PRTODAY / NewswireToday Free press release distribution service network

Written by / Agency / Source: Check Point Software Technologies Ltd

Check Ads Availability|e-mail Article


Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!

Check Point Fights Denial of Service Attacks with DDoS Protector™ Appliance Line - Dedicated appliances protect companies from distributed denial of service attacks with multi-layered protection and up to 12 Gbps of performance (Nasdaq: CHKP) - CheckPoint.com
Check Point Fights Denial of Service Attacks with DDoS Protector™ Appliance Line

 

NewswireToday - /newswire/ - Redwood City, CA, United States, 2012/06/20 - Dedicated appliances protect companies from distributed denial of service attacks with multi-layered protection and up to 12 Gbps of performance (Nasdaq: CHKP) - CheckPoint.com.

   
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

Check Point® Software Technologies Ltd, the worldwide leader in securing the Internet, today introduced a new line of security appliances designed to fight Distributed Denial of Service (DDoS) attacks. The new DDoS Protector™ appliances deliver multi-layered protection and up to 12 Gbps of throughput to help businesses stop and defend against the widest range of Distributed Denial of Service (DDoS) attacks.

DDoS attacks are attempts to disrupt or disable network services by overloading the network with traffic. Cybercriminals can flood targeted networks with an overwhelming amount of traffic or with a few well-crafted requests to completely interrupt legitimate traffic, causing serious network downtime to businesses that rely on networks and Web services to operate. A recent study conducted by the Ponemon Institute1 found that DDoS attacks rank as one of the top risks among IT practitioners, and in the United States DDoS attacks were the number one concern.

The Check Point DDoS Protector appliance line safeguards organizations by blocking all major attack types such as network floods, server floods, application layer DoS attacks, as well as low-and-slow attacks. The new product line provides customers with multi-layered protections that employ a variety of advanced detection and mitigation techniques, including:

Network and Traffic Flood Protections

• Behavioral DoS—Protects against TCP, UDP, ICMP, IGMP and Fragment DDoS attacks with adaptive behavioral based detection.
• DoS Shield—Protects against known DDoS attack tools with pre-defined and customized filters to block rate-limits per pattern.
• SYN Protection—Blocks SYN-spoofed DoS with SYN rate thresholds per protected servers.
• Black List—Blocks generic attacks with L3 and L4 source-destination classifications and expiration rules.
• Connection Rate Limit—Blocks generic, non-supported protocols (non DNS, HTTP) and application level flood attacks with rate-based thresholds.

Application Based DDoS Protections

• SYN Protection with Web Challenge—Protects against HTTP connection-based DoS attacks with SYN rate threshold per protected server.
• Behavioral DNS Protections—Block DNS query DoS attacks with DNS adaptive behavioral based detection using DNS footprint blocking rate limits and DNS challenge and response.
• Behavioral HTTP Protections (The "HTTP Mitigator")—Blocks HTTP connection-based DoS attacks and upstream HTTP bandwidth attacks with server-based HTTP adaptive behavioral detection, HTTP footprint with web challenge.

Directed Application DoS/DDoS Protections
These repel DoS and DDoS attacks that require special filtering criteria. Flexible filtering definitions search for specific content patterns in each packet, and can analyze and block ongoing attacks by defining on-the-fly protections.

The DDoS Protector appliance sits in front of an organization's perimeter gateway and cleans the traffic from DDoS attacks before it reaches the main security gateway. The appliances are integrated with the Check Point management suite to deliver a single point of control over security and provide full visibility of security events. With Check Point SmartEvent, SmartLog and SmartViewTracker, customers benefit from current and historic views of an organization's overall network security and DDoS attack status.

"The DDoS Protector appliance line marks our entrance into a new and critical area of network security," said Dorit Dor, vice president of products at Check Point Software Technologies. "As the prevalence of DDoS attacks on enterprises continues to rise, it's important to enable our customers to protect themselves and mitigate one of the biggest security risks across today's threat landscape."

Check Point DDoS Protector appliances were developed in conjunction with Radware®, a leading provider of application delivery and application security solutions for virtual and cloud data centers. The DDoS Protector line is comprised of seven models that offer organizations low-latency, high-performance and high port density of up to 16 ports. With ultra-fast response times, the DDoS Protector appliance blocks a wide range of attacks within seconds, and can be easily customized to meet specific network environments and security needs. Check Point customers benefit from 24x7 customer support and access to a dedicated emergency response team.

"Check Point DDoS Protector appliances protect organizations with an additional layer of security to stop DoS attacks in their tracks," concluded Dor.

Availability
The Check Point DDoS Protector appliance line is available for purchase immediately through the Check Point worldwide network of value-added resellers. To find a Check Point partner, visit partners.us.checkpoint.com/partnerlocator/.

About Check Point Software Technologies Ltd
Check Point Software Technologies Ltd (checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

1The Impact of Cybercrime on Business Report is independently conducted by Ponemon Institute, LLC Publication Date: May 2012

 
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

Written by / Agency / Source: Check Point Software Technologies Ltd

 
 

Availability: All Regions (Including Int'l)

 

Traffic Booster: [/] Quick Newswire Today Visibility Checker

 

Distribution / Indexing: [+] / [Company listed above is a registered member of our network. Content made possible by PRZOOM / PRTODAY indexing services]

 
 
# # #
 
IT Security Anti-Spam Computer Security - Purchase keywords tags antivirus software firewall spyware removal virus scan computer security IT Security Anti-Spam malware / Banner Ads!.

 
  Your Banner Ad showing on ALL
IT Security/Anti-Spam articles,
CATCH Visitors via Your Competitors Announcements!


Check Point Fights Denial of Service Attacks with DDoS Protector™ Appliance Line

Company website links NOT available to basic submissions
It is OK to republish and/or LINK any newswire for any legitimate media purpose as long as you name Newswire Today and LINK as the source.
 
  Is this your article?
Activate ALL web links and social stream by Upgrading to Press Release PREMIUM Plan Now!

Check Point® |
Publisher Contact: Press Office - CheckPoint.com 
650-628-2215 press[.]us.checkpoint.com
 
Newswire Today - PRZOOM / PRTODAY disclaims any content contained in this article. If you need/wish to contact the company who published the current release, you will need to contact them - NOT us. Issuers of articles are solely responsible for the accuracy of their content. Our complete disclaimer appears here.
IMPORTANT INFORMATION: Issuance, publication or distribution of this press release in certain jurisdictions could be subject to restrictions. The recipient of this press release is responsible for using this press release and the information herein in accordance with the applicable rules and regulations in the particular jurisdiction. This press release does not constitute an offer or an offering to acquire or subscribe for any Check Point Software Technologies Ltd securities in any jurisdiction including any other companies listed or named in this release.

IT Security/Anti-Spam via RSSAdd NewswireToday - PRZOOM Headline News to FeedBurner
Find who RetweetFollow @NewswireTODAY



Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!


Read Latest Articles From Check Point Software Technologies Ltd / Company Profile


Read IT Security/Anti-Spam Most Recent Related Newswires:

Centrify Analytics Service Stops Breaches in Real-time Based on User Behavior
Radware Receives ICSA Labs Excellence in Information Security Testing Award
Rohde & Schwarz Cybersecurity Now Provides Dedicated Security Solutions for IoT Automotive Telematics
Leonardo and International Golden Group Partner for Cyber Security in The Middle East
Verint Named to 2017 CRM Watchlist
Frost & Sullivan Commends Coronet’s Pioneering Mobile Security Product that Protects Against Commjacking
Verint Partners with Frontline to Expand Customer Engagement Solutions Across the Netherlands
Aricent and Rohde & Schwarz Cybersecurity Unveil A Unique Bandwidth Control Solution to Enhance Customer Experience for Mobile Operators
Radware Secures Deal with Leading Content Delivery Network to Support its Security Services Over Three Year Period
Ensono Achieves EU-US Privacy Shield Certification
Accenture Integrates Blockchain Technology with Thales Hardware Security Module to Address Key Risks for Financial Services, Government, Healthcare an
Bitdefender Wins ‘Outstanding Product’ Award from AV-Comparatives
Rohde & Schwarz Cybersecurity Showcases At RSA 2017 Solutions for Secure Internet of Things
Leading Insurance Company in Southeast Asia to Deploy Verint Customer Engagement Optimization Solutions
Rambus Introduces High Bandwidth Memory PHY on GLOBALFOUNDRIES FX-14™ ASIC Platform Using 14nm LPP Process Technology

Boost Your Social Network
& Crowdfunding Campaigns


LIFETIME SOCIAL MEDIA WALL
NewswireToday Celebrates 10 Years in Business


PREMIUM Members


Visit  NAKIVO, Inc.

Visit  BizJobs.com





 
  ©2017 Newswire Today — Limelon Advertising, Co.
Home | About | Advertise/Pricing | Contact | Investors | Privacy/TOS | Sitemap | FRANCAIS
newswire, PR free press releases distribution service magazines engine news alert newsroom press room breaking news public relations articles company news alerts newswiredistribution ezine bizentrepreneur biznewstoday digital business report market search pr firms agencies reports distri-bution today investor relation successful internet entrepreneurs newswire distribution prtoday.com freenewswiredistribution asianewstoday bizwiretoday USA pr UK today - NOT affiliated with PRNewswire as we declined their partnership offer in 2013
 
PRTODAY & NewswireTODAY are NOT affiliated with USA TODAY (usatoday.com)