Features
Multi-layer Protection Against DDoS Attacks
Armed with sophisticated technologies and advanced DoS detection and prevention techniques, the Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including:
High Performance
The wide range of DDoS Protector appliances provides up to 40Gbps capacity for full network traffic inspection and protection, with dedicated hardware acceleration against DDoS attacks that can block high packets-per-second attacks that overuse the CPU resources of networking and security equipment. Excellent user response time is maintained even when under attack - there's no need to risk compromising on legitimate user access when DDoS attacks occur.
Protection Against Network-Based Attacks
Effectively identify and stop brute-force flood attacks at the network level.
Overwhelming the network resources with a large-scale botnet to shut down its normal services is an old, yet still effective method for launching network flood attacks. The Check Point DDoS Protector can quickly identify and mitigate these types of network flood attacks.
Flexible Deployment Options
With seven models to choose from, Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed inline locally, through an ISP, or both.
Accurate Attack Prevention
The DDoS Protector has the ability to differentiate between a sudden flash traffic and a real DDoS attack, and uses a real-time behavioral signature created on-the-fly to mitigate DDoS attacks. The DDoS Protector allows legitimate spikes in traffic that simpler rate-based technologies would block.
Integrated Security Management
Check Point's unified security management solution includes:
SmartEvent
Unified security and analysis solution that delivers real-time threat management information to instantly stop threats and block attacks with on-the-fly protections. Move from business view to forensics in just three clicks.
SmartLog
Advanced log analyzer that delivers proactive security intelligence with split-second search results from any log field for instant visibility into billions of log records over multiple time periods and domains.
SmartView Tracker
Comprehensive auditing solution to troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. In the case of an attack or other suspicious network activity, use SmartView Tracker to temporarily or permanently terminate connections from specific IP addresses.