Skip to main content
TrustRadius
Check Point DDoS Protector

Check Point DDoS Protector

Overview

What is Check Point DDoS Protector?

DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time),…

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Check Point DDoS Protector?

DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time),…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

2 people also want pricing

Alternatives Pricing

What is Cloudflare?

Cloudflare, from the company of the same name in San Francisco, provides DDoS and bot mitigation security for business domains, as well as a content delivery network (CDN) and web application firewall (WAF).

What is IBM Cloud Internet Services?

IBM Cloud Internet Services is a set of edge network services for securing internet-facing applications from DDoS attacks, data theft, and bot attacks, as well as optimizing their web apps or ensuring global responsiveness and the ongoing availability of their internet-facing applications.

Return to navigation

Product Details

What is Check Point DDoS Protector?

DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-ttime, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.


Scope of Protection


The Quantum DDoS Protector offered by Check Point is a top-tier product that sets itself apart from others in the industry by providing comprehensive protection at multiple layers of the OSI model. It safeguards layer 3 (network layer) by mitigating volumetric attacks through advanced traffic engineering techniques, and also protects application layer (layer 7) by inspecting HTTP/HTTPS traffic for anomalies and malicious behavior.


Furthermore, the Quantum DDoS Protector is compatible with various internet protocols such as HTTP, HTTPS, DNS, and BGP. This compatibility enables seamless integration with existing network infrastructures and ensures effective defense against a wide range of DDoS attacks, enhancing the security posture of organizations.


Check Point DDoS Protector Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(5)

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Availability of the services is playing a huge role in our business as customer access to its assets is the utmost priority in the banking field where I work currently. Hence, Checkpoint DDoS Protector plays a vital role by providing full protection of data center applications against various emerging network threats.
  • Most accurate DDoS Attack detection
  • Network Behavioral Analysis
  • Intrusion Prevention
  • SSL-attack protection
  • Reporting module to be upgraded with more details and easy to find root courses.
We have enabled the Artificial Intelligence feature in Check Point DDoS Protector and it is being used widely. Through Artificial Intelligence, the system can lower the throughput and clear the unnecessary traffic. So it gives a better level of protection with minimum effect.
  • Artificial Intelligence for traffic filtering
  • SSL Attack Protection
  • IPS
  • Since the implementation of this product, we have come across zero SSL attacks.
As the existing environment is mainly equipped with Checkpoint products and since the product has all leading features, we moved with Checkpoint DDoS protector.
Sophia Taylor | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Check Point DDoS Protector is used throughout our organization because it allows us to stay protected against DDoS attacks, which is in the cloud guarantees us the immediate blocking of them, thus preventing them from causing damage to our business infrastructure, in addition to one of its most important characteristics impressive is that even under attack it is possible to maintain the performance of our networks as well as obtain an accurate detection without the need to expose our users.
  • Provides real time protection which prevents business network downtime.
  • Its protection not only guarantees the detection of common attacks but also the detection of emerging attacks precisely.
  • It allows the administration of several devices from a single application, this facilitates its use and generates a great saving of time.
  • Its detection is precise, which avoids the creation of false positives, it covers protection against DDoS attacks, inappropriate behavior of both the network and the users.
  • It has high scalability so that as more devices are required it is possible to do so by updating the license.
  • Sometimes it takes time to update device software.
  • It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
  • It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
  • Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
This Check Point DDoS Protector software is ideal to guarantee the protection of companies in the presence of DDoS attacks, regardless of whether they are known or unknown, it has an immediate detection and response to the presence of them, so it has the ability to stop attacks before they cause damage to the business infrastructure. Also even under attack provides high network performance and legitimate traffic, which is why it is ideal for mitigating threats at the network level as well as applications.
  • Its ability to mitigate both known and unknown attacks in a short time.
  • Its easy administration through a single application.
  • The one that maintains the performance of the network even when it is under attack since in this way the inactivity of the same is not visualized.
  • The one that not only protects the business infrastructure but also provides protection to users.
  • It helps us to effectively minimize the presence of attacks in the environment of our organization.
  • It allows us to maintain the continuity of legitimate traffic.
  • It allows us to keep a really low level of false positives.
  • It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.
DataDome Bot Mitigation It is software with an easy configuration and ideal for mitigating bot attacks, being compatible with a large number of web infrastructures, however it does not guarantee the absence of false positives, while Check Point DDoS Protector is a solution with an easy administration, ideal for detecting DDoS attacks in the business infrastructure, whether they are known or not, and because it carries out an analysis of the behavior of the network, it avoids the presence of false positives that is why our company has chosen this solution .
Return to navigation