Skip to main content
TrustRadius
Check Point DDoS Protector

Check Point DDoS Protector

Overview

What is Check Point DDoS Protector?

DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time),…

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Check Point DDoS Protector?

DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time),…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

2 people also want pricing

Alternatives Pricing

What is Cloudflare?

Cloudflare, from the company of the same name in San Francisco, provides DDoS and bot mitigation security for business domains, as well as a content delivery network (CDN) and web application firewall (WAF).

What is IBM Cloud Internet Services?

IBM Cloud Internet Services is a set of edge network services for securing internet-facing applications from DDoS attacks, data theft, and bot attacks, as well as optimizing their web apps or ensuring global responsiveness and the ongoing availability of their internet-facing applications.

Return to navigation

Product Details

What is Check Point DDoS Protector?

DDoS Protector is part of Check Point’s Attack Mitigation Solution and is a real-ttime, perimeter attack mitigation device that secures organizations against emerging network and applications threats. DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.


Scope of Protection


The Quantum DDoS Protector offered by Check Point is a top-tier product that sets itself apart from others in the industry by providing comprehensive protection at multiple layers of the OSI model. It safeguards layer 3 (network layer) by mitigating volumetric attacks through advanced traffic engineering techniques, and also protects application layer (layer 7) by inspecting HTTP/HTTPS traffic for anomalies and malicious behavior.


Furthermore, the Quantum DDoS Protector is compatible with various internet protocols such as HTTP, HTTPS, DNS, and BGP. This compatibility enables seamless integration with existing network infrastructures and ensures effective defense against a wide range of DDoS attacks, enhancing the security posture of organizations.


Check Point DDoS Protector Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(5)

Reviews

Companies can't remove reviews or game the system. Here's why

No reviews found

Try adjusting your results by removing or modifying your filters.

Return to navigation