A10 Thunder TPS vs Check Point DDoS Protector comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between A10 Thunder TPS and Check Point DDoS Protector based on real PeerSpot user reviews.

Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed A10 Thunder TPS vs. Check Point DDoS Protector Report (Updated: March 2024).
765,234 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"They give us the ability to configure many features for DDoS. There are many items that we can use.""The most valuable feature of A10 Thunder TPS is load balancing.""The primary benefit that we see from their systems is that their filtering technology has the ability to detect and drop the malicious traffic from the legitimate traffic with a high success rate. That, in combination with the very small effort needed to manage their systems, are the two most important benefits to us.""Thunder TPS has automated mitigation and fully managed support in case the device cannot handle the attack. They have engineers available to respond.""We can keep track of all the customer's requirements. We can forecast our trails and we can forecast our overall financial things.""We selected the solution because of its programmable automated defense using RESTful API. We didn't want to connect to the box. We wanted to be able to do some automation. We wanted to have our own portal because we wanted to connect our customers to our own UI using the A10 API. It has been good and exactly what we need.""The solution's support is one of the coolest things about the product. I""The response time to an attack is instant. We've used some outsourced solutions in the past, out in the cloud, that weren't so quick. But it's all within our control now. We control how fast it mitigates."

More A10 Thunder TPS Pros →

"Check Point DDoS Protector is a product that uses machine learning and behavior analysis.""This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.""It uses several layers of security.""The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.""As our business continues to grow, we can grow this product simultaneously.""This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.""It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.""Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."

More Check Point DDoS Protector Pros →

Cons
"They have a cloud scrubbing feature that redirects the traffic if the on-prem appliance can't accommodate a large amount of traffic but it's not available where we are.""It is very difficult to implement. It should be made a bit easier to implement. There is also a lack of resources on the internet. They need to develop more resources.""We currently do not use the solution's machine-learning-powered Zero-day Automated Protection because of an issue with it... We also use the aGalaxy platform, which is a management platform for the TPS devices. The issue is that some TPS features were added at the TPS level but weren't carried over to aGalaxy, and we manage all of our devices through aGalaxy. So we can't actually use some of the new features that are available on the TPS because that functionality doesn't exist in aGalaxy. That is one of my biggest complaints.""If there's one aspect of A10 that needs improvement it would be the training. All of their training is done online, at least in what we've been exposed to. I would like to have a classroom environment for training... It would give [people] a chance to provision it.""The upgrade process for the boxes is not efficient. We have to go through the A10 aGalaxy where we have issues, like timeouts. They told me it was fixed in the latest version, but I tried to do it on the Portal and it is not working all the time.""We have had some issues with implementation. So, it is the only area that needs improvement.""The solution is a little expensive.""I would like for them to develop an advanced reporting feature."

More A10 Thunder TPS Cons →

"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support.""It does not provide the capability to upload data for blacklisting/whitelisting in bulk.""I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes.""Monitoring and reporting are the things that can be introduced in the future.""For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version.""The mitigation part could be improved.""The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer.""The solution should greatly improve its interface."

More Check Point DDoS Protector Cons →

Pricing and Cost Advice
  • "The financials are always a challenge with this type of technology. That's not really a product-functionality thing but it's the area where we push A10 the most."
  • "We had a customer who was down for six hours and the loss of revenue for him was three times the price he was paying for us per year. The customer just said, "I don't care about paying you because on only one attack I saved money. It's three times better than losing money.""
  • "Pricing was much higher with Arbor (APS) for the same type of solution."
  • "Pricing is very reasonable."
  • "We may need to pay fifty percent more if we purchase other solutions. For the payments made to A10 Thunder TPS, we have received three-year support."
  • "We did a price survey, and compared to other solutions, A10 Thunder TPS wasn't cheap."
  • More A10 Thunder TPS Pricing and Cost Advice →

  • "It's an expensive solution. It's one of the most expensive solutions in the world. It's cheaper than Palo Alto and Cisco but these are expensive solutions. Fortinet is cheaper."
  • "The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
  • "I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on."
  • More Check Point DDoS Protector Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Distributed Denial of Service (DDOS) Protection solutions are best for your needs.
    765,234 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of A10 Thunder TPS is load balancing.
    Top Answer:We did a price survey, and compared to other solutions, A10 Thunder TPS wasn't cheap.
    Top Answer:The solution is a little expensive.
    Top Answer:It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.
    Top Answer:I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on.
    Top Answer:Some features are more advanced, however, using them is hard for us. The documentation is not as precise and does not have enough examples to understand how it works. Advanced knowledge is required to… more »
    Ranking
    Views
    1,227
    Comparisons
    818
    Reviews
    4
    Average Words per Review
    277
    Rating
    8.8
    Views
    773
    Comparisons
    471
    Reviews
    7
    Average Words per Review
    518
    Rating
    8.0
    Comparisons
    Learn More
    Overview

    The Thunder TPS is a family of high-performance DDoS defense solutions that detect and mitigate multi-vector DDoS attacks. Unlike traditional DDoS defenses that leave a wake of collateral damage against users, Thunder TPS applies a source-based defense-in-depth mitigation pipeline. This multimodal defense that includes actionable DDoS weapons intelligence, operator definable adaptive policies, and machine learning-powered Zero-Day Automated Protection (ZAP) blocks attackers while protecting real users.

    The Thunder TPS is uniquely suited for communication service providers, online gaming, and enterprise network operators who protect large networks and need compact solutions with faster response from a fully automated, zero-touch defense during an attack.

    Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage
    Learn more about Ddos Protector.


    Sample Customers
    DDoS defense solution trusted for more than 200 service providers, online gaming, and enterprises including; Bungie, Comcast, KDDI Corporation, Leaseweb, Microsoft Azure, NTT Docomo, Softbank, Turkcell Superonline, Verizon and more.
    Boston Properties
    Top Industries
    REVIEWERS
    Comms Service Provider40%
    Cloud Provider10%
    Media Company10%
    Computer Software Company10%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Comms Service Provider14%
    Financial Services Firm13%
    Government9%
    REVIEWERS
    Security Firm42%
    Financial Services Firm25%
    Cloud Provider17%
    Computer Software Company8%
    VISITORS READING REVIEWS
    Security Firm21%
    Financial Services Firm17%
    Comms Service Provider10%
    Computer Software Company9%
    Company Size
    REVIEWERS
    Small Business33%
    Midsize Enterprise33%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise28%
    Large Enterprise48%
    REVIEWERS
    Small Business72%
    Midsize Enterprise6%
    Large Enterprise22%
    VISITORS READING REVIEWS
    Small Business32%
    Midsize Enterprise13%
    Large Enterprise56%
    Buyer's Guide
    A10 Thunder TPS vs. Check Point DDoS Protector
    March 2024
    Find out what your peers are saying about A10 Thunder TPS vs. Check Point DDoS Protector and other solutions. Updated: March 2024.
    765,234 professionals have used our research since 2012.

    A10 Thunder TPS is ranked 16th in Distributed Denial of Service (DDOS) Protection with 12 reviews while Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews. A10 Thunder TPS is rated 8.8, while Check Point DDoS Protector is rated 8.0. The top reviewer of A10 Thunder TPS writes "A highly stable solution that can be used for load balancing". On the other hand, the top reviewer of Check Point DDoS Protector writes "Good support and effective against SSL attacks, but the dashboard is complicated". A10 Thunder TPS is most compared with Arbor DDoS, Cloudflare, Corero, Radware DefensePro and Imperva DDoS, whereas Check Point DDoS Protector is most compared with Radware DefensePro, Arbor DDoS, Cloudflare, Fortinet FortiDDoS and Akamai App and API Protector. See our A10 Thunder TPS vs. Check Point DDoS Protector report.

    See our list of best Distributed Denial of Service (DDOS) Protection vendors.

    We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.