Check Point DDoS Protector vs Corero comparison

Cancel
You must select at least 2 products to compare!
Check Point Software Technologies Logo
738 views|442 comparisons
100% willing to recommend
Corero Logo
1,511 views|1,029 comparisons
83% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point DDoS Protector and Corero based on real PeerSpot user reviews.

Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point DDoS Protector vs. Corero Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.""It uses several layers of security.""This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.""Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point.""One of its most outstanding functions is the zero-day DDOS.""Check Point DDoS Protector is a product that uses machine learning and behavior analysis.""As our business continues to grow, we can grow this product simultaneously.""It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."

More Check Point DDoS Protector Pros →

"It is a good solution. Its vendor support is the most valuable. It is simple and works well if you have Juniper MX routers.""It is an agnostic and transparent inline platform, which means that the maximum visibility of the symmetric and asymmetric traffic is available, even allowing bidirectional detection of the attack.""The most valuable feature of Corero is its ability to handle smaller attacks in terms of the amount of volume and time. You can handle almost 100 perfect of the attacks locally.""The DDoS protection features are valuable.""This is a hybrid solution.""SmartWall devices occupy only one-fourth of the width of a rack unit, making them very easy to install."

More Corero Pros →

Cons
"Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations.""The Check Point support language is only in English.""Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support.""I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes.""It does not provide the capability to upload data for blacklisting/whitelisting in bulk.""The solution should greatly improve its interface.""The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer.""The mitigation part could be improved."

More Check Point DDoS Protector Cons →

"It could use support in Spanish.""The product must provide more Layer 7 capabilities.""The approach taken by Corero is to partner with other organizations in order to address volumetric attacks that cannot be handled by the hardware installed in the infrastructure. Corero does not have a solution for these attacks, so they are looking for partners to help them manage them. This approach is supplemented by local hardware, but the main focus is on the partnerships. It would be beneficial to have a more complete solution.""Juniper is known in our country, but it is not very popular. There is also not enough information about Corero. Our enterprise and financial sectors don't know about this solution. They need to provide more information and do more marketing for this solution in our country.""Lacks international presence."

More Corero Cons →

Pricing and Cost Advice
  • "It's an expensive solution. It's one of the most expensive solutions in the world. It's cheaper than Palo Alto and Cisco but these are expensive solutions. Fortinet is cheaper."
  • "The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
  • "I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on."
  • More Check Point DDoS Protector Pricing and Cost Advice →

  • "Its price is normal."
  • "The price of Corero is affordable."
  • More Corero Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Distributed Denial of Service (DDOS) Protection solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.
    Top Answer:I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on.
    Top Answer:Some features are more advanced, however, using them is hard for us. The documentation is not as precise and does not have enough examples to understand how it works. Advanced knowledge is required to… more »
    Top Answer:The DDoS protection features are valuable.
    Top Answer:The product must provide more Layer 7 capabilities. It must provide deep inspection features.
    Top Answer:We use the solution for DDoS protection in the routers.
    Ranking
    Views
    738
    Comparisons
    442
    Reviews
    7
    Average Words per Review
    518
    Rating
    8.0
    Views
    1,511
    Comparisons
    1,029
    Reviews
    2
    Average Words per Review
    376
    Rating
    8.0
    Comparisons
    Learn More
    Overview

    Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage
    Learn more about Ddos Protector.


    Corero Network Security is dedicated to improving the security and availability of the Internet through the deployment of innovative DDoS & Network Security Solutions. The Corero SmartWall® Threat Defense System (TDS) family of products can be deployed in various topologies, (full edge protection or  scrubbing). the SmartWall Threat Defense System (TDS) family of solutions utilizes modern DDoS mitigation architecture to automatically, and surgically remove DDoS attack traffic, while allowing good user traffic to flow uninterrupted.

    The goal of the Corero automatic DDoS mitigation solution is to protect the customer’s network infrastructure, online services and confidential data from harmful DDoS attacks. The Corero solutions are the highest performing in the industry, while providing the most robust security coverage at unprecedented scale with the lowest total cost of ownership to the customer. These solutions are designed to provide real-time attack mitigation with continuous threat visibility, which allows our customers to also monetize DDoS Protection as-a-Service (DDPaaS) offerings. 

    Sample Customers
    Boston Properties
    Telesystem, Jagex, Hivelocity, Los Angeles Dedicated, Netrics hosting, Hyve, Zacks Investment Research, Dynamic Business Systems, G4BOX INC., GamersFirst, Fastmetrics, San Miguel County
    Top Industries
    REVIEWERS
    Security Firm42%
    Financial Services Firm25%
    Cloud Provider17%
    Computer Software Company8%
    VISITORS READING REVIEWS
    Security Firm20%
    Financial Services Firm16%
    Manufacturing Company11%
    Comms Service Provider9%
    VISITORS READING REVIEWS
    Computer Software Company26%
    Financial Services Firm10%
    Comms Service Provider8%
    University8%
    Company Size
    REVIEWERS
    Small Business72%
    Midsize Enterprise6%
    Large Enterprise22%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise12%
    Large Enterprise58%
    VISITORS READING REVIEWS
    Small Business33%
    Midsize Enterprise16%
    Large Enterprise51%
    Buyer's Guide
    Check Point DDoS Protector vs. Corero
    March 2024
    Find out what your peers are saying about Check Point DDoS Protector vs. Corero and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews while Corero is ranked 18th in Distributed Denial of Service (DDOS) Protection with 5 reviews. Check Point DDoS Protector is rated 8.0, while Corero is rated 8.4. The top reviewer of Check Point DDoS Protector writes "Good support and effective against SSL attacks, but the dashboard is complicated". On the other hand, the top reviewer of Corero writes "Effect local attack handling, intuitive interface, and scalable". Check Point DDoS Protector is most compared with Radware DefensePro, Arbor DDoS, Cloudflare and Fortinet FortiDDoS, whereas Corero is most compared with Arbor DDoS, Cloudflare, Radware DefensePro, Radware Cloud DDoS Protection Service and Lumen DDoS Mitigation. See our Check Point DDoS Protector vs. Corero report.

    See our list of best Distributed Denial of Service (DDOS) Protection vendors.

    We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.