Check Point DDoS Protector Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 12Gbps of performance.
Modern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend the company's security perimeters to block destructive DDoS attacks before they cause damage.
Armed with sophisticated technologies and advanced DoS detection and prevention techniques, Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including:
>> Non-vulnerability-based attacks that misuse server resources, such as Application DoS HTTP , SIP, and other flood attacks
>> DoS/DDoS flood attacks that misuse network bandwidth resources
>> Rapid response and real-time update of custom filters to protect against emerging attacks
>> Real-time signatures are generated for each attack pattern, using up to 20 different parameters
>> Block attacks without blocking legitimate user traffic
>> Intelligent flash traffic detection sees the difference between legitimate spikes in traffic and attacks
Wide range of DDoS Protector appliances provides up to 12Gbps capacity for full network traffic inspection and protection, with dedicated hardware acceleration against DDoS attacks.
Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed locally, through an ISP, or both.
Effectively identify and stop brute-force flood attacks at the network level.
Check Point unified security management system simplifies critical management activities with a real-time threat analysis tool, an advanced log analyzer and comprehensive auditing and reporting all from a single console.
>> Behavioral protection base-lining multiple elements and blocking abnormal traffic
>> Automatically generated and pre-defined signatures
>> Using advanced challenge/response techniques
>> Automatically defends against network flood and application layer attacks
>> Customized protection optimized to meet specific network environment and security needs
>> Quickly filters traffic before it reaches the firewall to protect networks, servers and block exploits
>> Appliances easily fit into existing network topology (layer-2 bridge)
>> Ready to protect any size network in minutes
>> A family of 7 new appliances offering:
>> Low-latency (less than 60 microseconds)
>> High-performance (up to 12 Gbps)
>> Port density of up to 16 ports (12x1GbE and 4x10GbE)
>> Leverage SmartEvent, SmartLog and SmartView Tracker for real-time and historic view of overall network security and DDoS attack status
>> Standalone policy management with both Web UI and command line interface
>> Team of security experts provide immediate response during DoS attacks