We performed a comparison between Arbor DDoS and Check Point DDoS Protector based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features include the traffic categorization and control of the traffic. The filtering of the traffic is very precise. When you want to stop some traffic, you precisely stop that traffic."
"Its scalability is big. It is for large deployments of big organizations and service providers."
"Reporting is quite good. There are several pages of reporting on DDoS attacks, and you can find all the details that you need."
"Arbor has a global ranking in reliability and credibility. They are very unique and can respond to a very wide scope of threats from their global deployment."
"The quality of the technical support provided by Arbor DDoS is premium."
"We are able to respond quickly and prevent DDoS attacks."
"I like all the features together as a whole."
"The artificial intelligence feature is most appreciated. This solution can lower the throughput and clear the traffic, which is something really important for us. It also provides good protection. It is user-friendly, and its integration has also been really fast. We have many critical applications, and it was easy to integrate Arbor DDoS with our website, mobile application, and web banking."
"Check Point DDoS Protector is a product that uses machine learning and behavior analysis."
"Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point."
"It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
"From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution."
"One of its most outstanding functions is the zero-day DDOS."
"It uses several layers of security."
"Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."
"As our business continues to grow, we can grow this product simultaneously."
"It is an expensive product, so there is room for improvement in terms of pricing."
"If we want to see live traffic, we can see do so. But once an attack that lasts for five minutes is done, the data is no longer there. It would be an improvement if we could see recent traffic in the dashboard. We can check and download live traffic, but a past attack, with all the details, such as why it happened and how to mitigate and prevent such future attacks, would be helpful to see."
"The solution could be more granular to include logs per second and enhanced pipeline monitoring for router licenses."
"I would also like more visibility into their bad actor feeds, their fingerprint feeds. We try to be good stewards of the internet, so if there are attacks, or bad actors within our networks, if there were an easier way for us to find them, we could stop them from doing their malicious activity, and at the same time save money."
"There should be an automatic way to configure it to monitor traffic and decide which is an attack and which is not. In Arbor, you need to tweak and set all parameters manually, whereas in Check Point DDoS Protector, you can select the lowest parameters, and over the weeks, Check Point DDoS Protector will learn the traffic and you can then tighten some of the parameters to decide which traffic is regular and which is malicious."
"They should improve the reporting section and make it a little bit more detailed. I would like to have much better and more detailed reports."
"A small improvement could be a better reporting system."
"The solution's IT support needs improvement."
"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."
"It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
"The Check Point support language is only in English."
"I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes."
"Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."
"It is an expensive tool for some companies."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."
Arbor DDoS is ranked 2nd in Distributed Denial of Service (DDOS) Protection with 46 reviews while Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews. Arbor DDoS is rated 8.6, while Check Point DDoS Protector is rated 8.0. The top reviewer of Arbor DDoS writes "A critical solution for security, as it includes features that can automatically detect and prevent DDoS attacks". On the other hand, the top reviewer of Check Point DDoS Protector writes "Good machine learning, low false positives, and great zero-day DDOS protection". Arbor DDoS is most compared with Radware DefensePro, Cloudflare, Corero, Imperva DDoS and A10 Thunder TPS, whereas Check Point DDoS Protector is most compared with Radware DefensePro, Cloudflare and Fortinet FortiDDoS. See our Arbor DDoS vs. Check Point DDoS Protector report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.