Check Point
Check Point CPAP-DP2006DC-D-SME Network Security & Firewalls Check Point Ddos Protector - 4 Port - 1000base-t, 1000base-x - Gigabit Ethernet - 4 X Rj-45 - 2 Tota Cpapdp2006dcdsme

Part Number: CPAP-DP2006DC-D-SME
Condition: New
In Stock: Out of stock   
Real time availability   

Notify Me


Regular:$69,550.00
Save:$14,484.70 (21%)

Your Price:
$55,065.30

As low as $5048/month
Buy Now, Pay Later



  • Shipping Insurance
  • Price Match Guarantee
  • Terms of Service Guarantee
  • Identity Theft Protection
FREE with your purchase
Expert Name, Expert Title
Let our Specialist make your purchase easier

Product Specifications



Check Point DDoS Protector - 4 Port - 1000Base-T, 1000Base-X - Gigabit Ethernet - 4 x RJ-45 - 2 Total Expansion Slots CPAP-DP2006DC-D-SME

DDOS PROTECTOR 2006 APPL - WITH SME DUAL POWER SUPPLY DC

Manufacturer Part Number: CPAP-DP2006DC-D-SME



CPN:DDOS PROTECTOR 2006 APPL - WITH SME DUAL POWER SUPPLY DC
MANUFACTURER NAME: Check Point
MANUFACTURER PART NUMBER: CPAP-DP2006DC-D-SME
UPC EAN CODE:
LANGUAGE: EN
MARKET:US

General Information:

Features

Multi-layer Protection Against DDoS Attacks

Armed with sophisticated technologies and advanced DoS detection and prevention techniques, the Check Point DDoS Protector is capable of stopping today's advanced DDoS attacks including:

  • Non-vulnerability-based attacks that misuse server resources, such as
    • Application DoS - HTTP , SIP, and other flood attacks
  • DoS/DDoS flood attacks that misuse network bandwidth resources
  • Rapid response and real-time update of custom filters to protect against emerging attacks

High Performance

The wide range of DDoS Protector appliances provides up to 40Gbps capacity for full network traffic inspection and protection, with dedicated hardware acceleration against DDoS attacks that can block high packets-per-second attacks that overuse the CPU resources of networking and security equipment. Excellent user response time is maintained even when under attack - there's no need to risk compromising on legitimate user access when DDoS attacks occur.

Protection Against Network-Based Attacks

Effectively identify and stop brute-force flood attacks at the network level.

Overwhelming the network resources with a large-scale botnet to shut down its normal services is an old, yet still effective method for launching network flood attacks. The Check Point DDoS Protector can quickly identify and mitigate these types of network flood attacks.

Flexible Deployment Options

With seven models to choose from, Check Point DDoS Protectors are ready to protect network of all sizes in minutes and can be installed inline locally, through an ISP, or both.

Accurate Attack Prevention

  • Real-time signatures are generated for each attack pattern, using up to 20 different parameters
  • Block attacks without blocking legitimate user traffic
  • Intelligent flash traffic detection sees the difference between legitimate spikes in traffic and attacks

The DDoS Protector has the ability to differentiate between a sudden flash traffic and a real DDoS attack, and uses a real-time behavioral signature created on-the-fly to mitigate DDoS attacks. The DDoS Protector allows legitimate spikes in traffic that simpler rate-based technologies would block.
Integrated Security Management

Check Point's unified security management solution includes:

SmartEvent

Unified security and analysis solution that delivers real-time threat management information to instantly stop threats and block attacks with on-the-fly protections. Move from business view to forensics in just three clicks.

SmartLog

Advanced log analyzer that delivers proactive security intelligence with split-second search results from any log field for instant visibility into billions of log records over multiple time periods and domains.

SmartView Tracker

Comprehensive auditing solution to troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. In the case of an attack or other suspicious network activity, use SmartView Tracker to temporarily or permanently terminate connections from specific IP addresses.

ManufacturerCheck Point Software Technologies, Ltd
Manufacturer Part NumberCPAP-DP2006DC-D-SME
Manufacturer Website Addresshttp://www.checkpoint.com
Brand NameCheck Point
Product Model2006
Product NameDDoS Protector
Product TypeNetwork Security/Firewall Appliance
Technical Information:
Firewall Protection SupportedDistributed Denial of Service (DDoS)
Denial of Service (DoS)
Web Content Filtering
SIP Request Flood
FloodGuard
Interfaces/Ports:
Total Number of Ports4
PoE (RJ-45) PortNo
Number of Network (RJ-45) Ports4
Network & Communication:
Ethernet TechnologyGigabit Ethernet
Network Standard1000Base-T
1000Base-X
Wireless Specifications:
Wireless LANNo
I/O Expansions:
Total Number of Expansion Slots2.0
Expansion Slot TypeSFP
Number of SFP Slots2
Management & Protocols:
ManageableYes
Physical Characteristics:
Height1.7"
Width16.7"
Depth18"
Weight (Approximate)15.90 lb
Miscellaneous:
Environmentally FriendlyYes
Warranty:
Warranty1 Year

Date Inserted: Friday September 22, 2023

This product was last updated on Sunday November 3, 2024

All products are brand new and factory sealed unless otherwise stated.
 *** Disclaimer- Information is supplied by the Manufacturer. The image, including color, may differ from actual product appearance. CompSource, Inc. is not responsible for data. ***

Questions and Answers

Questions and Answers

Ask CompSource

Shipping / Returns

Shipping

Ground = FREE
(Delivery within 2-7 business days)

Two Day Air = $25.00
(Delivery within 2 business days)

Standard One Day = $35.00
(Delivery within next business day)

Priority = $45.00
(Delivery within next business morning)

U.S Mail Priority (AA,AE,AP only) = $30.00

FedEx International Economy (Canada only) = $85.00

Typically out of stock items are filled within 1 to 14 business days but can and may take longer.

Shipping dates are best estimates based on product location and may vary with holidays.

If product requires trucking, additional fees may apply.

* Some destinations are subject to Applicable State/Duty Taxes

Returns

CompSource realizes that every product may have different return guidelines. Please see the policy below regarding this item.

This Product Has Limited Exchange Privileges.

Please call for return guidelines.

For support on this product, please contact Check Point. 800-429-4391 www.checkpoint.com


Check Point Company's Information

Check Point  
Click Check Point for all products

Local #: (650)628-2000

Toll Free #: 800-429-4391

Tech Support #: 800-429-4391

Site:  www.checkpoint.com

Accessories

Product Reviews

Overall Rating | Write a Review

    Best Sellers
    More Best Sellers

    Recently Viewed

    Learn more about Network Security & Firewalls

    Switches, routers, and wireless access points

    Switches, routers, and wireless access points perform very different functions in a network.

    A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.

    Switches

    Switches are the foundation of most business networks. A switch acts as a controller, connecting computers, printers, and servers to a network in a building or a campus.

    Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.

    There are two basic types of switches to choose from as part of your networking basics: managed and unmanaged.

    • An unmanaged switch works out of the box but can't be configured. Home-networking equipment typically offers unmanaged switches.
    • A managed switch can be configured. You can monitor and adjust a managed switch locally or remotely, giving you greater control over network traffic and access.

    Routers

    Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money.

    A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way.

    Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others.

    Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system.

    Access points

    An access point* allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers.

    An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away.

    But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes.

    *Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.

    Wireless networking

    Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

    Firewall

    And possibly the most important aspect of networking is security and Firewall!

    What is a Firewall?
    A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

    Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.

    A firewall can be hardware, software, or both.

    CompSource will educate and help make this process enjoyable and easy.

    Whether you're planning on using your network for basic home tasks or enterprise level security. You can tell our trained sales professionals your needs, and we�ll make custom recommendations to suit your specifications and budget. Our reps have extensive knowledge and love to share. We educate, not sell, CompSource makes sure you buy what you need and not waste money on what you don't. As with every decision we never push, it's up to you when, and if you make a purchase.

    CompSource has a great technical staff that can help with a solution for your exact needs.

    Chat with us or give our professionals a quick phone call (800)-413-7361.

    Earlier this morning, I called the number you gave me and spoke with your technical support person (Matt). It was SO incredibly refreshing to speak to an actual person to explain the problem. What a world of difference that makes! Novel concept, I know ... Matt was very helpful (and patient and polite etc), and even called me back (which I didn't expect). Hopefully the problem will be taken care of soon, but in the meantime I wanted to pass along how much I appreciate your having a help line that is actually there to help you. (Funny, I know, but true ...) Again, thank you! Barb Barb
    More Reviews

    eStores

    Connect With Us