The document discusses the Check Point DDoS Protector solution for mitigating denial of service (DDoS) attacks. It provides an overview of trends in DDoS attacks, the requirements for an effective DDoS mitigation solution, and the capabilities of Check Point's DDoS Protector. The DDoS Protector uses network behavioral analysis and real-time signatures to detect attacks within seconds and narrow filtering rules to block only malicious traffic. It provides protections at both the network and application layers and can scale to handle multi-gigabit attacks. The solution also includes deployment options for on-premise or outsourced mitigation and supports symmetric and some asymmetric network topologies.