We performed a comparison between Arbor DDoS and Check Point DDoS Protector based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The artificial intelligence feature is most appreciated. This solution can lower the throughput and clear the traffic, which is something really important for us. It also provides good protection. It is user-friendly, and its integration has also been really fast. We have many critical applications, and it was easy to integrate Arbor DDoS with our website, mobile application, and web banking."
"Analytics and its attack mitigation capabilities are valuable features of the solution."
"I like all the features together as a whole."
"Reporting is quite good. There are several pages of reporting on DDoS attacks, and you can find all the details that you need."
"The most valuable feature is mitigation, which can blackhole the IP."
"There were huge attacks in October, around 62 attacks at 30 gigabits per second, at one of our banks. We used Arbor DDoS to mitigate these attacks, and it performed great."
"Companies that live from their presence on the internet will get a very high return on investment from Arbor."
"The product allows us to check real-time progress, including latency and network activities."
"This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform."
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
"Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."
"One of its most outstanding functions is the zero-day DDOS."
"Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point."
"It uses several layers of security."
"Check Point DDoS Protector is a product that uses machine learning and behavior analysis."
"It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
"The solution could be more granular to include logs per second and enhanced pipeline monitoring for router licenses."
"An improvement to Arbor DDoS would be to make evaluation licenses and virtual machines available."
"The following areas need improvement: opening and tracking support tickets, online support resources, software upgrades/updates and replacement media, and event management guidelines."
"The regional support here in African could improve, such as marketing and account managers."
"On the application layer, they could have a better distributed traffic flow. They could improve that a bit. For network data it is very effective, but the application layer can be improved."
"The upgrade process is mildly complex requiring treatment of the custom embedded OS separately from the application. The correlation of the underling OS to the application version can be easily missed."
"Auto mitigation is a feature provided when DDoS is observed on any of link/customer (configured under auto mitigation). It automatically starts mitigation with default filters. In default filter mode, there could be an impact on the customer’s link,"
"There should be an automatic way to configure it to monitor traffic and decide which is an attack and which is not. In Arbor, you need to tweak and set all parameters manually, whereas in Check Point DDoS Protector, you can select the lowest parameters, and over the weeks, Check Point DDoS Protector will learn the traffic and you can then tighten some of the parameters to decide which traffic is regular and which is malicious."
"The mitigation part could be improved."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."
"Monitoring and reporting are the things that can be introduced in the future."
"I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes."
"Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."
"It is an expensive tool for some companies."
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."
Arbor DDoS is ranked 2nd in Distributed Denial of Service (DDOS) Protection with 46 reviews while Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews. Arbor DDoS is rated 8.6, while Check Point DDoS Protector is rated 8.0. The top reviewer of Arbor DDoS writes "A critical solution for security, as it includes features that can automatically detect and prevent DDoS attacks". On the other hand, the top reviewer of Check Point DDoS Protector writes "Great for validating requests, offer personalized protection, and prevents attacks". Arbor DDoS is most compared with Radware DefensePro, Cloudflare, Corero, Imperva DDoS and A10 Thunder TPS, whereas Check Point DDoS Protector is most compared with Radware DefensePro and Cloudflare. See our Arbor DDoS vs. Check Point DDoS Protector report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.