CheckPoint Software > Case Studies > Enhancing Network Security and Efficiency with Check Point DDoS Protector Appliances

Enhancing Network Security and Efficiency with Check Point DDoS Protector Appliances

CheckPoint Software Logo
Technology Category
  • Analytics & Modeling - Real Time Analytics
  • Networks & Connectivity - Ethernet
Applicable Industries
  • Electronics
  • National Security & Defense
Applicable Functions
  • Maintenance
Use Cases
  • Tamper Detection
  • Traffic Monitoring
Services
  • System Integration
About The Customer
The customer is a leading enterprise software developer with a deep tradition of leadership and innovation in its field. The company has nearly 3000 employees and operates dozens of sites worldwide, serving tens of thousands of end customers. Like most large organizations, the software developer relies heavily on its data center to power its most critical business processes and store essential data. The company was facing significant challenges in protecting its data center from DDoS attacks and other network threats, and needed a solution that could provide advanced security and manageability.
The Challenge
A major enterprise software developer, with nearly 3000 employees and dozens of sites worldwide, was facing significant challenges in safeguarding its data center from Distributed Denial of Service (DDoS) attacks and other network threats. The company's existing security appliance was aging and could not provide the level of security and manageability required to maintain internal security requirements. The company needed a solution that could block current and emerging attacks with customized protection, minimize manual IT processes for efficiency, and improve IT visibility throughout the network. The fluctuating incoming traffic from its Internet content delivery network often led to legitimate traffic being dropped due to the lack of intelligence in the existing security system.
The Solution
The company adopted the Check Point DDoS Protector Appliance, which enabled it to discover and block Denial of Service attacks in seconds, while streamlining its network administration and improving insight into the network. The appliance was easy to deploy and use, and provided in-depth network visibility. The company installed a DDoS Protector Appliance at each of its two Internet routers, each having a multimode fiber Gigabit Ethernet uplink to the company’s ISP, and fully protected by the appliance. The built-in intelligence of the solution quickly distinguished between attacks and legitimate traffic. The Check Point DDoS Protector Appliance was designed to smoothly accommodate a wide range of network environments, fitting seamlessly into the software developer’s topology, while providing plenty of room to grow.
Operational Impact
  • The Check Point DDoS Protector Appliance has significantly improved the company's network security and efficiency. The solution's intelligent, accurate attack prevention capabilities have minimized the dropping of legitimate traffic, enhancing the company's operational efficiency. The comprehensive solution has improved network insight, allowing the company to discover threats without manual intervention and troubleshooting. The flexible deployment and scalability of the solution have also catered to the company's changing needs, with plans to extend the deployment to more sales offices. The company has become more security conscious and has gained more knowledge about its own network due to the visibility provided by the Check Point solution.
Quantitative Benefit
  • Automated, multi-layered protection blocks attacks in real time, defending against network flood and application layer attacks
  • Fast, easy deployment provides immediate protection, with the device configured to provide complete protection in about a day
  • Integrated Check Point Security Management enhances visibility, delivering real-time threat management information to block threats fast

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.