Availability of the services is playing a huge role in our business as customer access to its assets is the utmost priority in the banking field where I work currently. Hence, Checkpoint DDoS Protector plays a vital role by providing full protection of data center applications against various emerging network threats.
Pros
Most accurate DDoS Attack detection
Network Behavioral Analysis
Intrusion Prevention
SSL-attack protection
Cons
Reporting module to be upgraded with more details and easy to find root courses.
Likelihood to Recommend
We have enabled the Artificial Intelligence feature in Check Point DDoS Protector and it is being used widely. Through Artificial Intelligence, the system can lower the throughput and clear the unnecessary traffic. So it gives a better level of protection with minimum effect.
VU
Verified User
Team Lead in Information Technology (1001-5000 employees)
Check Point DDoS Protector is used throughout our organization because it allows us to stay protected against DDoS attacks, which is in the cloud guarantees us the immediate blocking of them, thus preventing them from causing damage to our business infrastructure, in addition to one of its most important characteristics impressive is that even under attack it is possible to maintain the performance of our networks as well as obtain an accurate detection without the need to expose our users.
Pros
Provides real time protection which prevents business network downtime.
Its protection not only guarantees the detection of common attacks but also the detection of emerging attacks precisely.
It allows the administration of several devices from a single application, this facilitates its use and generates a great saving of time.
Its detection is precise, which avoids the creation of false positives, it covers protection against DDoS attacks, inappropriate behavior of both the network and the users.
It has high scalability so that as more devices are required it is possible to do so by updating the license.
Cons
Sometimes it takes time to update device software.
It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
Likelihood to Recommend
This Check Point DDoS Protector software is ideal to guarantee the protection of companies in the presence of DDoS attacks, regardless of whether they are known or unknown, it has an immediate detection and response to the presence of them, so it has the ability to stop attacks before they cause damage to the business infrastructure. Also even under attack provides high network performance and legitimate traffic, which is why it is ideal for mitigating threats at the network level as well as applications.