Check Point 3200 High Availability Firewall

by
CHECK POINT
PCN#
7PT556
MFG#
CPAPSG3200NGTPSSDLCM
$10,732.45
cps

Extended & Accidental Damage Protection Plans Available Details

  Free Shipping
Estimated Shipment:

Calculating Shipping

Product Highlights:
  • 5 Port
  • 10/100/1000Base
  • T

Show more

Product Condition: New and Factory Fresh
Shipping Weight: 1 lbs.
Check Point 3200 High Availability Firewall
Tech Specs
Specifications

Manufacturer

Check Point Software Technologies, Ltd

Manufacturer Part Number

CPAP-SG3200-NGTP-SSD-LCM

Manufacturer Website Address

http://www.checkpoint.com

Brand Name

Check Point

Product Model

3200

Product Name

3200 High Availability Firewall

Marketing Information

The Check Point 3200 Appliance combines the most comprehensive security protections to safeguard your branch and small office deployments. The 3200 appliance is available in a compact desktop form factor with a 320 GB hard disk. This powerful security appliance is optimized to deliver real-world threat prevention to secure your critical assets and environments.

COMPREHENSIVE THREAT PREVENTION

The rapid growth of malware, growing attacker sophistication and the rise of new unknown zero-day threats require a different approach to keep enterprise networks and data secure. Check Point delivers fully integrated, comprehensive Threat Prevention with award-winning SandBlastâ„¢ Threat Emulation and Threat Extraction for complete protection against the most sophisticated threats and zero-day vulnerabilities.

ALL-INCLUSIVE SECURITY SOLUTIONS

Check Point 3200 Appliances offer a complete and consolidated security solution available in two complete packages:

  • NGTP: prevent sophisticated cyber-threats with IPS, Application Control, Antivirus, Anti-Bot, URLFiltering and Email Security.
  • NGTX: NGTP with SandBlast Zero-Day Protection, which includes Threat Emulation and Threat Extraction.

INSPECT ENCRYPTED CONNECTIONS

There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered in to the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data.

BEST-IN-CLASS MANAGEMENT

Every Check Point appliance can either be managed locally with its available integrated security management or via central unified management. Using local management, the appliance can manage itself and one adjacent appliance for high availability deployments. When centrally managed administrators can define security policy for the entire network - including internal security, main sites, and remote sites - from a single, centrally located Check Point Security Management server.

PREVENT KNOWN AND ZERO-DAY THREATS

The 3200 Appliance protects organizations from both known and unknown threats with Antivirus, Anti-Bot, SandBlast Threat Emulation (sandboxing), and SandBlast Threat Extraction technologies.

As part of the Check Point SandBlast Zero-Day Protection solution, the cloud-based Threat Emulation engine detects malware at the exploit phase, even before hackers can apply evasion techniques attempting to bypass the sandbox. Files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before it enters your network. This innovative solution combines cloud-based CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous exploits, and zero-day and targeted attacks.

Furthermore, SandBlast Threat Extraction removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.

Product Type

High Availability Firewall
Technical Information

Firewall Protection Supported

  • AntiBot
  • Antivirus
  • URL Filtering
  • Threat Protection
  • Application Control
  • Firewall Authentication
  • Cyber Assault Protection
  • Malware Protection
  • Zero Day Event
  • Email Security
  • Secure IPsec VPN Connectivity

Encryption Standard

AES (128-bit)
Interfaces/Ports

Total Number of Ports

5

USB

Yes

Number of Network (RJ-45) Ports

5
Network & Communication

Ethernet Technology

Gigabit Ethernet

Network Standard

10/100/1000Base-T
Management & Protocols

Manageable

Yes
Physical Characteristics

Form Factor

Desktop

Height

1.7"

Width

8.3"

Depth

8.3"

Weight (Approximate)

2.87 lb