2019-02-05T07:16:00Z

What is your primary use case for Check Point DDoS Protector?

Miriam Tover - PeerSpot reviewer
  • 0
  • 1
PeerSpot user
9

9 Answers

NG
User
Top 5Leaderboard
2023-02-25T22:30:00Z
Feb 25, 2023

In our company, we have used this product for our on-premise applications and networks to guarantee that our services do not suffer from zero-day attacks, SSL attacks, DNS, malware, and bots, among other things, that may affect the normal operation of our services. Most of our services are local, however, some are also public. The public is where we require or need a tool like Check Point. We need help with the perimeter security that we require; we cannot just rely on conventional security.

Search for a product comparison
Edwin Solano Salmeron - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-02-08T16:00:00Z
Feb 8, 2023

We had a high number of server interruptions, which led to a high cost for denial of services. We looked for solutions that would allow us to solve and avoid these economic losses with a protection solution that would use advanced techniques to detect and block DDoS attacks to improve the overall security of our network. Based on all these uncertainties, we looked for a proactive defense against attacks to guarantee the availability and continuity of our business.

Adrian  ACosta - PeerSpot reviewer
User
Top 5
2022-12-29T03:09:00Z
Dec 29, 2022

Check Point DDoS Protector was one of the tools that we acquired when we were migrating to the Azure cloud since we were going to have a hybrid infrastructure and needed a tool that was very good at prevention. Apart from that, we were integrating it with the cloud. This tool is multi-cloud and has many functionalities that are coupled to Azure. With it, we doubled the security of our corporate networks and provided excellent quality connection and security to all employees.

Diana Alvarado - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-09-23T07:34:00Z
Sep 23, 2022

Our main office still had the local infrastructure, which we had to have safely and avoid any type of threat that could prevent our services from working correctly, for which we needed DDoS protection that was powerful. We recognized, before the investigation of the tool, the need to have strong protection. We found Check Point DDoS protection had the best features, which were completely adapted to our needs. Modern threat and signature databases are shared among all Check Point DDoS devices globally to increase zero-day protection, which is great for our business. We trust such a comprehensive tool.

LD
User
Top 5Leaderboard
2022-08-02T19:39:00Z
Aug 2, 2022

Our company handles a lot of information and it is vital to have it protected. Currently, DDoS attacks are becoming more modern. They generate new ways to exploit sectors with vulnerabilities which can be exploited to have access to, and seize data among others. An attack of this type can generate a loss of work continuity generating both information and economic losses, for which we required a proactive tool that will help us correct these possible security flaws, so we opted for the use of Check Point DDoS Protector.

Adrian Cambronero - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-05-24T21:03:00Z
May 24, 2022

Check Point DDoS Protector was first used as an add-on infrastructure solution for DDoS mitigation. We as a company have Azure and we wanted to complete it with another security tool capable of protecting against DDoS attacks for volumetric, low, and slow attacks in layer three to layer seven. For this reason, we decided to implement Check Point to do double security both in the Azure cloud and in the perimeter network to have better DNS packet rates and provide the best quality of experience, even under attack.

Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
BD
Real User
2021-05-01T16:52:00Z
May 1, 2021

We use this product as our DDoS mitigation solution. This is something that needs to be able to protect against DDoS attacks for Volumetric, Low, and Slow attacks across layer three to layer seven. The solution also needs to integrate with a scrubbing center and route traffic in the case of a volumetric attack. It must also have deep knowledge of DNS traffic behavior and must have early and accurate detection/mitigation. A DDoS mitigation solution must be able to handle high rates of DNS packets and provide the best quality of experience, even under attack. It must also be able to allow or block traffic based on geolocation or a specific IP address. A DNS Subdomain Whitelist is available, allowing only the good DNS queries through.

OP
Real User
2020-09-27T15:01:00Z
Sep 27, 2020

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters consisting of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point DDoS Protector 20 is directly connected to one of the ISPs we are connected to, using LACP and static routing.

WS
Real User
2019-02-05T07:16:00Z
Feb 5, 2019

It's a typical solution within our closed environments. It's a security solution.

Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damageLearn more about Ddos Protector.
Download Check Point DDoS Protector ReportRead more