Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Check Point Launches New DDoS Protection Appliances

Internet security firm Check Point Software Technologies today introduced a new line of security appliances designed to provide multi-layered DDoS protection to help organizations defend against a wide range of Distributed Denial of Service (DDoS) attacks.

The new “DDoS Protector” line of appliances come in seven models that offer throughput ranging from 500Mbps to 12 Gbps. Additionally, the appliances are integrated with the Check Point management suite, giving users a single point of control and a full view of security events.

Internet security firm Check Point Software Technologies today introduced a new line of security appliances designed to provide multi-layered DDoS protection to help organizations defend against a wide range of Distributed Denial of Service (DDoS) attacks.

The new “DDoS Protector” line of appliances come in seven models that offer throughput ranging from 500Mbps to 12 Gbps. Additionally, the appliances are integrated with the Check Point management suite, giving users a single point of control and a full view of security events.

CheckPoint DDoS Protector AppliancesThe Check Point DDoS Protector appliances come as a result of a strategic partnership with Radware, and are based on Radware’s Attack Mitigation System (AMS). The appliances protect organizations by blocking many attack types, including network floods, server floods, application layer DoS attacks, as well as low-and-slow attacks.

The new product line provides customers with multi-layered protections including:

Network and Traffic Flood Protections

Behavioral DoS – Protects against TCP, UDP, ICMP, IGMP and Fragment DDoS attacks with adaptive behavioral based detection.

DoS Shield – Protects against known DDoS attack tools with pre-defined and customized filters to block rate-limits per pattern.

SYN Protection – Blocks SYN-spoofed DoS with SYN rate thresholds per protected servers.

Black List – Blocks generic attacks with L3 and L4 source-destination classifications and expiration rules.

Advertisement. Scroll to continue reading.

Connection Rate Limit – Blocks generic, non-supported protocols (non DNS, HTTP) and application level flood attacks with rate-based thresholds.

Application Based DDoS Protections

SYN Protection with Web Challenge – Protects against HTTP connection-based DoS attacks with SYN rate threshold per protected server.

Behavioral DNS Protections – Block DNS query DoS attacks with DNS adaptive behavioral based detection using DNS footprint blocking rate limits and DNS challenge and response.

Behavioral HTTP Protections (The “HTTP Mitigator”) – Blocks HTTP connection-based DoS attacks and upstream HTTP bandwidth attacks with server-based HTTP adaptive behavioral detection, HTTP footprint with web challenge.

Directed Application DoS/DDoS Protections – These repel DoS and DDoS attacks that require special filtering criteria. Flexible filtering definitions search for specific content patterns in each packet, and can analyze and block ongoing attacks by defining on-the-fly protections.

In terms of deployment, the DDoS Protector appliance sits in front of an organization’s perimeter gateway and scrubs the traffic from DDoS attacks before it reaches the main security gateway.

“The DDoS Protector appliance line marks our entrance into a new and critical area of network security,” said Dorit Dor, vice president of products at Check Point Software Technologies. “As the prevalence of DDoS attacks on enterprises continues to rise, it’s important to enable our customers to protect themselves and mitigate one of the biggest security risks across today’s threat landscape.”

The new Check Point DDoS Protector appliance line is available immediately.

Related ReadingDDoS Attacks – Size Doesn’t Matter, Says Radware

Related ReadingFortinet Launches DDoS Protection Appliances

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet