2020-09-27T15:01:00Z

What is your primary use case for Check Point DDoS Protector?

0

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
22 Answers

author avatar
Top 5LeaderboardReal User

We use this product as our DDoS mitigation solution. This is something that needs to be able to protect against DDoS attacks for Volumetric, Low, and Slow attacks across layer three to layer seven. The solution also needs to integrate with a scrubbing center and route traffic in the case of a volumetric attack. It must also have deep knowledge of DNS traffic behavior and must have early and accurate detection/mitigation. A DDoS mitigation solution must be able to handle high rates of DNS packets and provide the best quality of experience, even under attack. It must also be able to allow or block traffic based on geolocation or a specific IP address. A DNS Subdomain Whitelist is available, allowing only the good DNS queries through.

2021-05-01T16:52:00Z
author avatar
Top 5LeaderboardReal User

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters consisting of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point DDoS Protector 20 is directly connected to one of the ISPs we are connected to, using LACP and static routing.

2020-09-27T15:01:00Z
Find out what your peers are saying about Check Point, Radware, NETSCOUT and others in Distributed Denial of Service (DDOS) Protection. Updated: September 2021.
535,919 professionals have used our research since 2012.