HomeIndexesCheck PointCPAP-DP20-2-SME

Check Point Ddos Protector 20-2 Appliance Ddos Prot IPS

Check Point Check Firewalls and Network Security

Image may not be actual.


Model 20

Manufacturer Part#  CPAP-DP20-2-SME

Provantage Code:  CKP956K

Condition:  Factory New

  • Product Type: Network Security Appliance
  • Ethernet Technology: 10 Gigabit Ethernet
  • Product Series: DP
  • Number of Total Expansion Slots: 24
  • Form Factor: Rack-mountable

Satisfaction Guaranteed

NetworkingNetwork DevicesFirewalls and Network Security

Specifications

Check Point CPAP-DP20-2-SME Specifications

    Ddos Protector 20-2 Appliance Ddos Prot IPS


Overview

    DDOS ATTACKS ARE ON THE RISE

    In today's info-security threat landscape, denial-of-service and distributed denial-ofservice (DoS/DDoS) attacks are a major cause of network downtime. Whether executed by hacktivists to draw attention to a cause, fraudsters trying to illegally obtain data or funds, or a result of geopolitical events, DDoS attacks are a destructive cyber weapon. Governments, utilities, financial services and commercial institutions face daily attacks.

    Preparing for "common" DDoS attacks is no longer enough. Thanks to the growing array of online marketplaces, it is now possible for hackers to wreak havoc with virtually no knowledge of computer programming or networks. Attack tools and services are easy to access, making the pool of possible assaults larger than ever.

    With Burst attacks and Advanced Persistent DDoS campaigns, hackers launch multivector, blended campaigns with high volume network vectors with more sophisticated application-layer attacks. In addition, recent IoT threats spawned the largest DDoS attack in history, propelling the industry into the 1Tbps DDoS era.

    With these new threats, it is critical to ensure your DDoS mitigation solution can protect your organization and customers from today and tomorrow's sophisticated attacks.

    INTEGRATED ON PREMISES AND CLOUD DDOS PROTECTION

    DDoS Protector is part of Check Point's Attack Mitigation Solution and is an awardwinning, real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.

    DDoS Protector provides the industry's most advanced, automated protection from fastmoving threats, including from recent IoT based attacks such as Mirai. It is uniquely built to overcome both the complexity and scale of today's sophisticated IoT-based botnets. DDoS Protector also helps organizations win the ongoing security battle against availability attacks, by detecting and mitigating known and zero-day DoS/DDoS attacks in real-time. It protects against other security threats that are usually undetected by traditional DDoS mitigation tools, such as SSL-based flood attacks, attacks on login pages and attacks behind CDNs.

    With DDoS Protector, Check Point's attack mitigation solution offers protection with the shortest mitigation time and broadest attack coverage. Check Point provides a hybrid solution combining on premise and cloud-based mitigation tools in a single integrated solution, designed to optimally block multiple attack vectors occurring in parallel.

    WHY DDOS PROTECTOR?

    DDoS Protector includes a comprehensive set of four essential security modules - anti-DDoS, network behavioral analysis (NBA), intrusion prevention system (IPS) and SSL-attack protection - to fully protect the application infrastructure against known and emerging network security attacks. It employs multiple detection and mitigation modules, including adaptive behavioral analysis, challenge response technologies and signature detection.

    Compared to standalone solutions, the synergy of multiple security modules on a single, hardware- accelerated platform enables effective protection against attackers who seek to systematically compromise business assets while providing unified reporting, forensics and compliance.

Application/Usage

    Data Center

    Network

Firewall Protection Supported

    Distributed Denial of Service (DDoS)  –  Botnet Detection  –  Denial of Service (DoS)  –  FloodGuard  –  SSL Decryption  –  SSL Encrypted Traffic Protection  –  Zero Day Event  –  Network Attack Detection

Certifications & Standards

    • ISO 27001
    • ISO 27017
    • ISO 27018
    • ISO 27032
    • cTUVus
    • EN/IEC 60950-1 (CB)
    • CCC
    • IEC 60950-1
    • GB4943
    • CNS 14336
    • UL/TUV
    • FCC (USA)
    • IC (Canada)
    • CE (Europe)
    • UKCA (UK)
    • RCM (Australia/ NZ)
    • VCCI (Japan)
    • KCC (Korea)
    • EAC(Russia)
    • CCC (China)
    • BSMI (Taiwan)
    • Anatel (Brazil)
    • NOM (Mexico)

Package Contents

    • DP 20 Network Security Appliance
    • 2 x Hot-Swappable PSU


Specifications

Product NameDdos Protector 20-2 Appliance Ddos Prot IPS
Manufacturer Part NumberCPAP-DP20-2-SME
Product TypeNetwork Security Appliance
Ethernet Technology10 Gigabit Ethernet
Product FamilyDP
Connectivity TechnologyWired
Form FactorRack-mountable
ManageableYes
Network Standard10GBase-X
Compatible Rack Unit2U
Encryption StandardSSL

TLS

Number of Total Expansion Slots24
Number of SFP+ Slots24
Height3.5"
Width17.2"
Depth18.9"
Expansion Slot TypeSFP+
Product SeriesDP
Product Model20
Power Consumption320 W
Frequency50 Hz

60 Hz

Supplies/Accessories for Check Point CPAP-DP20-2-SME

Check Point Ddos Management VL2 Management 2 Ddos Physical 1-Year

Mfg Part# CPAP-DP-VMA-VL2


Considering a Volume Purchase?

Shop with confidence! Provantage is an authorized Check Point dealer.

Visit the Manufacturer
Learn more by visiting the manufacturer's website.

Check Point
 
© Copyright 1984-2024 Provantage
Check Point Model 20 CPAP-DP20-2-SME