Skip to main content

Check Point

Check Point DDoS Protector - 4 Port - 1000Base-T, 1000Base-X - Gigabit Ethernet - 4 x RJ-45 - 2 Total Expansion Slots- CPAP-DP2006DC-D-SME

Product code: UK-CHE-CPAP-DP2006DC-D-SME
Condition: New
Availability: Vendor Direct Ship | ETA - Request A Quote | Email: sales@hssl.uk | Call Us: +44 330 043 2524

Request A Quote

SSL Secure Payment

Check Point DDoS Protector - 4 Port - 1000Base-T, 1000Base-X - Gigabit Ethernet - 4 x RJ-45 - 2 Total Expansion Slots- CPAP-DP2006DC-D-SME

Check Point DDoS Protector - 4 Port - 1000Base-T, 1000Base-X - Gigabit Ethernet - 4 x RJ-45 - 2 Total Expansion Slots- CPAP-DP2006DC-D-SME

Check Point DDoS Protector - 4 Port - 1000Base-T, 1000Base-X - Gigabit Ethernet - 4 x RJ-45 - 2 Total Expansion Slots

Features

Multi-layer Protection Against DDoS Attacks

Armed with sophisticated technologies and advanced DoS detection and prevention techniques, the Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including:

  • Non-vulnerability-based attacks that misuse server resources, such as
    • Application DoS - HTTP , SIP, and other flood attacks
  • DoS/DDoS flood attacks that misuse network bandwidth resources
  • Rapid response and real-time update of custom filters to protect against emerging attacks

High Performance

The wide range of DDoS Protector appliances provides up to 40Gbps capacity for full network traffic inspection and protection, with dedicated hardware acceleration against DDoS attacks that can block high packets-per-second attacks that overuse the CPU resources of networking and security equipment. Excellent user response time is maintained even when under attack - there's no need to risk compromising on legitimate user access when DDoS attacks occur.

Protection Against Network-Based Attacks

Effectively identify and stop brute-force flood attacks at the network level.

Overwhelming the network resources with a large-scale botnet to shut down its normal services is an old, yet still effective method for launching network flood attacks. The Check Point DDoS Protector can quickly identify and mitigate these types of network flood attacks.

Flexible Deployment Options

With seven models to choose from, Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed inline locally, through an ISP, or both.

Accurate Attack Prevention

  • Real-time signatures are generated for each attack pattern, using up to 20 different parameters
  • Block attacks without blocking legitimate user traffic
  • Intelligent flash traffic detection sees the difference between legitimate spikes in traffic and attacks

The DDoS Protector has the ability to differentiate between a sudden flash traffic and a real DDoS attack, and uses a real-time behavioral signature created on-the-fly to mitigate DDoS attacks. The DDoS Protector allows legitimate spikes in traffic that simpler rate-based technologies would block.
Integrated Security Management

Check Point's unified security management solution includes:

SmartEvent

Unified security and analysis solution that delivers real-time threat management information to instantly stop threats and block attacks with on-the-fly protections. Move from business view to forensics in just three clicks.

SmartLog

Advanced log analyzer that delivers proactive security intelligence with split-second search results from any log field for instant visibility into billions of log records over multiple time periods and domains.

SmartView Tracker

Comprehensive auditing solution to troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. In the case of an attack or other suspicious network activity, use SmartView Tracker to temporarily or permanently terminate connections from specific IP addresses.

(Manufacturer Standard Warranty) - Not Clear what product you need, or can't find your specific product/service part number? Call us +44 330 043 2524 | You can also use the quote request page

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be ship to international destinations.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Manufacturer Warranties

Wide Product Range Trusted Quality Scalable Growth Secure & Efficient Expert Guidance Wide Product Range Trusted Quality Scalable Growth Secure & Efficient Expert Guidance Wide Product Range Trusted Quality Scalable Growth Secure & Efficient Expert Guidance

Driven by Innovation and Integrity

We strive to deliver technology solutions that set new standards in quality and reliability. Guided by innovation and integrity, our focus is on creating lasting value for our customers while building trust through every product and service we provide.

Exceptional Quality

Trusted by 25k+ Happy Customers

Premium Solutions, Exceptional Performance

We offer a carefully curated range of top-tier products designed to deliver unmatched performance and reliability. Each solution is selected to ensure your business stays efficient, secure, and ahead of the competition.

Top
HSSL © 2025. All Rights Reserved.
american expressdiners clubdiscovermaestromasterpaypalvisa
Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty