Check Point DDoS Protector vs. F5 BIG-IP

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point DDoS Protector
Score 8.1 out of 10
N/A
DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.N/A
BIG-IP
Score 9.0 out of 10
N/A
F5 BIG-IP software from Seattle-based F5 Networks is a load balancing and application protection solution suite available on cloud or via virtual editions, on a subscription or perpetual licensing basis. The BIG-IP suite of products supports a wide range of security and application performance needs. The suite includes BIG-IP Local Traffic Manager (LTM) traffic management and optimization, BIG-IP DNS, BIG-IP Access Policy Manager (APM) identity and password protection, BIG-IP Application…N/A
Pricing
Check Point DDoS ProtectorF5 BIG-IP
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point DDoS ProtectorBIG-IP
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point DDoS ProtectorF5 BIG-IP
Top Pros
Top Cons
Features
Check Point DDoS ProtectorF5 BIG-IP
Virtual Private Network
Comparison of Virtual Private Network features of Product A and Product B
Check Point DDoS Protector
-
Ratings
F5 BIG-IP
7.8
10 Ratings
9% below category average
AES 256-bit Encryption00 Ratings8.47 Ratings
Kill Switch00 Ratings7.04 Ratings
Multi-Platform Support00 Ratings7.25 Ratings
Split Tunneling00 Ratings7.54 Ratings
IP Address Masking00 Ratings8.56 Ratings
No-Logs Policy00 Ratings8.05 Ratings
Multiple Server Locations00 Ratings8.25 Ratings
Automatic Wi-Fi Protection00 Ratings6.33 Ratings
Simultaneous Connections00 Ratings8.48 Ratings
Customer Support Services00 Ratings8.88 Ratings
Best Alternatives
Check Point DDoS ProtectorF5 BIG-IP
Small Businesses
Cloudflare
Cloudflare
Score 8.8 out of 10
Avast Small Business Solutions
Avast Small Business Solutions
Score 8.4 out of 10
Medium-sized Companies
Cloudflare
Cloudflare
Score 8.8 out of 10
Check Point Quantum Security Gateway
Check Point Quantum Security Gateway
Score 9.2 out of 10
Enterprises
BIG-IP
BIG-IP
Score 9.0 out of 10
Check Point Quantum Security Gateway
Check Point Quantum Security Gateway
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point DDoS ProtectorF5 BIG-IP
Likelihood to Recommend
8.2
(2 ratings)
9.1
(116 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(2 ratings)
Usability
-
(0 ratings)
10.0
(2 ratings)
Support Rating
-
(0 ratings)
6.9
(6 ratings)
Implementation Rating
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
Check Point DDoS ProtectorF5 BIG-IP
Likelihood to Recommend
Check Point Software Technologies
This Check Point DDoS Protector software is ideal to guarantee the protection of companies in the presence of DDoS attacks, regardless of whether they are known or unknown, it has an immediate detection and response to the presence of them, so it has the ability to stop attacks before they cause damage to the business infrastructure. Also even under attack provides high network performance and legitimate traffic, which is why it is ideal for mitigating threats at the network level as well as applications.
Read full review
F5
I really do think it's well suited for any placement on the edge, especially with the WAF portion. APM is a whole different module unto itself that allows for VPN Connect connectivity, web top access. So it really is for these modules anyway, an edge appliance for us and not really usable in the interior of the network.
Read full review
Pros
Check Point Software Technologies
  • Most accurate DDoS Attack detection
  • Network Behavioral Analysis
  • Intrusion Prevention
  • SSL-attack protection
Read full review
F5
  • Easy connection: you can connect to your corporate network with two clicks.
  • IP restriction: F5 has a list of possible insecure IP numbers, if someone tries to connect using one of these numbers, F5 BIG-IP won't connect.
  • Always on feature: Very handy feature, if you install always on, you won't need to click connect.
Read full review
Cons
Check Point Software Technologies
  • Sometimes it takes time to update device software.
  • It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
  • It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
  • Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
Read full review
F5
  • I think the policy configuration that had some improvements on the ASM word things, improvements may be on the signatures that would be good because it's a little bit confusing on the ASL, how they are updated and deployed, and this staging. So that's something that could be.
Read full review
Likelihood to Renew
Check Point Software Technologies
No answers on this topic
F5
Only way to to this type of tasks
Read full review
Usability
Check Point Software Technologies
No answers on this topic
F5
Great customization and easy to use help reference menus
Read full review
Support Rating
Check Point Software Technologies
No answers on this topic
F5
On the occasions when we've had to engage f5 support, they have been great. They have always resolved our issues quickly and been easy to work with and professional. The reason I give them a 10 out of 10, however, is because when we've had issues that have crossed over between the f5 BIG-IP, our Cisco switches, and our Microsoft IIS server the f5 support representatives have been extremely knowledgeable about every product and device involved and have been able to troubleshoot end-to-end without having to engage other vendors.
Read full review
Implementation Rating
Check Point Software Technologies
No answers on this topic
F5
implementation is fine
Read full review
Alternatives Considered
Check Point Software Technologies
As the existing environment is mainly equipped with Checkpoint products and since the product has all leading features, we moved with Checkpoint DDoS protector.
Read full review
F5
F5 BIG-IP is my first F5 product that I have stared to work, and it brings me more experience doing a lot of migration upgrades from old code version to new code. The way F5 has all configuration help us to develop scrips to improve our process.
Read full review
Return on Investment
Check Point Software Technologies
  • It helps us to effectively minimize the presence of attacks in the environment of our organization.
  • It allows us to maintain the continuity of legitimate traffic.
  • It allows us to keep a really low level of false positives.
  • It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.
Read full review
F5
  • Having a load balancer of F5 helps to address large traffic limit on organisation's application
  • This means that organisation gets a lot of revenue due to the usage of their application
  • Hence provide a very positive impact onthe inverment or ROl of the organisation
Read full review
ScreenShots