PRTODAY / NewswireToday Free press release distribution service network

Written by / Agency / Source: Check Point Software Technologies Ltd

Check Ads Availability|e-mail Article


Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!

Check Point Fights Denial of Service Attacks with DDoS Protector™ Appliance Line - Dedicated appliances protect companies from distributed denial of service attacks with multi-layered protection and up to 12 Gbps of performance (Nasdaq: CHKP) - CheckPoint.com
Check Point Fights Denial of Service Attacks with DDoS Protector™ Appliance Line

 

NewswireToday - /newswire/ - Redwood City, CA, United States, 2012/06/20 - Dedicated appliances protect companies from distributed denial of service attacks with multi-layered protection and up to 12 Gbps of performance (Nasdaq: CHKP) - CheckPoint.com.

   
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

Check Point® Software Technologies Ltd, the worldwide leader in securing the Internet, today introduced a new line of security appliances designed to fight Distributed Denial of Service (DDoS) attacks. The new DDoS Protector™ appliances deliver multi-layered protection and up to 12 Gbps of throughput to help businesses stop and defend against the widest range of Distributed Denial of Service (DDoS) attacks.

DDoS attacks are attempts to disrupt or disable network services by overloading the network with traffic. Cybercriminals can flood targeted networks with an overwhelming amount of traffic or with a few well-crafted requests to completely interrupt legitimate traffic, causing serious network downtime to businesses that rely on networks and Web services to operate. A recent study conducted by the Ponemon Institute1 found that DDoS attacks rank as one of the top risks among IT practitioners, and in the United States DDoS attacks were the number one concern.

The Check Point DDoS Protector appliance line safeguards organizations by blocking all major attack types such as network floods, server floods, application layer DoS attacks, as well as low-and-slow attacks. The new product line provides customers with multi-layered protections that employ a variety of advanced detection and mitigation techniques, including:

Network and Traffic Flood Protections

• Behavioral DoS—Protects against TCP, UDP, ICMP, IGMP and Fragment DDoS attacks with adaptive behavioral based detection.
• DoS Shield—Protects against known DDoS attack tools with pre-defined and customized filters to block rate-limits per pattern.
• SYN Protection—Blocks SYN-spoofed DoS with SYN rate thresholds per protected servers.
• Black List—Blocks generic attacks with L3 and L4 source-destination classifications and expiration rules.
• Connection Rate Limit—Blocks generic, non-supported protocols (non DNS, HTTP) and application level flood attacks with rate-based thresholds.

Application Based DDoS Protections

• SYN Protection with Web Challenge—Protects against HTTP connection-based DoS attacks with SYN rate threshold per protected server.
• Behavioral DNS Protections—Block DNS query DoS attacks with DNS adaptive behavioral based detection using DNS footprint blocking rate limits and DNS challenge and response.
• Behavioral HTTP Protections (The "HTTP Mitigator")—Blocks HTTP connection-based DoS attacks and upstream HTTP bandwidth attacks with server-based HTTP adaptive behavioral detection, HTTP footprint with web challenge.

Directed Application DoS/DDoS Protections
These repel DoS and DDoS attacks that require special filtering criteria. Flexible filtering definitions search for specific content patterns in each packet, and can analyze and block ongoing attacks by defining on-the-fly protections.

The DDoS Protector appliance sits in front of an organization's perimeter gateway and cleans the traffic from DDoS attacks before it reaches the main security gateway. The appliances are integrated with the Check Point management suite to deliver a single point of control over security and provide full visibility of security events. With Check Point SmartEvent, SmartLog and SmartViewTracker, customers benefit from current and historic views of an organization's overall network security and DDoS attack status.

"The DDoS Protector appliance line marks our entrance into a new and critical area of network security," said Dorit Dor, vice president of products at Check Point Software Technologies. "As the prevalence of DDoS attacks on enterprises continues to rise, it's important to enable our customers to protect themselves and mitigate one of the biggest security risks across today's threat landscape."

Check Point DDoS Protector appliances were developed in conjunction with Radware®, a leading provider of application delivery and application security solutions for virtual and cloud data centers. The DDoS Protector line is comprised of seven models that offer organizations low-latency, high-performance and high port density of up to 16 ports. With ultra-fast response times, the DDoS Protector appliance blocks a wide range of attacks within seconds, and can be easily customized to meet specific network environments and security needs. Check Point customers benefit from 24x7 customer support and access to a dedicated emergency response team.

"Check Point DDoS Protector appliances protect organizations with an additional layer of security to stop DoS attacks in their tracks," concluded Dor.

Availability
The Check Point DDoS Protector appliance line is available for purchase immediately through the Check Point worldwide network of value-added resellers. To find a Check Point partner, visit partners.us.checkpoint.com/partnerlocator/.

About Check Point Software Technologies Ltd
Check Point Software Technologies Ltd (checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

1The Impact of Cybercrime on Business Report is independently conducted by Ponemon Institute, LLC Publication Date: May 2012

 
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

Written by / Agency / Source: Check Point Software Technologies Ltd

 
 

Availability: All Regions (Including Int'l)

 

Traffic Booster: [/] Quick Newswire Today Visibility Checker

 

Distribution / Indexing: [+] / [Company listed above is a registered member of our network. Content made possible by PRZOOM / PRTODAY indexing services]

 
 
# # #
 
IT Security Anti-Spam Computer Security - Purchase keywords tags antivirus software firewall spyware removal virus scan computer security IT Security Anti-Spam malware / Banner Ads!.

 
  Your Banner Ad showing on ALL
IT Security/Anti-Spam articles,
CATCH Visitors via Your Competitors Announcements!


Check Point Fights Denial of Service Attacks with DDoS Protector™ Appliance Line

Company website links NOT available to basic submissions
It is OK to republish and/or LINK any newswire for any legitimate media purpose as long as you name Newswire Today and LINK as the source.
 
  Is this your article?
Activate ALL web links and social stream by Upgrading to Press Release PREMIUM Plan Now!

Check Point® |
Publisher Contact: Press Office - CheckPoint.com 
650-628-2215 press[.]us.checkpoint.com
 
Newswire Today - PRZOOM / PRTODAY disclaims any content contained in this article. If you need/wish to contact the company who published the current release, you will need to contact them - NOT us. Issuers of articles are solely responsible for the accuracy of their content. Our complete disclaimer appears here.
IMPORTANT INFORMATION: Issuance, publication or distribution of this press release in certain jurisdictions could be subject to restrictions. The recipient of this press release is responsible for using this press release and the information herein in accordance with the applicable rules and regulations in the particular jurisdiction. This press release does not constitute an offer or an offering to acquire or subscribe for any Check Point Software Technologies Ltd securities in any jurisdiction including any other companies listed or named in this release.

IT Security/Anti-Spam via RSSAdd NewswireToday - PRZOOM Headline News to FeedBurner
Find who RetweetFollow @NewswireTODAY



Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!


Read Latest Articles From Check Point Software Technologies Ltd / Company Profile


Read IT Security/Anti-Spam Most Recent Related Newswires:

Verint Named Physical Security Intelligence Solutions Company of the Year
Rambus Announces Industry’s First Functional Silicon of Server DIMM Buffer Chipset Targeted for Next-generation DDR5
Verint Recognized in New Customer Journey Analytics Report by Independent Research Firm
High-Tech Bridge Enhances Discovery Capacities of its Phishing Detection Service
Ensono Adds Managed Mainframe to its UK Toolkit
Radware Launches Ultimate IoT Botnet Protection with New DefensePro® Lineup
Comodo Advanced Endpoint Protection Wins ‘APT Software of the Year’ 2017 CyberSecurity Breakthrough Award
Frost & Sullivan Recognizes Radware as a Leader in Customer Value with its Complete Line of DDoS Mitigation Solutions
Ecobank Deploys Radware’s Attack Mitigation Solution to Protect its Infrastructure
Rostelecom Demonstrates On-Demand Transport Services with the First Multivendor Transport SDN PoC in Russia
Ensono Unveils New Office in Conway, Arkansas
Tyne Tunnel Realizes New Levels of Operational Efficiency and Situational Awareness with Verint Solutions
Thales’s Security Evaluation of Samsung Pay Contactless Payment App on Galaxy S8 and S8+ Leads to Certification
Check Point Launches New Research Online Platform and Releases Mid-Year Cyber Attack Trends Report
New Research Supports Think Tank Assertions on Cyber Resilience Planning

Boost Your Social Network
& Crowdfunding Campaigns


LIFETIME SOCIAL MEDIA WALL
NewswireToday Celebrates 10 Years in Business


PREMIUM Members


Visit  La Bella Bakery Artisan Bakery Arizona

Visit  RightITnow Ltd





 
  ©2017 Newswire Today — Limelon Advertising, Co.
Home | About | Advertise/Pricing | Contact | Investors | Privacy/TOS | Sitemap | FRANCAIS
newswire, PR press releases distribution service magazines engine news alert newsroom press room breaking news public relations articles company news alerts newswiredistribution ezine bizentrepreneur biznewstoday digital business report market search pr firms agencies reports distri-bution today investor relation successful internet entrepreneurs newswire distribution prtoday.com freenewswiredistribution asianewstoday bizwiretoday USA pr UK today - NOT affiliated with PRNewswire as we declined their partnership offer in 2013
 
PRTODAY & NewswireTODAY are NOT affiliated with USA TODAY (usatoday.com)