Try our new research platform with insights from 80,000+ expert users

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point DDoS Protector has reduced incidents with viruses and improved IQ operations and security.
There is a low level of false-positive alerts due to advanced techniques used by Check Point.
Auto-learning and behavioral analysis establish baselines for legitimate traffic, automatically detecting and blocking non-conforming traffic.
It offers comprehensive security by validating and exploiting complex vulnerabilities.
Check Point DDoS Protector grows with the business and can be deployed in various forms.

CONS

Check Point lacks a DDoS protection feature, requiring the use of another solution.
Check Point requires customers to use the outdated R77.30 software version for DDoS protection.
Check Point does not offer bulk uploading for blacklist/whitelist configurations.
Check Point's documentation needs improvement for better implementation of best practices.
Check Point's support is only available in English.
 

Check Point DDoS Protector Pros review quotes

BD
May 1, 2021
This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.
Robert Plese - PeerSpot reviewer
Feb 13, 2023
From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
Check Point DDoS Protector is a product that uses machine learning and behavior analysis.
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,795 professionals have used our research since 2012.
OP
Sep 27, 2020
The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.
LD
Feb 20, 2023
It uses several layers of security.
DA
Mar 18, 2023
This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.
WS
Feb 5, 2019
Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point.
Edwin Solano Salmeron - PeerSpot reviewer
Feb 8, 2023
As our business continues to grow, we can grow this product simultaneously.
NG
Feb 25, 2023
It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.
Jonathan Ramos G. - PeerSpot reviewer
Sep 29, 2022
One of its most outstanding functions is the zero-day DDOS.
 

Check Point DDoS Protector Cons review quotes

BD
May 1, 2021
It does not provide the capability to upload data for blacklisting/whitelisting in bulk.
Robert Plese - PeerSpot reviewer
Feb 13, 2023
Monitoring and reporting are the things that can be introduced in the future.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations.
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,795 professionals have used our research since 2012.
OP
Sep 27, 2020
For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version.
LD
Feb 20, 2023
The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer.
DA
Mar 18, 2023
It is an expensive tool for some companies.
WS
Feb 5, 2019
Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support.
Edwin Solano Salmeron - PeerSpot reviewer
Feb 8, 2023
The solution should greatly improve its interface.
NG
Feb 25, 2023
The Check Point support language is only in English.
Jonathan Ramos G. - PeerSpot reviewer
Sep 29, 2022
I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes.