Sidebar Sidebar Sidebar

Check Point Software Technologies CPAP-SG1200R-NGFW 1200R NEXT

Write a Review
$3,315.01
$1,841.67
(You save $1,473.34 )

Have questions?

Adding to cart… The item has been added
SKU: CPAP-SG1200R-NGFW
Availability: In Stock
Weight: 2.65 LBS
Shipping: Calculated at Checkout
IPS/IDS throughput: 60 Mbit/s
Firewall (UDP 1518) throughput: 2 Gbit/s
Firewall throughput: 0.7 Gbit/s
VPN throughput: 0.45 Gbit/s
Security power: 49
LED indicators: Yes
Web-based management: Yes
USB 3.2 Gen 1 (3.1 Gen 1) Type-A ports quantity: 1
SFP module slots quantity: 2
Gigabit Ethernet (copper) ports quantity: 6
Connectivity technology: Wired
USB 2.0 ports quantity: 1
WAN connection: Ethernet (RJ-45)
Ethernet LAN (RJ-45) ports: 4
Ethernet DMZ ports quantity: 1
Ethernet LAN data rates: 10,100,1000 Mbit/s
Console port: RJ-45
Compatible memory cards: SD
Card reader integrated: Yes
Number of console ports: 1
AC input voltage: 100-240 V
AC input frequency: 50 - 60 Hz
Power consumption (max): 15 W
Operating temperature (T-T): -40 - 75 °C
Operating relative humidity (H-H): 20 - 90%
Dimensions (WxDxH): 6.3 x 4.72 x 1.65 (160 x 120 x 42 mm)"
Cables included: LAN (RJ-45), Serial
46C566DB-4644-460E-8DA7-038C0B9646AB E06A9D60-42A9-4459-8131-FA3002495928
Industrial Control Systems (ICS) used in critical infrastructure and manufacturing industries are targets of sophisticated cyberattacks. The Check Point 1200R rugged appliance line delivers proven, integrated security for deployment in harsh environments as part of a complete end-to-end ICS security solution.Wide range of appliances for IT and OT networksThe 1200R Rugged Appliance complements our extensive appliance family to support a diverse range of deployment environments and meet specialized requirements in ICS security. The 1200R complies with industrial specifications such as IEEE 1613 and IEC 61850-3 for heat, vibration and immunity to electromagnetic interference (EMI). In addition, the 1200R is certified for maritime operation per IEC-60945 and IACS E10 and complies with DNV 2.4. The 1200R Appliances can also be used in commercial deployments.Inspect Encrypted ConnectionsThere is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data.Next-Generation FirewallCheck Point Application Control has broad support for specialized Industrial Control System and SCADA protocols with granularity for over 800 SCADA specific commands. This enables protocol-specific visibility and controls with directional awareness.For instance, administrators are able to create a policy to prevent monitoring and reporting systems from performing write operations to control systems. Furthermore, our protocol decoder enables granular control at the command level, such as read/write/get for specific units, function codes and address ranges.Protocol Support Includes: BACNet CIP DNP3 IEC-60870-5-104 IEC 60870-6 (ICCP) IEC 61850 MMS Modbus OPC Profinet S7 (Siemens)Support for additional protocols is available on request.Integrated threat detection and preventionDetect and prevent targeted attacks against ICS/SCADA components in Operational Technology (OT) environments with specific protections for these highly vulnerable, unpatched, legacy embedded systems. Our threat prevention technologies have the best catch rate in the industry and can be deployed in detect-mode to minimize the disruption of operational processes.Best-in-class managementAdministrators can define security policy for the entire network — including internal security, main sites, and remote sites — from a single, centrally located Check Point Security Management server. With SmartProvisioning™, a profile-based management approach designed for large- scale deployments, administrators can define a single security and device profile and apply it simultaneously to thousands of appliances — dramatically reducing deployment time and administrative overhead.With compliance built-in, you can meet and exceed emerging regulatory and other ICS cyber security requirements cyber security requirements such as NERC-CIP. We constantly monitor the compliance status of the organization with hundreds of best practices, enabling network security managers to quickly assess the strength of the current policy settings and where improvements are needed.

Customers Also Viewed