Check Point 3200 Appliance
Branch and small office security in a compact form factor
המחיר שלנו: הצעת מחיר
*רישיון מיוחד נגד מתקפות כופר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
מחירים נוספים מופיעים למטה, או לחצו כאן!
שימו לב: כל המחירים באתר כוללים מע"מ. החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
Overview:
The Check Point 3200 Appliance combines the most comprehensive security protections to safeguard your branch and small office deployments. The 3200 appliance is available in a compact desktop form factor with a 320 GB hard disk. This powerful security appliance is optimized to deliver real-world threat prevention to secure your critical assets and environments.
Comprehensive Threat Prevention
The rapid growth of malware, growing attacker sophistication and the rise of new unknown zero-day threats require a different approach to keep enterprise networks and data secure. Check Point delivers fully integrated, comprehensive Threat Prevention with award-winning SandBlast™ Threat Emulation and Threat Extraction for complete protection against the most sophisticated threats and zero-day vulnerabilities.
All-Inclusive Security Solutions
Check Point 3200 Appliances offer a complete and consolidated security solution available in two complete packages:
- NGTP: prevent sophisticated cyber-threats with IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security.
- NGTX: NGTP with SandBlast Zero-Day Protection, which includes Threat Emulation and Threat Extraction.
NGTP | NGTX | |
---|---|---|
Prevent known threats | Prevent known and zero-day attacks | |
Firewall | ||
VPN (IPSec) | ||
IPS | ||
Application Control | ||
Anti-Bot | ||
Anti-Virus | ||
URL Filtering | ||
SandBlast Threat Emulation | ||
SandBlast Threat Extraction |
Prevent Known and Zero-Day Threats
The 3200 Appliance protects organizations from both known and unknown threats with Antivirus, Anti-Bot, SandBlast Threat Emulation (sandboxing), and SandBlast Threat Extraction technologies.
As part of the Check Point SandBlast Zero-Day Protection solution, the cloud-based Threat Emulation engine detects malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines cloud-based CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.
Furthermore, SandBlast Threat Extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.
Inspect Encrypted Connections
There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data.
Best-In-Class Management
Every Check Point appliance can either be managed locally with its available integrated security management or via central unified management. Using local management, the appliance can manage itself and one adjacent appliance for high availability deployments. When centrally managed administrators can define security policy for the entire network — including internal security, main sites, and remote sites — from a single, centrally located Check Point Security Management server.
Key Features:
Product Features
- Compact desktop form factor
- Simple deployment and management
- Secure branch office connections with site-to-site and client-to-site VPN
- Redundant appliance clustering technologies eliminate a single point of failure
Product Benefits
- Enable the most advanced threat prevention security
- Optimal performance even when inspecting SSL encrypted traffic
- Future-proofed technology safeguards against tomorrow’s risks
- Simplify administration with a single integrated management console
Production Environment Performance1 | |
SecurityPower™ Units (SPU) | 250 SPU |
Firewall throughput | 2.1 Gbps |
IPS throughput | 460 Mbps |
NGFW throughput (Firewall, Application Control, IPS) | 260 Mbps |
Threat prevention throughput2 | 140 Mbps |
Ideal Testing Conditions Performance (RFC 3511, 2544, 2647, 1242) | |
Firewall throughput, 1518 byte UDP | 4 Gbps |
Connections per second | 48,000 |
Concurrent connections | 3.2 million |
VPN throughput, AES-128 | 2.25 Gbps |
IPS throughput | 1.44 Gbps |
NGFW throughput (Firewall, Application Control, IPS) | 1.15 Gbps |
1 Performance measured with real-world traffic blend and content, a typical rule base, updated recommended signatures, NAT and logging enabled.
2 FW, IPS, APPCTRL, AV, AB, URLF
Technical Specifications:
NetworkNetwork Connectivity
High Availability
IPv6
Virtual Systems
RoutingUnicast and Multicast Routing (see SK98226)
|
HardwareBase Configuration
Power Requirements
Dimensions
Operating Environmental Conditions
Storage Conditions
Certifications
|
1Maximum production performance based upon the SecurityPower benchmark. Real-world traffic, Multiple Software Blades, Typical rule-base, NAT and Logging enabled. Check Point recommends 50% SPU utilization to provide room for additional Software Blades and future traffic growth. Find the right appliance for your performance and security requirements using the Appliance Selection Tool.
Support Options:
Check Point Total Security 1-Year Model Support Options:
- Standard Support available at 12% of list per year
- Premium Support available at 17% of list per year
Standard | Premium | Diamond/ Sapphire | Premium 4H on-site** | |
Support Time | 9 x 5 Business Day | 24 x 7 Every Day | 24 x 7 Every Day | 24 x 7 Every Day |
Latest Hot Fixes & Service Packs | Yes | Yes | Yes | Yes |
Major Upgrades & Enhancements | Yes | Yes | Yes | Yes |
Access to Online Support Knowledgebase | Advanced | Advanced | Expert | Advanced |
Unlimited Service Requests | Yes | Yes | Yes | Yes |
Hardware Warranty | 3 Years | 3 Years | 3 Years | 3 Years |
Committed Response time to Severity-1 issues | 4 Hours | 30 Minutes | 30 Minutes | 30 Minutes |
Committed Response time to Severity 2,3,4 issues | 4 Hours | 4 Hours | 4 Hours | 4 Hours |
Issues open with | Standard Support Desk | Premium Support Desk | Designated Engineer | Premium Support Desk |
RMA Determination | Support Engineer | Support Engineer | Customer | Support Engineer |
Shipment & Delivery SLA | Next business day shipment, delivery usually within 2-3 business days | Same business day shipment, Next business day delivery target* | As in Premium/Premium 4hrs (if purchased) | 24x7; Qualified engineer will arrive on-site within 4 hours to handle RMA |
* For RMA (Return Material Authorization) determination completed by 15:00 regional hub time, otherwise shipment will occur next business day with delivery target extended by one day. There are four regional hubs, one located in each of the following: U.S., APAC, Europe and Israel. Next day delivery during weekends is possible at no extra charge upon request.
** This service is available at selected locations. Please verify availability for your location before purchasing this service level. |
Documentation:
Download the Check Point 3200 Appliance Datasheet (PDF).
הערות תמחור:
- שימו לב: כל המחירים באתר כוללים מע"מ.
- החיוב יבוצע על פי שער "העברות והמחאות מכירה" של המטבע (דולר אמריקאי) ביום אישור ההזמנה.
- מחירי המוצרים וזמינותם כפופים לשינויים ללא הודעה מוקדמת.
המחיר שלנו: הצעת מחיר
*רישיון מיוחד נגד מתקפות כופר
המחיר שלנו: הצעת מחיר
המחיר שלנו: הצעת מחיר
*רישיון מיוחד נגד מתקפות כופר
המחיר שלנו: הצעת מחיר