DDoS Protection Services – Quantum DDos Protector

This next-generation solution combines industry-leading performance and DDoS protection and services, providing the ability to block destructive DDoS attacks before they cause damage.

Request a demoRDoS Guide

ddos protector floating image

Mitigate DDoS Attacks with DDoS Protector

The Check Point Quantum DDoS Protector combines industry-leading performance, AI/ML behavioral-based algorithms, and unified management to protect against destructive DDoS attacks before they cause damage.

Zero Day DDoS Protection

AI/ML behavioral based algorithms provide automated protection to block a wide range of cyber attacks

Industry Leading Threat Performance

2-3x performance boost automatically prevents scalable attacks including HTTP/S Floods, DNS, and more​

Scalable Management & Complete Visibility

Simplified management & configuration with advanced protection coverage for DDoS, HTTP/S, and more

DDoS Protection Features & Capabilities

Fewer False-Positives icon

Fewer False-Positives

Anti-DDoS, network behavioral analysis, IPS and SSL-attack protection. Fully protects the application infrastructure against known and emerging network security attacks.

Real-Time Signature Creation icon

Real-Time Signature Creation

DDoS Protector is a real-time attack prevention device that protects your application infrastructure against network and application downtime, app vulnerability exploitation and network anomalies.

Real-Time Attack Detection & Prevention icon

Real-Time Attack Detection & Prevention

Attack mitigation at scale offers a wide range of protections, up to 800Gbps. Flexible network connectivity accommodates an array of environments and networks. Options include 25G, 400G and high-density 100G ports.

Completely Managed Devices icon

Completely Managed Devices

On-premise device management provided by specialized Emergency Response Team (ERT) including security experts that set up, manage and tune the device to keep it synchronized with business processes and policies.

Flexible Deployment Options icon

Flexible Deployment Options

Pick the option that best suits your architecture or use case, with cloud-based, hardware-based, or hybrid deployment options.

Dynamic & Granular Protection icon

Dynamic & Granular Protection

Service providers with large-scale networks can easily detect and mitigate attacks and anomalies.

SSL Attack Mitigation icon

SSL Attack Mitigation

Hardware-based SSL engines inspect the latest SSL/TLS standards.

On Premises and Cloud-Based Mitigation icon

On Premises and Cloud-Based Mitigation

Defense Messaging between devices provides accurate and distant mitigation

Product Specifications

Features DDoS Protector X10/X20 DDoS Protector X40 DDoS Protector X80 DDoS Protector X100/X200 DDoS Protector X400/X800
On-demand scalable clean thoughput Up to 10Gbps Up to 40 Gbps Up to 40 Gbps Up to 100 Gbps Up to 380 Gbps
Max programmable mitigation throughput 10 Gbps / 20 Gbps 40 Gbps 80 Gbps 100 Gbps / 200 Fbps 400 Gbps / 800 Gbps
Max attack concurrent sessions Unlimited Unlimited Unlimited Unlimited Unlimited
DDoS flood attack prevention rate 14 Mpps 30 Mpps 30 Mpps 142 Mpps 1119 Mpps
Latency <60 microseconds <60 microseconds <60 microseconds <60 microseconds <60 microseconds
SSL/TLS descryption Yes Yes Yes Yes

VIEW DATASHEET

Scalable DDoS Protection Management & Complete Visibility

DDoS protection Services isn’t one-size-fits-all. There are many different options, choices, and use cases; each with its unique advantages and drawbacks. This guide will walk you through various options and provide you with the knowledge you need to make informed decisions about which solutions are best suited to your particular needs.

  • Simple Management Dashboard The new dashboard allows admins to easily navigate and quickly view detection events, apply policies, or refine configurations, all from the same window.
  • Complete Visibility Unified visibility and control for both out-of-path and inline DDoS protection solutions, optimized troubleshooting, and enriched search and filter capabilities.
  • Network Analytics Network Analytics with comprehensive visibility of traffic stats at any time.
  • Multiple Deployment Options Multiple deployment options offering broad protection and mitigation capacity (6Gbps to 800Gbps), virtual appliances and integrated hybrid solution.

Download Guide

ddos protector consolidated management screen capture

22562 Cyberint Infinity Intelligence page v2dp 600x250 4

DDoS Protection and Attack Mitigation

In today’s info-security threat landscape, denial-of-service and distributed denial-of-service (DoS/DDoS) attacks are a major cause of network downtime.

Download Datasheet

DDoS Response Guide

How to protect yourself from DDoS attacks before, during, and after an attack.

Read now