential security modules - anti-DDoS, network behavioral analysis (NBA), intrusion prevention system (IPS) and SSL-attack protection - to fully protect the application infrastructure against known and emerging network security attacks. It employs multiple detection and mitigation modules, including adaptive behavioral analysis, challenge response technologies and signature detection.
Compared to standalone solutions, the synergy of multiple security modules on a single, hardware-accelerated platform enables effective protection against attackers who seek to systematically compromise business assets while providing unified reporting, forensics and compliance.$123,706.33 -
Check Point 1450 Network Security/Firewall Appliance - 8 Port - 1000Base-T - Gigabit Ethernet - AES (128-bit) - 8 x RJ-45 - Desktop
THE BRANCH OFFICE CHALLENGE
Learn More
In the age of global business and a more distributed workforce, remote and branch staff demand access to corporate resources in order to work effectively and efficiently. However, even a small data breach can expose companies to crippling lawsuits, penalties and loss of reputation. Branch offices need an inexpensive, yet effective solution to provide secure access to critical resources from anywhere, while minimizing the risk of a data breach.
OUR SOLUTION
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network-the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor.
Setup is done in minutes using our step-by-step configuration wizard. The 1400 Appliances are manageable centrally by means of the Check Point enterprise Security Management or Multi-Domain products.$1,219.20 -
Check Point Smart-1 405 Network Security/Firewall Appliance - 5 Port - 10/100/1000Base-T - Gigabit Ethernet - 5 x RJ-45 - 1U - Rack-mountable
Check Point Smart-1 security management appliances realize Check Point Infinity security architecture, featuring consolidated security management in a single scalable appliance for superior threat visibility and control across Networks, Cloud and Mobile. Check Point Smart-1 appliances are designed to optimally manage Check Point's high-performance security gateways, enabling effective security management to keep you protected against any threat, anytime and anywhere.
BenefitsNew security management platforms for policy segregation, log and threat analysis
- Five new security management appliances to centrally manage Check Point security gateways
- Greater policy segregation with up to 200 independent security domains
- One-stop security management and monitoring for consolidated security with Firewall, IPS, Anti-Virus, Anti-Bot, Threat Emulation, URL Filtering and Application Control
- Up to 44,000 logs per second with real-time indexing for immediate search results
- Leverage Next Generation SmartEvent for generating views and reports in seconds
- Facilitate forensic investigation with up to 24TB of internal storage
- Wide variety of networking options including 1GbE and 10GbE and SAN interfaces
- Maintain business continuity with redundant, hot-swappable power supplies, fans and hard drives
Consolidated and Comprehensive Security Management
Smart-1 appliances consolidate security, log, and event management into a single dedicated management appliance and a unified management console for one-stop security management and monitoring. From SmartConsole, an administrator can define and monitor security policies across multiple security functions including Firewall, IPS, Anti-Virus, Anti-Bot, Threat Emulation, URL Filtering, and Application control.
Smart-1 Appliances provide central security management and the ability to view logs, track events, view reports and monitor security and network activity, see trends, and centrally distribute signatures and software updates.
Organizations seeking to optimize their security management can leverage the Compliance Software Blade on their Smart-1 Appliances. Security best practices provided by the Compliance Software Blade deliver continuous feedback to organizations to help them ensure that gateways and Software Blades are configured and managed correctly. The Compliance Software Blade simulates the security impact of configuration or policy changes before installation, and provides real-time notifications to administrators alerting them to potential risks. The Compliance Software Blade provides a valuable tool for organizations seeking to consolidate their security management and stay on top of your security posture.
Multi-Domain Security ManagementSmart-1 Appliances allow IT administrators to segment security management into as many as 200 independent domains. Easily create domains based on geography, business unit or security function to strengthen security and simplify management by segregating administration and policies.
Smart-1 Appliances with Multi-Domain Log Management host log files in segregated domains and improve performance by isolating log traffic from management traffic.
Learn More$7,039.26 -
Check Point 1470 Network Security/Firewall Appliance - 18 Port - 1000Base-T - Gigabit Ethernet - Wireless LAN IEEE 802.11ac - AES (128-bit) - 18 x RJ-45 - 1 Total Expansion Slots - Desktop
THE BRANCH OFFICE CHALLENGE
Learn More
In the age of global business and a more distributed workforce, remote and branch staff demand access to corporate resources in order to work effectively and efficiently. However, even a small data breach can expose companies to crippling lawsuits, penalties and loss of reputation. Branch offices need an inexpensive, yet effective solution to provide secure access to critical resources from anywhere, while minimizing the risk of a data breach.
OUR SOLUTION
The Check Point 1400 Appliance family is a simple, affordable and easy to deploy all-in-one solution for delivering industry leading security to protect the weakest link in your enterprise network-the remote branch offices. Protect against cyber threats with Check Point Threat Prevention all in a quiet, compact desktop form factor.
Setup is done in minutes using our step-by-step configuration wizard. The 1400 Appliances are manageable centrally by means of the Check Point enterprise Security Management or Multi-Domain products.$2,063.91