Check Point DDoS Protector Primary Use Case

Robert Plese - PeerSpot reviewer
Network Engineer at a tech services company with 51-200 employees

We are not using it in our organization. I'm working for a system integrator, and we have implemented this solution for various customers from the government, telecoms, and so on. Check Point DDoS Protector is used in line on customer networks to protect web services and data center services.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

We use this product as our DDoS mitigation solution. This is something that needs to be able to protect against DDoS attacks for Volumetric, Low, and Slow attacks across layer three to layer seven. 

The solution also needs to integrate with a scrubbing center and route traffic in the case of a volumetric attack. It must also have deep knowledge of DNS traffic behavior and must have early and accurate detection/mitigation.

A DDoS mitigation solution must be able to handle high rates of DNS packets and provide the best quality of experience, even under attack. It must also be able to allow or block traffic based on geolocation or a specific IP address.

A DNS Subdomain Whitelist is available, allowing only the good DNS queries through.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Check Point DDoS Protector was first used as an add-on infrastructure solution for DDoS mitigation. We as a company have Azure and we wanted to complete it with another security tool capable of protecting against DDoS attacks for volumetric, low, and slow attacks in layer three to layer seven. For this reason, we decided to implement Check Point to do double security both in the Azure cloud and in the perimeter network to have better DNS packet rates and provide the best quality of experience, even under attack.

View full review »
Buyer's Guide
Check Point DDoS Protector
April 2024
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

We have teams in the cloud and on-premise, and normally many DDoS queries were observed. Some were normal. Others were not. It is at this point that we could have poor quality services due to their denial. Once this problem was raised, we began to see solutions that would allow us to solve these incidents, and help us only to block those that were really malicious or that wanted us to block the services. Check Point is one of the solutions that give us the most value, and they are constantly innovating.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

We had a high number of server interruptions, which led to a high cost for denial of services. We looked for solutions that would allow us to solve and avoid these economic losses with a protection solution that would use advanced techniques to detect and block DDoS attacks to improve the overall security of our network. 

Based on all these uncertainties, we looked for a proactive defense against attacks to guarantee the availability and continuity of our business. 

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

We needed to establish a solution that allows importing several protection factors within the website traffic to improve security and network availability. We wanted to manage it in a simple, fast, and scalable way. This product meets all these necessary characteristics and is robust and scalable. 

View full review »
OP
Senior Network/Security Engineer at Skywind Group

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters consisting of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point DDoS Protector 20 is directly connected to one of the ISPs we are connected to, using LACP and static routing.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Our main office still had the local infrastructure, which we had to have safely and avoid any type of threat that could prevent our services from working correctly, for which we needed DDoS protection that was powerful. We recognized, before the investigation of the tool, the need to have strong protection. We found Check Point DDoS protection had the best features, which were completely adapted to our needs.

Modern threat and signature databases are shared among all Check Point DDoS devices globally to increase zero-day protection, which is great for our business. We trust such a comprehensive tool.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

An attack of this type can generate a loss of work continuity generating both information and economic losses, for which we required a proactive tool that will help us correct these possible security flaws, so we opted for the use of Check Point DDoS Protector.

Our company handles a lot of information and it is vital to have it protected. Currently, DDoS attacks are becoming more modern. They generate new ways to exploit sectors with vulnerabilities which can be exploited to have access to, and seize data among others.

View full review »
NG
Support at a security firm with 51-200 employees

In our company, we have used this product for our on-premise applications and networks to guarantee that our services do not suffer from zero-day attacks, SSL attacks, DNS, malware, and bots, among other things, that may affect the normal operation of our services.

Most of our services are local, however, some are also public. The public is where we require or need a tool like Check Point. We need help with the perimeter security that we require; we cannot just rely on conventional security.

View full review »
WS
Senior System Administrator at PFCTI

It's a typical solution within our closed environments. It's a security solution.

View full review »
Buyer's Guide
Check Point DDoS Protector
April 2024
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.