Features Multi-layer Protection Against DDoS Attacks Armed with sophisticated technologies and advanced DoS detection and prevention techniques, the Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including: - Non-vulnerability- based attacks that misuse server resources, such as
- Application DoS - HTTP , SIP, and other flood attacks
- DoS/DDoS flood attacks that misuse network bandwidth resources
- Rapid response and real-time update of custom filters to protect against emerging attacks
High Performance The wide range of DDoS Protector appliances provides up to 40Gbps capacity for full network traffic inspection and protection, with dedicated hardware acceleration against DDoS attacks that can block high packets-per-second attacks that overuse the CPU resources of networking and security equipment. Excellent user response time is maintained even when under attack - there's no need to risk compromising on legitimate user access when DDoS attacks occur.
Protection Against Network-Based Attacks Effectively identify and stop brute-force flood attacks at the network level. Overwhelming the network resources with a large-scale botnet to shut down its normal services is an old, yet still effective method for launching network flood attacks. The Check Point DDoS Protector can quickly identify and mitigate these types of network flood attacks.
Flexible Deployment Options With seven models to choose from, Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed inline locally, through an ISP, or both.
Accurate Attack Prevention - Real-time signatures are generated for each attack pattern, using up to 20 different parameters
- Block attacks without blocking legitimate user traffic
- Intelligent flash traffic detection sees the difference between legitimate spikes in traffic and attacks
The DDoS Protector has the ability to differentiate between a sudden flash traffic and a real DDoS attack, and uses a real-time behavioral signature created on-the-fly to mitigate DDoS attacks. The DDoS Protector allows legitimate spikes in traffic that simpler rate-based technologies would block. Integrated Security Management Check Point's unified security management solution includes: SmartEvent Unified security and analysis solution that delivers real-time threat management information to instantly stop threats and block attacks with on-the-fly protections. Move from business view to forensics in just three clicks. SmartLog Advanced log analyzer that delivers proactive security intelligence with split-second search results from any log field for instant visibility into billions of log records over multiple time periods and domains. SmartView Tracker Comprehensive auditing solution to troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. In the case of an attack or other suspicious network activity, use SmartView Tracker to temporarily or permanently terminate connections from specific IP addresses. |