Check Point DDoS Protector vs. IBM Cloud Internet Services

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point DDoS Protector
Score 8.1 out of 10
N/A
DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.N/A
IBM Cloud Internet Services
Score 8.7 out of 10
Enterprise companies (1,001+ employees)
IBM Cloud Internet Services is a set of edge network services for securing internet-facing applications from DDoS attacks, data theft, and bot attacks, as well as optimizing their web apps or ensuring global responsiveness and the ongoing availability of their internet-facing applications.
$275
per month, per domain
Pricing
Check Point DDoS ProtectorIBM Cloud Internet Services
Editions & Modules
No answers on this topic
IBM Cloud Internet Services - Standard
$275.00
per month, per domain
IBM Cloud Internet Services - Enterprise
Call
Offerings
Pricing Offerings
Check Point DDoS ProtectorIBM Cloud Internet Services
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point DDoS ProtectorIBM Cloud Internet Services
Top Pros
Top Cons
Best Alternatives
Check Point DDoS ProtectorIBM Cloud Internet Services
Small Businesses
Cloudflare
Cloudflare
Score 8.8 out of 10

No answers on this topic

Medium-sized Companies
Cloudflare
Cloudflare
Score 8.8 out of 10
Cisco ACI
Cisco ACI
Score 8.5 out of 10
Enterprises
BIG-IP
BIG-IP
Score 9.0 out of 10
Cisco ACI
Cisco ACI
Score 8.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point DDoS ProtectorIBM Cloud Internet Services
Likelihood to Recommend
8.2
(2 ratings)
7.5
(10 ratings)
Usability
-
(0 ratings)
6.0
(1 ratings)
User Testimonials
Check Point DDoS ProtectorIBM Cloud Internet Services
Likelihood to Recommend
Check Point Software Technologies
This Check Point DDoS Protector software is ideal to guarantee the protection of companies in the presence of DDoS attacks, regardless of whether they are known or unknown, it has an immediate detection and response to the presence of them, so it has the ability to stop attacks before they cause damage to the business infrastructure. Also even under attack provides high network performance and legitimate traffic, which is why it is ideal for mitigating threats at the network level as well as applications.
Read full review
IBM
In terms of business challenges, it simplifies the job of my engineers and significantly increases the productivity of my teams when they collaborate with IBM teams all over the world. Now that we have completed a proof-of-concept using the services supplied by IBM, we expect it to assist us in managing them more efficiently; thus far, management has been straightforward.
Read full review
Pros
Check Point Software Technologies
  • Most accurate DDoS Attack detection
  • Network Behavioral Analysis
  • Intrusion Prevention
  • SSL-attack protection
Read full review
IBM
  • Integration with IBM Cloud applications
  • Easy to manage web application firewall
  • Ease of protecting CloudFoundry applications
  • Good console UI
  • Protection for rare managed service offerings such as CouchDB through IBM Cloudant
Read full review
Cons
Check Point Software Technologies
  • Sometimes it takes time to update device software.
  • It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
  • It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
  • Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
Read full review
IBM
  • Request proxying is done by way of DNS name resolution, which is inflexible.
  • Proxy services do not work on wildcard DNS entries.
Read full review
Usability
Check Point Software Technologies
No answers on this topic
IBM
I have seen faster and more user friendly interfaces like Azure
Read full review
Alternatives Considered
Check Point Software Technologies
As the existing environment is mainly equipped with Checkpoint products and since the product has all leading features, we moved with Checkpoint DDoS protector.
Read full review
IBM
I have used Salesforce to explore it as an app but I have found them both able to solve my needs and requirements when it comes to security. While I choose IBM Cloud Internet Services for more accessibility, a better price was available with Saleforce. Although that is just my observation.
Read full review
Return on Investment
Check Point Software Technologies
  • It helps us to effectively minimize the presence of attacks in the environment of our organization.
  • It allows us to maintain the continuity of legitimate traffic.
  • It allows us to keep a really low level of false positives.
  • It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.
Read full review
IBM
  • It had a positive impact with a big improvement on the performance of web applications.
  • Services are quite fast to implement and easy to maintain from an IT perspective.
Read full review
ScreenShots