F5 BIG-IP DNS vs. Check Point DDoS Protector

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
F5 BIG-IP DNS
Score 9.2 out of 10
N/A
F5 BIG-IP DNS (formerly BIG-IP Global Traffic Manager) secures DNS infrastructure.N/A
Check Point DDoS Protector
Score 8.1 out of 10
N/A
DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.N/A
Pricing
F5 BIG-IP DNSCheck Point DDoS Protector
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
F5 BIG-IP DNSCheck Point DDoS Protector
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
F5 BIG-IP DNSCheck Point DDoS Protector
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
F5 BIG-IP DNSCheck Point DDoS Protector
Small Businesses
NGINX
NGINX
Score 9.1 out of 10
Cloudflare
Cloudflare
Score 8.8 out of 10
Medium-sized Companies
NGINX
NGINX
Score 9.1 out of 10
Cloudflare
Cloudflare
Score 8.8 out of 10
Enterprises
NGINX
NGINX
Score 9.1 out of 10
BIG-IP
BIG-IP
Score 9.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
F5 BIG-IP DNSCheck Point DDoS Protector
Likelihood to Recommend
9.4
(9 ratings)
8.2
(2 ratings)
User Testimonials
F5 BIG-IP DNSCheck Point DDoS Protector
Likelihood to Recommend
F5
F5 BIG-IP DNS is well-suited for any organization looking to improve their Authoritative and Local DNS security and performance capabilities.
Read full review
Check Point Software Technologies
This Check Point DDoS Protector software is ideal to guarantee the protection of companies in the presence of DDoS attacks, regardless of whether they are known or unknown, it has an immediate detection and response to the presence of them, so it has the ability to stop attacks before they cause damage to the business infrastructure. Also even under attack provides high network performance and legitimate traffic, which is why it is ideal for mitigating threats at the network level as well as applications.
Read full review
Pros
F5
  • The easy of importing DNS records into the BIG-IP
  • The ease of searching and locating records
  • The speed of creating multiple records when you need to duplicate effort.
  • The DNS dashboards to see requests and data points.
Read full review
Check Point Software Technologies
  • Most accurate DDoS Attack detection
  • Network Behavioral Analysis
  • Intrusion Prevention
  • SSL-attack protection
Read full review
Cons
F5
  • More support documentation will be a nice to have.
  • I have not automated DNS deployments yet, but it would be nice to have ansible libraries for this module. (I have used ansible for many others).
Read full review
Check Point Software Technologies
  • Sometimes it takes time to update device software.
  • It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
  • It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
  • Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
Read full review
Alternatives Considered
F5
F5 DNS is like DNS with out training wheels and data that can help you make real changes and improvements
Read full review
Check Point Software Technologies
As the existing environment is mainly equipped with Checkpoint products and since the product has all leading features, we moved with Checkpoint DDoS protector.
Read full review
Return on Investment
F5
  • Protection against security threats using DNS as a vector.
  • Protection against security threats targeting DNS itself.
  • Provide top user experience to application clients, by directing their requests to where they will be treated with the best performance.
Read full review
Check Point Software Technologies
  • It helps us to effectively minimize the presence of attacks in the environment of our organization.
  • It allows us to maintain the continuity of legitimate traffic.
  • It allows us to keep a really low level of false positives.
  • It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.
Read full review
ScreenShots