Virtual Event Now Live: Zero Trust Strategies Summit! - Login for Access
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Check Point Launches New DDoS Protection Appliances

Internet security firm Check Point Software Technologies today introduced a new line of security appliances designed to provide multi-layered DDoS protection to help organizations defend against a wide range of Distributed Denial of Service (DDoS) attacks.

The new “DDoS Protector” line of appliances come in seven models that offer throughput ranging from 500Mbps to 12 Gbps. Additionally, the appliances are integrated with the Check Point management suite, giving users a single point of control and a full view of security events.

Internet security firm Check Point Software Technologies today introduced a new line of security appliances designed to provide multi-layered DDoS protection to help organizations defend against a wide range of Distributed Denial of Service (DDoS) attacks.

The new “DDoS Protector” line of appliances come in seven models that offer throughput ranging from 500Mbps to 12 Gbps. Additionally, the appliances are integrated with the Check Point management suite, giving users a single point of control and a full view of security events.

CheckPoint DDoS Protector AppliancesThe Check Point DDoS Protector appliances come as a result of a strategic partnership with Radware, and are based on Radware’s Attack Mitigation System (AMS). The appliances protect organizations by blocking many attack types, including network floods, server floods, application layer DoS attacks, as well as low-and-slow attacks.

The new product line provides customers with multi-layered protections including:

Network and Traffic Flood Protections

Behavioral DoS – Protects against TCP, UDP, ICMP, IGMP and Fragment DDoS attacks with adaptive behavioral based detection.

DoS Shield – Protects against known DDoS attack tools with pre-defined and customized filters to block rate-limits per pattern.

SYN Protection – Blocks SYN-spoofed DoS with SYN rate thresholds per protected servers.

Black List – Blocks generic attacks with L3 and L4 source-destination classifications and expiration rules.

Advertisement. Scroll to continue reading.

Connection Rate Limit – Blocks generic, non-supported protocols (non DNS, HTTP) and application level flood attacks with rate-based thresholds.

Application Based DDoS Protections

SYN Protection with Web Challenge – Protects against HTTP connection-based DoS attacks with SYN rate threshold per protected server.

Behavioral DNS Protections – Block DNS query DoS attacks with DNS adaptive behavioral based detection using DNS footprint blocking rate limits and DNS challenge and response.

Behavioral HTTP Protections (The “HTTP Mitigator”) – Blocks HTTP connection-based DoS attacks and upstream HTTP bandwidth attacks with server-based HTTP adaptive behavioral detection, HTTP footprint with web challenge.

Directed Application DoS/DDoS Protections – These repel DoS and DDoS attacks that require special filtering criteria. Flexible filtering definitions search for specific content patterns in each packet, and can analyze and block ongoing attacks by defining on-the-fly protections.

In terms of deployment, the DDoS Protector appliance sits in front of an organization’s perimeter gateway and scrubs the traffic from DDoS attacks before it reaches the main security gateway.

“The DDoS Protector appliance line marks our entrance into a new and critical area of network security,” said Dorit Dor, vice president of products at Check Point Software Technologies. “As the prevalence of DDoS attacks on enterprises continues to rise, it’s important to enable our customers to protect themselves and mitigate one of the biggest security risks across today’s threat landscape.”

The new Check Point DDoS Protector appliance line is available immediately.

Related ReadingDDoS Attacks – Size Doesn’t Matter, Says Radware

Related ReadingFortinet Launches DDoS Protection Appliances

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is founder and director of several leading cybersecurity industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Threat intelligence firm Intel 471 has appointed Mark Huebeler as its COO and CFO.

Omkhar Arasaratnam, former GM at OpenSSF, is LinkedIn's first Distinguised Security Engineer

Defense contractor Nightwing has appointed Tricia Fitzmaurice as Chief Growth Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.