We performed a comparison between Arbor DDoS and Check Point DDoS Protector based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Using standard BGP, NetFlow and SNMP ensure wide compatibility. There are also peering traffic reports that can help identify upstream peering opportunities. The ATLAS aggregation service allows us to contribute to the global DDoS data and benefit from overall trends."
"The stability is okay and we have not encountered problems with the solution."
"We also use it by serving our customers' cloud signaling services with on-premise APS devices."
"There are a number of valuable features in this product, like Cloud Signaling and Threat Intelligence feeds."
"The solution provides good protection against volumetric DDoS attacks."
"Arbor DDoS's best feature is that we can put the certificates in, and it will look at layer seven and the encrypted traffic and do the required signaling."
"In the GUI, the packet capture is a very good option, as is the option to block an IP address."
"We use it not only for DDoS detection and protection, but we also use it for traffic analysis and capacity planning as well. We've also been able to extend the use of it to other security measures within our company, the front-line defense, not only for DDoS, but for any kind of scanning malware that may be picked up. It's also used for outbound attacks, which has helped us mitigate those and lower our bandwidth costs..."
"Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point."
"From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution."
"Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."
"It uses several layers of security."
"As our business continues to grow, we can grow this product simultaneously."
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
"One of its most outstanding functions is the zero-day DDOS."
"It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
"There should be an automatic way to configure it to monitor traffic and decide which is an attack and which is not. In Arbor, you need to tweak and set all parameters manually, whereas in Check Point DDoS Protector, you can select the lowest parameters, and over the weeks, Check Point DDoS Protector will learn the traffic and you can then tighten some of the parameters to decide which traffic is regular and which is malicious."
"Because we had some routers that were somewhat old, they were not integrated with Arbor. They did not support the NetFlow version that Arbor was running. That was a challenge. We had to upgrade the routers. Some backward-compatibility would be helpful."
"The solution could be more granular to include logs per second and enhanced pipeline monitoring for router licenses."
"There is definitely room for improvement in third-party intelligence and integrations."
"For troubleshooting problems, it's not so intuitive. It's not straightforward. This is the core of their kernel, so they need to improve it a little bit... In F5 I have full control of everything."
"I would also like more visibility into their bad actor feeds, their fingerprint feeds. We try to be good stewards of the internet, so if there are attacks, or bad actors within our networks, if there were an easier way for us to find them, we could stop them from doing their malicious activity, and at the same time save money."
"On the application layer, they could have a better distributed traffic flow. They could improve that a bit. For network data it is very effective, but the application layer can be improved."
"We need a SaaS model for the solution."
"The solution should greatly improve its interface."
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."
"It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
"Monitoring and reporting are the things that can be introduced in the future."
"Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."
"The Check Point support language is only in English."
"I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
Arbor DDoS is ranked 2nd in Distributed Denial of Service (DDOS) Protection with 46 reviews while Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews. Arbor DDoS is rated 8.6, while Check Point DDoS Protector is rated 8.0. The top reviewer of Arbor DDoS writes "A critical solution for security, as it includes features that can automatically detect and prevent DDoS attacks". On the other hand, the top reviewer of Check Point DDoS Protector writes "Great for validating requests, offer personalized protection, and prevents attacks". Arbor DDoS is most compared with Radware DefensePro, Cloudflare, Corero, Imperva DDoS and A10 Thunder TPS, whereas Check Point DDoS Protector is most compared with Radware DefensePro and Cloudflare. See our Arbor DDoS vs. Check Point DDoS Protector report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.