Check Point Quantum 3600 in Cary, NC, USA
New
Doubleclick to zoom in
Contact the seller for
additional photos and information.
Specifications
- Condition
- new
- Threat prevention (mbps)1
- 780
- Ngfw2 (gbps)
- 1.5
- Ips throughput (gbps)
- 1.99
- Firewall throughput (gbps)
- 3.3
- Firewall 1518b udp (gbps)
- 4
- Vpn aes-128 (gbps)
- 2.71
- Connections per second
- 32,000
- Concurennt connections
- 2M
- Highlights
- 1x CPUs, 4 physical cores 1x 240 GB SSD storage 8 GB memory Virtual Systems (maximum): 5
- First time prevention capabilities
- CPU-level, OS-level and static file analysis File disarm and reconstruction via Threat Extraction Average emulation time for unknown files that require full sandbox evaluation is under 100 seconds Maximal file size for Emulation is 100 MB Emulation OS Support: Windows XP, 7, 8.1, 10
- Applications
- Use 8,000+ pre-defined or customize your own applications Accept, prevent, schedule, and apply traffic-shaping
- Data loss prevention
- Classify 700+ pre-defined data types End user and data owner incident handling
- Dynamic user-based policy
- Integrates with Microsoft AD, LDAP, RADIUS, Cisco pxGrid, Terminal Servers and with 3rd parties via a Web API Enforce consistent policy for local and remote users on Windows, macOS, Linux, Android and Apple iOS platforms
- Network connectivity
- Total physical and virtual (VLAN) interfaces per appliance: 1024/4096 (single gateway/with virtual systems) 802.3ad passive and active link aggregation Layer 2 (transparent) and Layer 3 (routing) mode
- High availability
- Active/Active L2, Active/Passive L2 and L3 Session failover for routing change, device and link failure ClusterXL or VRRP
- Ipv6
- NAT66, NAT64, NAT46 CoreXL, SecureXL, HA with VRRPv3
- Unicast and multicast routing (see sk98226)
- OSPFv2 and v3, BGP, RIP Static routes, Multicast routes Policy-based routing PIM-SM, PIM-SSM, PIM-DM, IGMP v2, and v3
- Single power supply rating
- 40W
- Ac power input
- 100 to 240V (50-60Hz)
- Power consumption max
- 24.2W
- Maximum thermal output
- 82.6 BTU/hr.
- Enclosure
- Desktop
- Dimensions (wxdxh)
- 8.3 x 8.3 x 1.65 in. (210 x 210 x 42mm)
- Weight
- 3.1 lbs. (1.4 kg)
- Operating
- 0° to 40°C, humidity 95%
- Storage
- –20° to 70°C, humidity 95%
- Safety
- UL, CB, CE, TUV GS
- Emissions
- FCC, CE, VCCI, RCM/C-Tick
- Environmental
- RoHS, WEEE, REACH, ISO14001
- Next-gen firewall (ngfw) segment networks and apply zero trust policy with ips
- Accept, prevent, schedule, and apply traffic-shaping based controls to application traffic 10,000+ pre-defined apps or customize your own application Protect vulnerable systems with 12,000+ IPS protections
- Next-gen threat prevention (ngtp) ai deep learning dns security with antivirus and anti-bot prevents threats
- DNS security prevents Command & Control (C2) connections and blocks data theft through DNS tunneling Antivirus stops incoming malicious files and links in web, email, FTP and SMB content Anti-Bot detects infected hosts and prevents communications with external C2 servers Apply web and application control using 100+ categories or customize your own
- Sandblast (snbt) comprehensive, multi-layered defense with sandboxing protection from unknown and zero-day threats
- Average emulation time for unknown files that require full sandbox evaluation is under 100 seconds CPU-level, OS-level and static file analysis Maximal file size for Emulation is 15MB
- Iot network protection simple, effective, autonomous discovery and protection of iot devices in minutes
- Passive and active discovery of enterprise IoT devices with autonomous mapping to 200+ profiles IoT attributes include function, manufacturer, model, risk, confidence, VLAN, IP and MAC address Automatically creates and applies an inline zero-trust IoT policy layer
- Sd-wan reliable and optimum network connectivity at the lowest cost
- Link aggregation and link prioritization according to latency, jitter, and packet loss Advanced multi-path orchestration and steering for 10,000+ apps Sub-second failover for overlay and supported applications SLA monitoring and autonomous link swapping
- Iot network protection
- Optional
- Sd-wan network optimization
- Optional
- Category
- IT Infrastructure in USA
- Subcategory
- Machinery
- Subcategory 2
- Check point equipment
- Listing ID
- 106541150
Description
Contact us for lower pricing!
Download Datasheet
Click here to jump to more pricing!
Branch offices need protection against GenV attacks and the flexibility to securely connect to local internet providers. Protecting branch offices requires the Infinity architecture with unified management for on-premise and cloud-delivered security services. The Quantum 3600 and 3800 Security Gateways deliver up to 1.5 Gbps threat prevention performance against GenV attacks with unified management through the on-premise SmartConsole or SmartCloud security management cloud services.
Check Point Quantum 3600 Next Generation Firewalls enables enterprises to deploy the industry’s leading threat prevention capabilities at all points of their infrastructure, scaling security almost infinitely according to their changing business needs. It also dramatically accelerates the efficiency of their security operations.