Check Point DDoS Protector OverviewUNIXBusinessApplication

Check Point DDoS Protector is the #14 ranked solution in our list of top Distributed Denial of Service (DDOS) Protection tools. It is most often compared to Radware DefensePro: Check Point DDoS Protector vs Radware DefensePro

What is Check Point DDoS Protector?

Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage
Learn more about Ddos Protector.


Buyer's Guide

Download the Distributed Denial of Service (DDOS) Protection Buyer's Guide including reviews and more. Updated: September 2021

Check Point DDoS Protector Customers

Boston Properties

Check Point DDoS Protector Video

Pricing Advice

What users are saying about Check Point DDoS Protector pricing:
  • "The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Basil Dange
Senior Manager at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
Good support and effective against SSL attacks, but the dashboard is complicated

What is our primary use case?

We use this product as our DDoS mitigation solution. This is something that needs to be able to protect against DDoS attacks for Volumetric, Low, and Slow attacks across layer three to layer seven. The solution also needs to integrate with a scrubbing center and route traffic in the case of a volumetric attack. It must also have deep knowledge of DNS traffic behavior and must have early and accurate detection/mitigation. A DDoS mitigation solution must be able to handle high rates of DNS packets and provide the best quality of experience, even under attack. It must also be able to allow or… more »

Pros and Cons

  • "This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform."
  • "It does not provide the capability to upload data for blacklisting/whitelisting in bulk."

What other advice do I have?

My advice for anybody who is considering this product is to evaluate based on the following points: * Where you want to place or installed your DDOS appliance. * What throughput mitigation is required. * Whether the device supports cloud signaling. * Determine whether the SSL decryption card is available with the box or needs to be purchased in addition. * License and port requirements in terms of whether you need copper or fiber.
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
Real User
Top 5Leaderboard
Good performance and a small number of false positives helps to transparently and reliably prevents attacks

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters consisting of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point DDoS Protector 20 is directly connected to one of the ISPs we are… more »

Pros and Cons

  • "The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
  • "For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."