TrustRadius: an HG Insights company

Check Point Quantum DDoS Protector

Score8.1 out of 10

5 Reviews and Ratings

What is Check Point Quantum DDoS Protector?

Check Point Quantum DDoS Protector protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, and information theft.

Guaranteed protection against the presence of DDoS attacks at the network level

Pros

  • Provides real time protection which prevents business network downtime.
  • Its protection not only guarantees the detection of common attacks but also the detection of emerging attacks precisely.
  • It allows the administration of several devices from a single application, this facilitates its use and generates a great saving of time.
  • Its detection is precise, which avoids the creation of false positives, it covers protection against DDoS attacks, inappropriate behavior of both the network and the users.
  • It has high scalability so that as more devices are required it is possible to do so by updating the license.

Cons

  • Sometimes it takes time to update device software.
  • It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
  • It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
  • Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.

Most Important Features

  • Its ability to mitigate both known and unknown attacks in a short time.
  • Its easy administration through a single application.
  • The one that maintains the performance of the network even when it is under attack since in this way the inactivity of the same is not visualized.
  • The one that not only protects the business infrastructure but also provides protection to users.

Return on Investment

  • It helps us to effectively minimize the presence of attacks in the environment of our organization.
  • It allows us to maintain the continuity of legitimate traffic.
  • It allows us to keep a really low level of false positives.
  • It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.

Alternatives Considered

DataDome Bot Mitigation

Other Software Used

Symantec Advanced Threat Protection, Symantec Data Loss Prevention, Agari Phishing Defense

Check Point DDoS Protector - More than just a DDoS Protection

Use Cases and Deployment Scope

Availability of the services is playing a huge role in our business as customer access to its assets is the utmost priority in the banking field where I work currently. Hence, Checkpoint DDoS Protector plays a vital role by providing full protection of data center applications against various emerging network threats.

Pros

  • Most accurate DDoS Attack detection
  • Network Behavioral Analysis
  • Intrusion Prevention
  • SSL-attack protection

Cons

  • Reporting module to be upgraded with more details and easy to find root courses.

Most Important Features

  • Artificial Intelligence for traffic filtering
  • SSL Attack Protection
  • IPS

Return on Investment

  • Since the implementation of this product, we have come across zero SSL attacks.

Alternatives Considered

FortiDDoS