This review does not include a rating.
3 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.7 out of 100
This review does not include a rating.

Likelihood to Recommend

Check Point DDoS Protector

This Check Point DDoS Protector software is ideal to guarantee the protection of companies in the presence of DDoS attacks, regardless of whether they are known or unknown, it has an immediate detection and response to the presence of them, so it has the ability to stop attacks before they cause damage to the business infrastructure. Also even under attack provides high network performance and legitimate traffic, which is why it is ideal for mitigating threats at the network level as well as applications.
Sophia Taylor | TrustRadius Reviewer

EfficientIP DNS Blast

No answers on this topic

Pros

Check Point DDoS Protector

  • Provides real time protection which prevents business network downtime.
  • Its protection not only guarantees the detection of common attacks but also the detection of emerging attacks precisely.
  • It allows the administration of several devices from a single application, this facilitates its use and generates a great saving of time.
  • Its detection is precise, which avoids the creation of false positives, it covers protection against DDoS attacks, inappropriate behavior of both the network and the users.
  • It has high scalability so that as more devices are required it is possible to do so by updating the license.
Sophia Taylor | TrustRadius Reviewer

EfficientIP DNS Blast

No answers on this topic

Cons

Check Point DDoS Protector

  • Sometimes it takes time to update device software.
  • It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
  • It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
  • Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
Sophia Taylor | TrustRadius Reviewer

EfficientIP DNS Blast

No answers on this topic

Alternatives Considered

Check Point DDoS Protector

DataDome Bot Mitigation It is software with an easy configuration and ideal for mitigating bot attacks, being compatible with a large number of web infrastructures, however it does not guarantee the absence of false positives, while Check Point DDoS Protector is a solution with an easy administration, ideal for detecting DDoS attacks in the business infrastructure, whether they are known or not, and because it carries out an analysis of the behavior of the network, it avoids the presence of false positives that is why our company has chosen this solution .
Sophia Taylor | TrustRadius Reviewer

EfficientIP DNS Blast

No answers on this topic

Return on Investment

Check Point DDoS Protector

  • It helps us to effectively minimize the presence of attacks in the environment of our organization.
  • It allows us to maintain the continuity of legitimate traffic.
  • It allows us to keep a really low level of false positives.
  • It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.
Sophia Taylor | TrustRadius Reviewer

EfficientIP DNS Blast

No answers on this topic

Pricing Details

Check Point DDoS Protector

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

EfficientIP DNS Blast

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Add comparison