Check Point Quantum DDoS Protector vs. Voxility DDoS Protection

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point Quantum DDoS Protector
Score 8.1 out of 10
N/A
Check Point Quantum DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, and information theft.N/A
Voxility DDoS Protection
Score 0.0 out of 10
Mid-Size Companies (51-1,000 employees)
Voxility DDoS Protection is 1 Tbps+ acclaimed DDoS protection that works with almost any application. It is used frequently to protect online games, DNS, TCP services, HTTPS and HTTP websites. The vendor uses 22 scrubbing centers in 12 cities in US,EU and Asia, right in the path of regular Internet traffic. Scope of Protection Voxility DDoS Protection provides protection at multiple layers of the OSI model, specifically layer 3 (network layer) and layer 4 (transport layer). This…N/A
Pricing
Check Point Quantum DDoS ProtectorVoxility DDoS Protection
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point Quantum DDoS ProtectorVoxility DDoS Protection
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsFlat monthly fee. The vendor charges only for the amount of clean traffic sent back to the customer after mitigation. There is no other cost. Customer can announce an unlimited number of IPs. Size, frequency or type of attacks per month will not influence pricing.
More Pricing Information
Community Pulse
Check Point Quantum DDoS ProtectorVoxility DDoS Protection
Best Alternatives
Check Point Quantum DDoS ProtectorVoxility DDoS Protection
Small Businesses
Cloudflare
Cloudflare
Score 8.8 out of 10
Cloudflare
Cloudflare
Score 8.8 out of 10
Medium-sized Companies
Cloudflare
Cloudflare
Score 8.8 out of 10
Cloudflare
Cloudflare
Score 8.8 out of 10
Enterprises
Akamai App & API Protector
Akamai App & API Protector
Score 9.5 out of 10
Akamai App & API Protector
Akamai App & API Protector
Score 9.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point Quantum DDoS ProtectorVoxility DDoS Protection
Likelihood to Recommend
8.2
(2 ratings)
-
(0 ratings)
User Testimonials
Check Point Quantum DDoS ProtectorVoxility DDoS Protection
Likelihood to Recommend
Check Point Software Technologies
This Check Point DDoS Protector software is ideal to guarantee the protection of companies in the presence of DDoS attacks, regardless of whether they are known or unknown, it has an immediate detection and response to the presence of them, so it has the ability to stop attacks before they cause damage to the business infrastructure. Also even under attack provides high network performance and legitimate traffic, which is why it is ideal for mitigating threats at the network level as well as applications.
Read full review
Voxility
No answers on this topic
Pros
Check Point Software Technologies
  • Most accurate DDoS Attack detection
  • Network Behavioral Analysis
  • Intrusion Prevention
  • SSL-attack protection
Read full review
Voxility
No answers on this topic
Cons
Check Point Software Technologies
  • Sometimes it takes time to update device software.
  • It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
  • It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
  • Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
Read full review
Voxility
No answers on this topic
Alternatives Considered
Check Point Software Technologies
As the existing environment is mainly equipped with Checkpoint products and since the product has all leading features, we moved with Checkpoint DDoS protector.
Read full review
Voxility
No answers on this topic
Return on Investment
Check Point Software Technologies
  • It helps us to effectively minimize the presence of attacks in the environment of our organization.
  • It allows us to maintain the continuity of legitimate traffic.
  • It allows us to keep a really low level of false positives.
  • It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.
Read full review
Voxility
No answers on this topic
ScreenShots