Try our new research platform with insights from 80,000+ expert users
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Great centralized management, real-time monitoring and has analytics capabilities
Pros and Cons
  • "It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
  • "The Check Point support language is only in English."

What is our primary use case?

In our company, we have used this product for our on-premise applications and networks to guarantee that our services do not suffer from zero-day attacks, SSL attacks, DNS, malware, and bots, among other things, that may affect the normal operation of our services.

Most of our services are local, however, some are also public. The public is where we require or need a tool like Check Point. We need help with the perimeter security that we require; we cannot just rely on conventional security.

How has it helped my organization?

It has helped us improve security in applications, services, and the network. We're avoiding attacks that cause us work continuity problems - avoiding great economic losses for the company. Thanks to its great characteristics, we have been able to fully mitigate threats.

What is most valuable?

The solution provides protection at multiple layers of the network, including the network layer, transport layer, and application layer, to defend against various types of DDoS attacks.

The real-time monitoring is excellent with monitoring.

It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.

I have a centralized management console that enables security teams to configure and manage policies across multiple devices and locations.

The product includes advanced analytics capabilities that enable security teams to analyze attack data and identify patterns and trends to better protect against future attacks.

What needs improvement?

Some features are more advanced, however, using them is hard for us. The documentation is not as precise and does not have enough examples to understand how it works.

Advanced knowledge is required to be able to solve problems, otherwise, you need to hire support.

The Check Point support language is only in English. It creates problems for companies in Latin America that may not speak English as a first language.

Buyer's Guide
Check Point DDoS Protector
December 2024
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.

For how long have I used the solution?

We have used these devices for quite some time with this functionality on-premise to guarantee security in the network and services.

Which solution did I use previously and why did I switch?

Previously we did not use a DDoS tool.

Which other solutions did I evaluate?

It is extremely important to always evaluate the options on the market before purchasing, in addition to verifying if they are the same and ensuring that everything the client needs is required.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Excellent zero day protection and threat mitigation
Pros and Cons
  • "It uses several layers of security."
  • "The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."

What is our primary use case?

An attack of this type can generate a loss of work continuity generating both information and economic losses, for which we required a proactive tool that will help us correct these possible security flaws, so we opted for the use of Check Point DDoS Protector.

Our company handles a lot of information and it is vital to have it protected. Currently, DDoS attacks are becoming more modern. They generate new ways to exploit sectors with vulnerabilities which can be exploited to have access to, and seize data among others.

How has it helped my organization?

In our company, we have several applications published in Microsoft Azure in-app services. We required a tool that would help us shield business applications a little more from modern threats - including intelligent SSL attacks, and protection against zero-day attacks - preventing us from having a failure in services that would translate into economic losses for the company.

This is why Check Point perfectly matched the problem we had and helped us solve the security flaws.

It helped us a lot to mitigate and management and the company's top managers feel quite safe with Check Point.

What is most valuable?

First of all, the tool is easy to implement. It is one of the features of Check Point and is up and running with some basic configurations.

It has a quite intuitive portal for the user. In this way, it is possible to generate greater and easier control of the checkpoint security applications.

Zero-day protection is very useful. It really helps to avoid modern threats that can affect or impact the productivity of a business. It uses several layers of security. It's innovative and that helps a lot.

Threat mitigation is very good for both cloud and on-premise environments.

What needs improvement?

The areas where the Check Point manufacturer in general needs to improve, including:

1-The support can provide improvements in the efficiency of the solution of cases, improvements in response times, and more hours of attention to be able to provide users with a more robust security service.

2- The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer. Some found publicly are a bit advanced or the same result is not achieved in the implementation icon.

For how long have I used the solution?

I've used the solution for just over 12 months. This tool works quite well for DDoS protection in our company.

Which solution did I use previously and why did I switch?

We had not used a tool for this type of protection before.

What's my experience with pricing, setup cost, and licensing?

It is important to have the help of a specialized partner who provides guides in addition to validating the client's requirements in order to match them in the best way with the available Check Point tools.

Which other solutions did I evaluate?

Check Point was the first option. It perfectly matched what was requested by management. Its efficiency is very good, and, with the help of the partner, we were able to provide a correct implementation.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point DDoS Protector
December 2024
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
CHK - Security tool and protects from zero-day attacks
Pros and Cons
  • "This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security."
  • "It is an expensive tool for some companies."

What is our primary use case?

Our main office still had the local infrastructure, which we had to have safely and avoid any type of threat that could prevent our services from working correctly, for which we needed DDoS protection that was powerful. We recognized, before the investigation of the tool, the need to have strong protection. We found Check Point DDoS protection had the best features, which were completely adapted to our needs.

Modern threat and signature databases are shared among all Check Point DDoS devices globally to increase zero-day protection, which is great for our business. We trust such a comprehensive tool.

How has it helped my organization?

Checkpoint DDoS Protection is a tool that gave us network protection in our local environments to avoid zero-day attacks and denial of services, among others, that complicated the day-to-day of our services and stopped work continuity.

This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.

In our country, in recent years, there have been attacks that have stopped companies for which we choose to use this tool to protect SSL/TSL.

We are really happy with the solution.

What is most valuable?

It is a tool based on a physical device with a lot of documentation to implement in the best way and with the best practices of the Check Point manufacturer.

We have protection against zero-day threats that is very effective, fulfilling, and guarantees network security on our main site.

It offers easy implementation and a lot of support from the specialized partner.

The environment can be coupled to the size and services of each company to have costs adjusted to the needs of the company.

This is a robust tool and is available to implement on-premise.

What needs improvement?

Check Point DDoS does not escape support issues; it is sometimes difficult to implement. You require support from your partner or Check Point support.

We would like this tool could also be cloud-based. Physical devices have a greater tendency to fail, which is why we would also like to have an improvement to a virtual device.     

It is an expensive tool for some companies. It would also be good to have an improvement in cost level and increase competition against other tools from other manufacturers.

For how long have I used the solution?

In our main office, we use this security device for Check Point DDoS protection to avoid modern attacks that would complicate business productivity. We've used this device since 2020.

Which solution did I use previously and why did I switch?

Previously, we did not have DDoS protection; however, we read about other manufacturers.

What's my experience with pricing, setup cost, and licensing?

It is important to look up the manufacturer's documentation in order to implement it correctly.

Which other solutions did I evaluate?

We always evaluate different security devices to find the option that suits our requirements. We firmly believe that this solution is one of the best and safest thanks to its characteristics.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior System Administrator at PFCTI
Real User
Has improved our internet security and external security and we have fewer security incidents
Pros and Cons
  • "Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point."
  • "Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."

What is our primary use case?

It's a typical solution within our closed environments. It's a security solution.

How has it helped my organization?

This solution has improved our internet security and external security. Check Point is a good product. It improved a lot of security rules. We have fewer security incidents.

Currently, we have fewer incidents with viruses. We improved our operations and security using this solution. Our company's better after using Check Point.

What is most valuable?

The firewall and antivirus features are the most valuable features. 

What needs improvement?

Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support. 

What do I think about the stability of the solution?

The stability is very good. We don't have any downtime. 

What do I think about the scalability of the solution?

Scalability is good. We bought a hardware with more dimension than we need. I think that it is very easy to improve or to resize if we need. We have around 230 users. 

How are customer service and technical support?

Their technical support is very good. We only needed to contact support maybe twice. They respond within less than 24. We have premium support so it can be as fast as four hours.

How was the initial setup?

The initial setup was difficult. But we contracted a Check Point partner. They helped us with the deployment. It was a big internal change which was difficult. The deployment took three months. It was a lot of information. We needed a lot of time to acquire this information and to know very clearly what we needed to do for the deployment. We did this work before the deployment, so it was a lot of months, maybe five or six months to acquire all this information.

What about the implementation team?

We implemented through professional services. 

What's my experience with pricing, setup cost, and licensing?

It's an expensive solution. It's one of the most expensive solutions in the world. It's cheaper than Palo Alto and Cisco but these are expensive solutions. Fortinet is cheaper. 

Which other solutions did I evaluate?

  • Cisco
  • Palo Alto
  • Fortinet

We chose Check Point because because we know the brand, we know they are a good product. We checked price, features, and their support and based on these criteria, we made our choice. 

What other advice do I have?

Their support is very good. We don't have a lot of down time. Professional services are very knowledgable when it comes to the hardware. The management and using of your console is very easy also. Palo Alto is more difficult to use. 

I would rate this solution an eight out of ten because it's good but it's not perfect.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point DDoS Protector Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Check Point DDoS Protector Report and get advice and tips from experienced pros sharing their opinions.