IT Central Station is now PeerSpot: Here's why

Check Point DDoS Protector Primary Use Case

Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees

We use this product as our DDoS mitigation solution. This is something that needs to be able to protect against DDoS attacks for Volumetric, Low, and Slow attacks across layer three to layer seven. 

The solution also needs to integrate with a scrubbing center and route traffic in the case of a volumetric attack. It must also have deep knowledge of DNS traffic behavior and must have early and accurate detection/mitigation.

A DDoS mitigation solution must be able to handle high rates of DNS packets and provide the best quality of experience, even under attack. It must also be able to allow or block traffic based on geolocation or a specific IP address.

A DNS Subdomain Whitelist is available, allowing only the good DNS queries through.

View full review »
Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters consisting of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point DDoS Protector 20 is directly connected to one of the ISPs we are connected to, using LACP and static routing.

View full review »
Adriamcam - PeerSpot reviewer
Cloud Engineer at ITQS

Check Point DDoS Protector was first used as an add-on infrastructure solution for DDoS mitigation. We as a company have Azure and we wanted to complete it with another security tool capable of protecting against DDoS attacks for volumetric, low, and slow attacks in layer three to layer seven. For this reason, we decided to implement Check Point to do double security both in the Azure cloud and in the perimeter network to have better DNS packet rates and provide the best quality of experience, even under attack.

View full review »
Buyer's Guide
Distributed Denial of Service (DDOS) Protection
May 2022
Find out what your peers are saying about Check Point, Radware, NETSCOUT and others in Distributed Denial of Service (DDOS) Protection. Updated: May 2022.
598,116 professionals have used our research since 2012.