DDOS PROTECTOR 20-2 APPL DDOS BEHAVIORAL PROTECTION & IPS

by
CHECK POINT
PCN#
7PR994
MFG#
CPAP-DP20-2-SME
$107,576.85
  Free Shipping
Estimated Shipment:

Calculating Shipping

Product Highlights:
  • 10GBase
  • X
  • 10 Gigabit Ethernet

Show more

Product Condition: New and Factory Fresh
Shipping Weight: 1 lbs.
Check Point DP 20 Network Security Appliance
Tech Specs
Specifications

Manufacturer

Check Point Software Technologies, Ltd

Manufacturer Part Number

CPAP-DP20-2-SME

Manufacturer Website Address

http://www.checkpoint.com

Brand Name

Check Point

Product Series

DP

Product Model

20

Product Name

DP 20 Network Security Appliance

Marketing Information

DDOS ATTACKS ARE ON THE RISE

In today's info-security threat landscape, denial-of-service and distributed denial-ofservice (DoS/DDoS) attacks are a major cause of network downtime. Whether executed by hacktivists to draw attention to a cause, fraudsters trying to illegally obtain data or funds, or a result of geopolitical events, DDoS attacks are a destructive cyber weapon. Governments, utilities, financial services and commercial institutions face daily attacks.

Preparing for "common" DDoS attacks is no longer enough. Thanks to the growing array of online marketplaces, it is now possible for hackers to wreak havoc with virtually no knowledge of computer programming or networks. Attack tools and services are easy to access, making the pool of possible assaults larger than ever.

With Burst attacks and Advanced Persistent DDoS campaigns, hackers launch multivector, blended campaigns with high volume network vectors with more sophisticated application-layer attacks. In addition, recent IoT threats spawned the largest DDoS attack in history, propelling the industry into the 1Tbps DDoS era.

With these new threats, it is critical to ensure your DDoS mitigation solution can protect your organization and customers from today and tomorrow's sophisticated attacks.

INTEGRATED ON PREMISES AND CLOUD DDOS PROTECTION

DDoS Protector is part of Check Point's Attack Mitigation Solution and is an awardwinning, real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.

DDoS Protector provides the industry's most advanced, automated protection from fastmoving threats, including from recent IoT based attacks such as Mirai. It is uniquely built to overcome both the complexity and scale of today's sophisticated IoT-based botnets. DDoS Protector also helps organizations win the ongoing security battle against availability attacks, by detecting and mitigating known and zero-day DoS/DDoS attacks in real-time. It protects against other security threats that are usually undetected by traditional DDoS mitigation tools, such as SSL-based flood attacks, attacks on login pages and attacks behind CDNs.

With DDoS Protector, Check Point's attack mitigation solution offers protection with the shortest mitigation time and broadest attack coverage. Check Point provides a hybrid solution combining on premise and cloud-based mitigation tools in a single integrated solution, designed to optimally block multiple attack vectors occurring in parallel.

WHY DDOS PROTECTOR?

DDoS Protector includes a comprehensive set of four essential security modules - anti-DDoS, network behavioral analysis (NBA), intrusion prevention system (IPS) and SSL-attack protection - to fully protect the application infrastructure against known and emerging network security attacks. It employs multiple detection and mitigation modules, including adaptive behavioral analysis, challenge response technologies and signature detection.

Compared to standalone solutions, the synergy of multiple security modules on a single, hardware-accelerated platform enables effective protection against attackers who seek to systematically compromise business assets while providing unified reporting, forensics and compliance.

Product Type

Network Security Appliance
Technical Information

Firewall Protection Supported

  • Distributed Denial of Service (DDoS)
  • Botnet Detection
  • Denial of Service (DoS)
  • FloodGuard
  • SSL Decryption
  • SSL Encrypted Traffic Protection
  • Zero Day Event
  • Network Attack Detection

Encryption Standard

  • SSL
  • TLS

Connectivity Technology

Wired
Network & Communication

Ethernet Technology

10 Gigabit Ethernet

Network Standard

10GBase-X
I/O Expansions

Total Number of Expansion Slots

24.0

Expansion Slot Type

SFP+

Number of SFP+ Slots

24
Management & Protocols

Manageable

Yes
Power Description

Frequency

  • 50 Hz
  • 60 Hz

Power Consumption

320 W
Physical Characteristics

Compatible Rack Unit

2U

Form Factor

Rack-mountable

Height

3.5"

Width

17.2"

Depth

18.9"

Weight (Approximate)

29.10 lb
Miscellaneous

Package Contents

  • DP 20 Network Security Appliance
  • 2 x Hot-Swappable PSU

Application/Usage

  • Data Center
  • Network

Certifications & Standards

  • ISO 27001
  • ISO 27017
  • ISO 27018
  • ISO 27032
  • cTUVus
  • EN/IEC 60950-1 (CB)
  • CCC
  • IEC 60950-1
  • GB4943
  • CNS 14336
  • UL/TUV
  • FCC (USA)
  • IC (Canada)
  • CE (Europe)
  • UKCA (UK)
  • RCM (Australia/ NZ)
  • VCCI (Japan)
  • KCC (Korea)
  • EAC(Russia)
  • CCC (China)
  • BSMI (Taiwan)
  • Anatel (Brazil)
  • NOM (Mexico)