Check Point Threat Prevention Appliance

Unified solution that prevents advanced threats and malware attacks.
Comprehensive threat protection from one appliance
- Dedicated Threat Prevention Appliance
- Includes multiple threat prevention technologies such as Antivirus, Anti-bot, IPS, URL Filtering, Identity Awareness and more
- Features Threat Emulation technologies to stop zero-day attacks
Real-time security intelligence delivered from ThreatCloud
- Leverage the industry's first collaborative network to fight cybercrime
- Identify over 250 million addresses analyzed for bot discovery, over 4.5 Million malware signatures and 300,000 malicious websites
- Dynamically update attack information from worldwide network of sensors and industry's best malware feeds
- Combine information on remote operator hideouts, botnet communication patterns and attack behavior to accurately identify bot outbreaks
- Receive up-to-the-minute bot intelligence from the ThreatCloud knowledgebase, inlcuding zero-day bot attacks discovered by Check Point Threat Emulation
Protect from malicious downloads
- Identify website delivering malware
- Prevent malicious files from being downloaded
- Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection
Maximize protection through unified management, monitoring and reporting
- Integrated with Check Point Security Management
- Monitor, analyze and report on risks and threats
Dedicated Threat Appliance
Powered by ThreatCloud
The ThreatCloud™ feeds security gateway software blades with real-time security intelligence gathered with the first collaborative network to fight cybercrime.
Threat Emulation
Antivirus
Stop incoming malicious files at the gateway before the user is affected with real-time virus signatures and anomaly-based protections from ThreatCloud™, the first collaborative network to fight cybercrime.
Stop incoming malicious files at the gateway before the user is affected with real-time virus signatures and anomaly-based protections from ThreatCloud™, the first collaborative network to fight cybercrime. Identify over 4.5 million malware signatures and 300,000 malicious websites with a constantly-updated worldwide network of sensors that provide ongoing malware intelligence.

Anti-bot
Detects bot-infected machines, prevents bot damages by blocking bot cybercriminal's Command and Control center communications, and is continually updated from ThreatCloud™.
Detects bot-infected machines, prevents bot damages by blocking bot cybercriminal's Command and Control center communications, and is continually updated from ThreatCloud™.
IPS
The IPS Software Blade delivers complete and proactive intrusion prevention—all with the deployment and management advantages of a unified and extensible next-generation firewall solution.
The IPS Software Blade delivers complete and proactive intrusion prevention—all with the deployment and management advantages of a unified and extensible next-generation firewall solution. Complementing Check Point’s firewall protection, IPS software blade further secures your network by inspecting packets traversing through the gateway It offers full-featured IPS with geo-protections and is constantly updated with new defenses against emerging threats.

URL Filtering
Control access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policy.
Control access to millions of web sites by category, users, groups and machines with cloud-based technology that is constantly updated with new websites to support employee productivity and security policy. Block access to entire websites or just pages within, and set enforcements by time allocation or bandwidth limitations. Maintain a list of accepted and unaccepted website URLs to fine tune security policies.
Identity Awareness
Provides granular visibility of users, groups and machines, enabling unmatched application and access control through the creation of accurate, identity-based policies.
Provides granular visibility of users, groups and machines, enabling unmatched application and access control through the creation of accurate, identity-based policies.
Logging and Status
Integrated Security Management
Add Functionality When You Need It
Threat Prevention Appliance
|
|
| ||||
|---|---|---|---|---|---|
|
| 4809 | 12209 | 12409 | 12609 | |
| Concurrent Connections (M)* | 1.7 / 3.3 | 1.7 / 5 | 1.7 / 5 | 2.5 / 5 | |
| Connections per Second (K) | 70 | 90 | 110 | 130 | |
| System Resources | |||||
| Memory / Max | 4 / 8 GB | 4 / 12 GB | 4 / 12 GB | 6 / 12 GB | |
| Storage | 250 GB | 500 GB | 500 GB (up to 2x500GB) | 2x500 GB | |
| Network Interfaces | 8 x 10/100/ 1000 Base-T RJ45 ports |
8 x 10/100/ 1000 Base-T RJ45 ports |
2 on board 1GbE copper |
2 on board 1GbE copper 4 x 1GbE copper interface card 8 x 1GbE copper interface card |
|
| Power Supply | One AC power supply | One AC power supply | Redundant dual hot-swappable | Redundant dual hot-swappable | |
| Lights Out Management (LOM) | Yes | Yes | Yes | Yes | |
| Dimensions | |||||
| Form Factor | 1U | 1U | 2U | 2U | |
| Dimension W x D x H in. (mm) |
17.25 x 12.56 x 1.73 (438 x 320 x 44) |
17.25 x 12.56 x 1.73 (438 x 320 x 44) |
17.24 x 22.13 x 3.46 (438 x 562 x 88) |
17.24 x 22.13 x 3.46 (438 x 562 x 88) |
|
| Weight lbs. (kg) | 16.53 (7.5) | 16.53 (7.5) | 51.6 (23.4) | 51.6 (23.4) | |
| Power Requirements | |||||
| AC Input Voltage | 100 - 240V | 100 - 240V | 100 - 240V | 100 - 240V | |
| Frequency | 47-63Hz | 47-63Hz | 47-63Hz | 47-63Hz | |
| Single Power Supply Rating | 275W | 275W | 300W | 400W | |
| Power Consumption Maximum | 140W | 121W | 132W | 220W | |
| Maximum Thermal Output | 425.6 BTU | 412.9 BTU | 450.4 BTU | 750.6 BTU | |
*based on included memory/max memory
• All Models: Bypass card optional
• All Models: Locally or centrally manage
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite


