Check Point DDoS Protector vs Lumen DDoS Mitigation comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point DDoS Protector and Lumen DDoS Mitigation based on real PeerSpot user reviews.

Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection.
To learn more, read our detailed Distributed Denial of Service (DDOS) Protection Report (Updated: April 2024).
767,667 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
  • "It's an expensive solution. It's one of the most expensive solutions in the world. It's cheaper than Palo Alto and Cisco but these are expensive solutions. Fortinet is cheaper."
  • "The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
  • "I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on."
  • More Check Point DDoS Protector Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Distributed Denial of Service (DDOS) Protection solutions are best for your needs.
    767,667 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.
    Top Answer:I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on.
    Top Answer:Some features are more advanced, however, using them is hard for us. The documentation is not as precise and does not have enough examples to understand how it works. Advanced knowledge is required to… more »
    Ask a question

    Earn 20 points

    Ranking
    Views
    738
    Comparisons
    442
    Reviews
    7
    Average Words per Review
    518
    Rating
    8.0
    Views
    730
    Comparisons
    579
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Black Lotus, CenturyLink DDoS Mitigation
    Learn More
    Overview

    Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage
    Learn more about Ddos Protector.


    Today’s Distributed Denial of Service (DDoS) attacks are growing in size, frequency and complexity. No enterprise is immune to these threats. Application availability, website uptime and infrastructure accessibility are all critical for business continuity. Every minute of downtime can result in lost productivity and revenue. Scrubbing center mitigation techniques alone are not designed to manage today’s massive, highly sophisticated and distributed attacks. To defend against a variety of attack types, it’s essential to deploy a multi-layered security approach backed by extensive threat research. CenturyLink provides layers of defense through enhanced network routing, rate limiting and filtering that can be paired with advanced network-based detection and mitigation scrubbing center solutions. Our mitigation approach is informed by threat intelligence derived from visibility across our global infrastructure and data correlation. Tailored for any business and IT/security budget, our flexible managed service can proactively detect and mitigate the threats of today to help ensure business-as-usual for employees, partners and customers.

    Sample Customers
    Boston Properties
    TMG Health, MetalForming Inc., Atlantic 10 Conference, Spil Games, Tickets.com
    Top Industries
    REVIEWERS
    Security Firm42%
    Financial Services Firm25%
    Cloud Provider17%
    Computer Software Company8%
    VISITORS READING REVIEWS
    Security Firm20%
    Financial Services Firm16%
    Manufacturing Company11%
    Comms Service Provider9%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Government9%
    Retailer8%
    Financial Services Firm8%
    Company Size
    REVIEWERS
    Small Business72%
    Midsize Enterprise6%
    Large Enterprise22%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise11%
    Large Enterprise59%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise19%
    Large Enterprise62%
    Buyer's Guide
    Distributed Denial of Service (DDOS) Protection
    April 2024
    Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection. Updated: April 2024.
    767,667 professionals have used our research since 2012.

    Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews while Lumen DDoS Mitigation is ranked 26th in Distributed Denial of Service (DDOS) Protection. Check Point DDoS Protector is rated 8.0, while Lumen DDoS Mitigation is rated 0.0. The top reviewer of Check Point DDoS Protector writes "Good support and effective against SSL attacks, but the dashboard is complicated". On the other hand, Check Point DDoS Protector is most compared with Radware DefensePro, Arbor DDoS, Cloudflare and Fortinet FortiDDoS, whereas Lumen DDoS Mitigation is most compared with Cloudflare, Prolexic, Arbor DDoS and Corero.

    See our list of best Distributed Denial of Service (DDOS) Protection vendors.

    We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.