Call Us Now! +1 402-261-0123
Cart 0
Check Point 4200 Next Generation Data Protection Appliance

Check Point

Check Point 4200 Next Generation Data Protection Appliance

SKU#
$ 6,508.41 $ 8,090.00

Check Point 4200 Appliance offers a complete and consolidated security solution, with high performance in a desktop form factor. The 4200 appliance model offers a collection of security functions from firewall, VPN, IPS, URL filtering, Application control and other software blades, together with Virtual Systems, providing an easy to deploy and easy to manage solution.

Including: Firewall, VPN, Advanced Networking and Clustering, Identity Awareness, Mobile Access for 5 concurrent users,

Next Generation Threat Prevention: IPS, Application Control, Data Loss Prevention blades 1 Year License

Benefits

Delivers superior performance in a simple, compact form factor

  • Leads the industry in price for performance in an all-in-one package
  • Delivers 121 SecurityPower Units in a capable security platform
  • Comes pre-configured with one of our turnkey, next generation security packages
  • Ensures data security by safeguarding remote access and site-to-site communications

Deploys and manages easily

  • Provides wizard-based configuration and simple, local management for device only or up to two gateways
  • Supports most common browsers for remote device administration
  • Offers optional centralized management with Security Management Software Blades

Features

Best-in-class security

 

A small office device does not mean compromising on security. The 4200 Appliance includes the same technologies that the Fortune 100 trusts and relies on. It utilizes the extensible Software Blade Architecture so you can create custom security protection that best fit your business needs.

 

High performance and throughput

 

The 4200 Appliance provides the best processing power and Firewall/IPS throughput in its class.

Thanks to its multi-core technology and high network bandwidth, the processing power of the appliance has been vastly improved over previous-generation devices.

  • 121 SecurityPower Units
  • 4 Gbps in real-world firewall throughput
  • 150 Mbps in real-world IPS throughput

 

Secure remote access

 

The device makes it simple for system administrators and mobile users to securely connect to your corporate network from a mobile device using the included Mobile Access Software Blade. With it, laptop, smartphone and tablet users can safely access email, calendars, contacts and applications. And, thanks to two-factor authentication and user-device pairing, you’ll be able to positively verify authorized users.

 

VPN for secure remote and site-to-site connectivity

 

A VPN is mandatory equipment for small office users, which is why we included the Check Point IPsec VPN Software Blade in the 4200 Appliance. It provides secure access to corporate networks as well as network connectivity between branch offices and business partners. The Software Blade integrates access control, authentication and encryption to guarantee the security of network connections over the Internet.

 

Fast deployment, flexible management

 

You need security devices that set up in no time. That’s why we designed the 4200 Appliance with an intuitive set-up wizard to facilitate initial configuration. These devices use local management for either stand-alone management or to manage itself and one adjacent appliance for high availability purposes. Or you can opt for web-based administration and central management capabilities, which let you manage the device from anywhere in the network and turn on automated updates for greater real-time threat protection.

 

 

Extensible, turnkey security architecture

 

  • Firewall (FW)—create user-based policy and secure connections to corporate networks with IPsec VPN
  • Next Generation Firewall (NGFW)—identify and control applications by user and scan content to stop threats
  • Next Generation Data Protection (NGDP)—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time
  • Next Generation Threat Prevention (NGTP)—prevent sophisticated cyber-threats with IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security
  • Next Generation Threat Extraction (NGTX)—NGTP with Threat Emulation and Threat Extraction for advanced next-generation zero-day threat prevention

Additional software blade upgrades are available to further extend and customize protection options.

Hardware Specifications

Appliance

4200

Performance
SecurityPower1

121

Firewall Throughput (Gbps)
 Raw2

3

 Production4

1.4

VPN AES-128 Throughput (Mbps)

400

IPS Throughput (Mbps)
 Recommended3

300

 Production4

150

Concurrent Connections

1.2M

 Connections per Second

25000

Virtual Systems
Virtual System Support

Yes

Max VS Supported (Default/Max)

3 / 3

Hardware
10/100/1000Base-T Ports

6

1000Base-F SFP Ports 0
10GBase-F SFP+  Ports 0
Memory 4 GB
Storage

250 GB HDD

I/O Expansion Slots 0
LOM NA
Dimensions
Enclosure

Desktop

Dimensions (standard)

8.27" W x 8.25" D x 1.65" H

Dimensions (metric)

210 mm W x 209 mm D x 42 mm H

Weight

2 kg (4.4 lbs.)

Environment
Operating Environment

Temperature: 32° to 104°F / 0° to 40°C

Relative Humidity 5% to 90% (non-condensing)

Non-Operating Environment

Temperature: -40° to 158°F / -20° to 70°C

Relative Humidity 5% - 95% (non-condensing)

Power
Power Input

100~240V, 50~60Hz

Power Supply Spec (Max)

40W

Power Consumption (Max)

35W

Certifications
Safety

Safety: CB, UL, cUL, CSA, TUV

Emissions

CE, FCC VCCI, C-Tick

Environmental

RoHS

1: Check Point's SecurityPower is a new benchmark metric that allows customers to select security appliances by their capacity to handle real-world network traffic, multiple security functions and a typical security policy 2: Raw throughput is based on RFC 3511 with 1518 bytes UDP packets 3: Recommended IPS profile, IMIX traffic blend 4: Assumes maximum production throughput environment with real-world traffic blend, multiple Security Software Blades, a typical rule-base size, NAT and logging enabled and the most secure threat prevention protection

Share this Product


More from this collection