Check Point DDoS Protector
Home — PartnersCheck Point — Check Point DDoS Protector

Distributed Denial of Service (DDoS) attacks can be unleashed by anyone, but with a little preparation, you can prevent service disruptions caused by DDoS. Check Point DDoS Protector uses a hybrid of dedicated on-premises and cloud-based resources to defend against volumetric, application, reflective and resource-exhaustive DDoS attacks. Preventing DDoS attacks just got easier. DDoS toolkits are relatively easy to obtain online and require limited technical experience or resources to initiate an attack — and the outcome can be devastating. A well-orchestrated Denial of Service takes a toll on productivity, customer service, reputation and revenue. To combat DDoS effectively, organizations need tools to immediately and effectively halt flooding at both the network and application layers, before a successful attack can take hold. As attacks evolve, stay one step ahead.

Attackers are also evolving their methods to make detection more difficult, often by favoring “low and slow” attacks that may not immediately raise the alarm. Others use DDoS as a smokescreen to draw the attention of the security team while data is stolen. n today’s threat landscape, “Denial of Service (DoS)” attacks are increasing in number, speed and complexity. Denial of Service and Distributed Denial of Service (DDoS) attacks are relatively easy to carry out, and can cause serious damage to companies who rely on web services to operate. Check Point DDoS Protector gives organizations protection against DDoS attacks. Multiple (more than 50) DDoS attack “toolkits” are readily available on the Internet, and an increasing number of attacks are initiated in over 230 countries. DDoS attacks are often profit-driven — in 2011, cyber criminals earned a whopping $12.5 billion dollars.

Check Point DDoS Protector Appliances

Block destructive DDoS attacks before they cause damage. Check Point DDoS Protector Appliances extend your security perimeters with multi-layered protection against DDoS and up to 40 Gbps of performance. Check Point DDoS Protector Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 40 Gbps of performance. Modern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company’s security perimeters to block destructive DDoS attacks before they cause damage. Armed with sophisticated technologies and advanced DoS detection and prevention techniques, the Check Point DDoS Protector is capable of stopping today’s advanced DDoS attacks including non-vulnerability-based attacks that misuse server resources.

ThreatCloud Incident Response Service

The Check Point Incident Response Service provides additional resources to combat and remediate attacks. Check Point experts, available 24/7, will instantly respond to help you contain the threat, minimize your losses and return you to business as usual. When the worst happens and you get attacked, trust Check Point to mitigate your risk with the Check Point Incident Response Service. Just call the Check Point dedicated hotline anytime you experience a security threat. And Check Point 24/7 experts will instantly respond to help you contain the threat, minimize your losses and return to business as usual. Check Point Incident Response service will also help you mitigate future risks with post-incident reports and security best practices advisement. The Incident Response portal offers everything you need to prepare for and respond to a security attack. Via the Incident Response portal customers can view actionable attack remediation data.

Check Point DDoS Protector


The enhanced Check Point Antivirus Software Blade uses real-time virus signatures and anomaly based protections from ThreatCloud, the first collaborative network to fight cybercrime, to detect and block malware at the gateway before users are affected. ThreatCloud is a collaborative network and cloud-driven knowledge base that delivers real-time dynamic security intelligence to security gateways. That intelligence is used to identify emerging outbreaks and threat trends.

ThreatCloud powers the Antivirus Software Blade allowing gateways to investigate always-changing malware signatures. Since processing is done in the cloud, millions of signatures and malware protection can be scanned in real-time. ThreatCloud’s knowledgebase is dynamically updated using attack information from worldwide gateways, feeds from a network of global threat sensors, Check Point research labs and the industry’s best malware feeds. Correlated security threat information is then shared among all gateways collectively.

Mobile Security

Using smartphones and tablets to access critical business information on the go has many benefits, but can expose your sensitive data to risk. Check Point’s SandBlast Mobile protects your devices from advanced mobile threats, ensuring you can deploy and defend devices with confidence. Check Point SandBlast Mobile is the industry’s only unified, cross-platform solution to protect enterprises from mobile breaches. An extension of Check Point’s SandBlast family of products, SandBlast mobile detects and blocks attacks before they become widespread.

Only Check Point provides a complete mobile security solution that protects devices from threats on the device (OS), in apps, and in the network, and delivers the industry’s highest threat catch rate for iOS and Android. Check Point SandBlast Mobile uses malicious app detection to find known and unknown threats by applying threat emulation, advanced static code analysis, app reputation and machine learning.


As part of the Check Point SandBlast Zero-Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero-day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers’ evasion techniques. Highest catch rate to protect your organization from unknown malware, zero-day and targeted attacks. Detect and block new, unknown malware and targeted attacks found in email attachments, downloaded files, and URLs to files within emails.

Provide protection across one of the widest range of file types including, Microsoft Office, Adobe PDF, Java, Flash, executables, and archives, as well as multiple Microsoft Windows OS environments. Uncover threats hidden in SSL and TLS encrypted communications. Stop hackers from evading detection and infiltrating your network, reducing risk of expensive breaches. Identify even the most dangerous attacks in their infancy using unique CPU-level inspection.

Threat Prevention

The Next-Generation Threat Prevention software bundles provide organizations of all sizes — from small, midsize and large enterprises with comprehensive protection against known and unknown threats using two simple packages: Next Generation Threat Extraction (NGTX) and Next-Generation Threat Prevention (NGTP). Comprehensive threat protection is available in two simple packages for Check Point appliances. Next-Generation Threat Extraction (NGTX): Includes multi-layered protection from known threats AND zero-day attacks using SandBlast Threat Emulation, SandBlast Threat Extraction, Antivirus, Anti-bot, IPS, App Control, URL Filtering and Identity Awareness.

Next-Generation Threat Prevention (NGTP): Includes multi-layered protection from known, signature-based threats including Antivirus, Anti-Bot, IPS, App Control, URL Filtering and Identity Awareness. Supported on small, midsize and large-scale data center appliances, the NGTX and NGTP software bundles provide advanced threat protection against known threats, zero-day malware and even the most sophisticated attacks.

URL Filtering

The Check Point URL Filtering Software Blade provides optimized web security through full integration in the gateway to prevent bypass through external proxies. Integration of policy enforcement with Application Control means enhanced Web and Web 2.0 protection, and UserCheck technology empowers and educates users on web usage policy in real-time. The URL Filtering Software Blade is a key component of the Secure Web Gateway.

Utilize a dynamically updated database of over 200 Million Websites to allow, block or limit website access in real-time — all web site traffic, clear and SSL-encrypted. Choose from 64 pre-defined content categories. Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passing through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver. Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy.