We performed a comparison between A10 Thunder TPS and Check Point DDoS Protector based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."They give us the ability to configure many features for DDoS. There are many items that we can use."
"The most valuable feature of A10 Thunder TPS is load balancing."
"The primary benefit that we see from their systems is that their filtering technology has the ability to detect and drop the malicious traffic from the legitimate traffic with a high success rate. That, in combination with the very small effort needed to manage their systems, are the two most important benefits to us."
"Thunder TPS has automated mitigation and fully managed support in case the device cannot handle the attack. They have engineers available to respond."
"We can keep track of all the customer's requirements. We can forecast our trails and we can forecast our overall financial things."
"We selected the solution because of its programmable automated defense using RESTful API. We didn't want to connect to the box. We wanted to be able to do some automation. We wanted to have our own portal because we wanted to connect our customers to our own UI using the A10 API. It has been good and exactly what we need."
"The solution's support is one of the coolest things about the product. I"
"The response time to an attack is instant. We've used some outsourced solutions in the past, out in the cloud, that weren't so quick. But it's all within our control now. We control how fast it mitigates."
"Check Point DDoS Protector is a product that uses machine learning and behavior analysis."
"This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform."
"It uses several layers of security."
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
"As our business continues to grow, we can grow this product simultaneously."
"This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security."
"It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
"Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."
"They have a cloud scrubbing feature that redirects the traffic if the on-prem appliance can't accommodate a large amount of traffic but it's not available where we are."
"It is very difficult to implement. It should be made a bit easier to implement. There is also a lack of resources on the internet. They need to develop more resources."
"We currently do not use the solution's machine-learning-powered Zero-day Automated Protection because of an issue with it... We also use the aGalaxy platform, which is a management platform for the TPS devices. The issue is that some TPS features were added at the TPS level but weren't carried over to aGalaxy, and we manage all of our devices through aGalaxy. So we can't actually use some of the new features that are available on the TPS because that functionality doesn't exist in aGalaxy. That is one of my biggest complaints."
"If there's one aspect of A10 that needs improvement it would be the training. All of their training is done online, at least in what we've been exposed to. I would like to have a classroom environment for training... It would give [people] a chance to provision it."
"The upgrade process for the boxes is not efficient. We have to go through the A10 aGalaxy where we have issues, like timeouts. They told me it was fixed in the latest version, but I tried to do it on the Portal and it is not working all the time."
"We have had some issues with implementation. So, it is the only area that needs improvement."
"The solution is a little expensive."
"I would like for them to develop an advanced reporting feature."
"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."
"It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
"I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes."
"Monitoring and reporting are the things that can be introduced in the future."
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."
"The mitigation part could be improved."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
"The solution should greatly improve its interface."
A10 Thunder TPS is ranked 16th in Distributed Denial of Service (DDOS) Protection with 12 reviews while Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews. A10 Thunder TPS is rated 8.8, while Check Point DDoS Protector is rated 8.0. The top reviewer of A10 Thunder TPS writes "A highly stable solution that can be used for load balancing". On the other hand, the top reviewer of Check Point DDoS Protector writes "Good support and effective against SSL attacks, but the dashboard is complicated". A10 Thunder TPS is most compared with Arbor DDoS, Cloudflare, Corero, Radware DefensePro and Imperva DDoS, whereas Check Point DDoS Protector is most compared with Radware DefensePro, Arbor DDoS, Cloudflare, Fortinet FortiDDoS and Akamai App and API Protector. See our A10 Thunder TPS vs. Check Point DDoS Protector report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.