Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-05-01T16:52:00Z
May 1, 2021
This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.
The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.
Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point.
Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damageLearn more about Ddos Protector.
It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.
As our business continues to grow, we can grow this product simultaneously.
It provides zero-day protection which gives the tool more value since it helps to avoid threats.
This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.
It uses several layers of security.
Check Point DDoS Protector is a product that uses machine learning and behavior analysis.
This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.
The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.
Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point.