Guaranteed protection against the presence of DDoS attacks at the network level
Overall Satisfaction with Check Point DDoS Protector
Check Point DDoS Protector is used throughout our organization because it allows us to stay protected against DDoS attacks, which is in the cloud guarantees us the immediate blocking of them, thus preventing them from causing damage to our business infrastructure, in addition to one of its most important characteristics impressive is that even under attack it is possible to maintain the performance of our networks as well as obtain an accurate detection without the need to expose our users.
Pros
- Provides real time protection which prevents business network downtime.
- Its protection not only guarantees the detection of common attacks but also the detection of emerging attacks precisely.
- It allows the administration of several devices from a single application, this facilitates its use and generates a great saving of time.
- Its detection is precise, which avoids the creation of false positives, it covers protection against DDoS attacks, inappropriate behavior of both the network and the users.
- It has high scalability so that as more devices are required it is possible to do so by updating the license.
Cons
- Sometimes it takes time to update device software.
- It offers scalable payment licenses, however it is important to have a good knowledge of how to handle this type of device.
- It does not allow the handling of several IP addresses, in addition it lacks a black and white list of data.
- Its configuration can be complex for a first time user, so it is important to have adequate knowledge for the proper functioning of the devices.
- Its ability to mitigate both known and unknown attacks in a short time.
- Its easy administration through a single application.
- The one that maintains the performance of the network even when it is under attack since in this way the inactivity of the same is not visualized.
- The one that not only protects the business infrastructure but also provides protection to users.
- It helps us to effectively minimize the presence of attacks in the environment of our organization.
- It allows us to maintain the continuity of legitimate traffic.
- It allows us to keep a really low level of false positives.
- It allows us a great saving of time and money due to the fact that it automatically blocks unusual behaviors.
DataDome Bot Mitigation It is software with an easy configuration and ideal for mitigating bot attacks, being compatible with a large number of web infrastructures, however it does not guarantee the absence of false positives, while Check Point DDoS Protector is a solution with an easy administration, ideal for detecting DDoS attacks in the business infrastructure, whether they are known or not, and because it carries out an analysis of the behavior of the network, it avoids the presence of false positives that is why our company has chosen this solution .
Do you think Check Point DDoS Protector delivers good value for the price?
Yes
Are you happy with Check Point DDoS Protector's feature set?
Yes
Did Check Point DDoS Protector live up to sales and marketing promises?
Yes
Did implementation of Check Point DDoS Protector go as expected?
Yes
Would you buy Check Point DDoS Protector again?
Yes
Comments
Please log in to join the conversation