Check Point Quantum Spark 1550 Network Security/Firewall Appliance - Intrusion Prevention - 6 Port - 10/100/1000Base-T - Gigabit Ethernet - 1000 Mbit/s Firewall Throughput - AES (128-bit) - 100 VPN - 6 x RJ-45 - 5 Year SandBlast (SNBT) Security Subsc CPAPSG1550SNBTSSPREM
CPAPSG1550SNBTSSPREM | Check Point®
Part Number: CPAPSG1550SNBTSSPREM
Condition: New
In Stock:
Out of stock
Real time availability
Notify Me
Product Specifications
Check Point Quantum Spark 1550 Network Security/Firewall Appliance - Intrusion Prevention - 6 Port - 10/100/1000Base-T - Gigabit Ethernet - 1000 Mbit/s Firewall Throughput - AES (128-bit) - 100 VPN - 6 x RJ-45 - 5 Year SandBlast (SNBT) Security Subsc CPAPSG1550SNBTSSPREM
1550 BASE APPLIANCE W/ 5YR SNBTPERP - SUBS & DIRECT PREMIUM SUP
Manufacturer Part Number: CPAPSG1550SNBTSSPREM
MANUFACTURER NAME: Check Point
MANUFACTURER PART NUMBER: CPAPSG1550SNBTSSPREM
UPC EAN CODE:
LANGUAGE: EN
MARKET:US
General Information: | |
Secure. Simple. Complete. Check Point Quantum Spark security gateways are high performance, integrated devices offering firewall, VPN, antivirus, application visibility and control, URL filtering, email security and SandBlast Zero-Day Protection, all in compact form factors that are simple to configure and manage. Quantum Spark - Full Protection for Small and Midsize Businesses Protection from Every Threat Easy to Deploy and Manage All-in-One Solution SPOTLIGHT | Advanced security, uncompromising performance The Check Point Quantum Spark 1500 security gateway family delivers enterprise-grade security in a series of simple and affordable, all-in-one security solutions to protect small business employees, networks and data from cyber-theft. Models with Wi-Fi, Wi-Fi with xDSL and Wi-Fi with an embedded 3G/4G/LTE modem fit seamlessly into your home and branch office networks. Comprehensive Protection
Wired, Wi-Fi, xDSL and Wi-Fi with 3/4G/LTE Models LTE is an essential component of any enterprise wireless WAN, either as a primary or failover link connecting fixed remote sites or a mobile fleet of vehicles. The 1500 embedded 3/4G/LTE modem supports:
R80 Software for SMB Gateways R80 software for SMB increases performance and brings enterprise-grade security to small and medium size businesses. Centrally managed SMB gateways support:
Cloud Management An intuitive web-based user interface, enables service providers to provision security efficiently for small and medium-size businesses. In addition a cloud-hosted Security Management Portal scales to manage over 10,000 Check Point Quantum Spark Gateways. SMBs can leave security to a service provider so they can focus on growing their own business. Lower the complexity of managing your security Setup can be done in minutes using pre-defined security policies and a step-by-step configuration wizard. Check Point Quantum Spark Security Gateways are conveniently manageable locally via a Web interface and centrally with a cloud-based Check Point Security Management Portal (SMP) or R80 Security Management. Simple, Intuitive Reporting The web interface shows logs, active computers, and hourly, daily, weekly and monthly reports. In-network analysis find top applications and users consuming the most bandwidth. Security analysis shows users visiting high-risk sites and using high-risk applications, as well as any incidents or infected hosts found during the reporting period. | |
Manufacturer | Check Point Software Technologies, Ltd |
Manufacturer Part Number | CPAP-SG1550-SNBT-SS-PREM-5Y |
Manufacturer Website Address | http://www.checkpoint.com |
Brand Name | Check Point |
Product Line | Quantum Spark |
Product Series | 1500 |
Product Model | 1550 |
Product Name | Quantum Spark 1550 Network Security/Firewall Appliance |
Product Type | Network Security/Firewall Appliance |
Technical Information: | |
Functionality | Intrusion Prevention |
Firewall Protection Supported | Secure IPsec VPN Connectivity
Application Control Email Security Threat Protection Web Content Filtering Intrusion Prevention Anti-spam Zero Day Event Virus Protection URL Filtering Antivirus AntiBot |
Firewall Throughput | 1000 Mbit/s |
Encryption Standard | AES (128-bit) |
Number of VPN Supported | 100 |
Connectivity Technology | Wired |
New Connections Per Second | 14000 |
Interfaces/Ports: | |
Total Number of Ports | 6 |
USB | Yes |
Number of Network (RJ-45) Ports | 6 |
Media & Performance: | |
VPN Throughput | 162.50 MB/s |
IPS Throughput | 112.50 MB/s |
Network & Communication: | |
Ethernet Technology | Gigabit Ethernet |
Network Standard | 10/100/1000Base-T |
Management & Protocols: | |
Manageable | Yes |
Power Description: | |
Frequency | 50 Hz
60 Hz |
Power Consumption | 17.92 W |
Physical Characteristics: | |
Form Factor | Desktop
Rack-mountable Wall Mountable Compact |
Height | 1.5" |
Width | 8.3" |
Depth | 6.3" |
Weight (Approximate) | 15.17 oz |
Miscellaneous: | |
Environmental Compliance | Registration, Evaluation, Authorization and Restriction of Chemicals (REACH)
Restriction of Hazardous Substances (RoHS) Waste Electrical and Electronic Equipment Directive (WEEE) |
Warranty: | |
Warranty | 1 Year |
Support/Service Duration | 5 Year |
Additional Warranty Information | If the Hardware Product has not been activated, the warranty will be valid for fifteen (15) months from the date of Check Point's shipment of the Hardware Product ("Warranty Period"). |
Support/Service Type | SandBlast (SNBT) Security Subscription Package and Direct Premium support |
Questions and Answers
Questions and Answers | Ask CompSource |
Shipping / Returns
Shipping
Ground =
FREE
(Delivery within 2-7 business days)
Two Day Air = $25.00
(Delivery within 2 business days)
Standard One Day = $35.00
(Delivery within next business day)
Priority = $45.00
(Delivery within next business morning)
U.S Mail Priority (AA,AE,AP only) = $30.00
FedEx International Economy (Canada only) = $85.00
Typically out of stock items are filled within 1 to 14 business days but can and may take longer.
Shipping dates are best estimates based on product location and may vary with holidays.
If product requires trucking, additional fees may apply.
* Some destinations are subject to Applicable State/Duty Taxes
Returns
CompSource realizes that every product may have different return guidelines. Please see the policy below regarding this item.
This Product Has Limited Exchange Privileges.
Please call for return guidelines.
For support on this product, please contact Check Point. 800-429-4391 www.checkpoint.com
Check Point Company's Information
Click Check Point for all products
Local #: (650)628-2000
Toll Free #: 800-429-4391
Tech Support #: 800-429-4391
Site: www.checkpoint.com
Product Reviews
Overall Rating | Write a Review
|
Best Sellers
More Best Sellers
Rebates
More Rebates
Recently Viewed
Learn more about Network Security & Firewalls
Switches, routers, and wireless access points
Switches, routers, and wireless access points perform very different functions in a network.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.Switches
Switches are the foundation of most business networks. A switch acts as a controller, connecting computers, printers, and servers to a network in a building or a campus.
Switches allow devices on your network to communicate with each other, as well as with other networks, creating a network of shared resources. Through information sharing and resource allocation, switches save money and increase productivity.
There are two basic types of switches to choose from as part of your networking basics: managed and unmanaged.
- An unmanaged switch works out of the box but can't be configured. Home-networking equipment typically offers unmanaged switches.
- A managed switch can be configured. You can monitor and adjust a managed switch locally or remotely, giving you greater control over network traffic and access.
Routers
Routers connect multiple networks together. They also connect computers on those networks to the Internet. Routers enable all networked computers to share a single Internet connection, which saves money.
A router acts a dispatcher. It analyzes data being sent across a network, chooses the best route for data to travel, and sends it on its way.
Routers connect your business to the world, protect information from security threats, and can even decide which computers receive priority over others.
Beyond those basic networking functions, routers come with additional features to make networking easier or more secure. Depending on your needs, for example, you can choose a router with a firewall, a virtual private network (VPN), or an Internet Protocol (IP) communications system.
Access points
An access point* allows devices to connect to the wireless network without cables. A wireless network makes it easy to bring new devices online and provides flexible support to mobile workers.
An access point acts like an amplifier for your network. While a router provides the bandwidth, an access point extends that bandwidth so that the network can support many devices, and those devices can access the network from farther away.
But an access point does more than simply extend Wi-Fi. It can also give useful data about the devices on the network, provide proactive security, and serve many other practical purposes.
*Access points support different IEEE standards. Each standard is an amendment that was ratified over time. The standards operate on varying frequencies, deliver different bandwidth, and support different numbers of channels.
Wireless networking
Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.Firewall
And possibly the most important aspect of networking is security and Firewall!What is a Firewall?
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.
A firewall can be hardware, software, or both.
CompSource will educate and help make this process enjoyable and easy.
Whether you're planning on using your network for basic home tasks or enterprise level security. You can tell our trained sales professionals your needs, and we�ll make custom recommendations to suit your specifications and budget. Our reps have extensive knowledge and love to share. We educate, not sell, CompSource makes sure you buy what you need and not waste money on what you don't. As with every decision we never push, it's up to you when, and if you make a purchase.
CompSource has a great technical staff that can help with a solution for your exact needs.
Chat with us or give our professionals a quick phone call (800)-413-7361.
as usual- y'all are awesome. I've never experienced such quick and effectively responsive service- your website, products and business model are perfect for my tech needs- was just looking up some info on a video card and cam i ordered and received them in what can only be described as mind boggling time.... the cam came next day- unreal- wish i could be as fast. thanks so much and particularly to Jordan who for the second time did what i thought/think is impossible- your business should be the standard. cheers- AnonymousMore Reviews