Check Point DDoS Protector Pros
This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.
View full review »The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.
View full review »Check Point DDoS Protector is a product that uses machine learning and behavior analysis.
View full review »Buyer's Guide
Check Point DDoS Protector
August 2022

Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: August 2022.
620,600 professionals have used our research since 2012.
With Check Point and its model of known and unknown threats, its way of dealing with these problems helped us avoid crashes in our front-end infrastructure as well as internal ones.
View full review »LA
L A D
Cloud Support - Security Admin at a tech company with 1-10 employees
It uses several layers of security.
View full review »Check Point DDoS Protector Cons
It does not provide the capability to upload data for blacklisting/whitelisting in bulk.
View full review »For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version.
View full review »Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations.
View full review »Buyer's Guide
Check Point DDoS Protector
August 2022

Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: August 2022.
620,600 professionals have used our research since 2012.
Something that should be improved across the board is the way they provide support.
View full review »LA
L A D
Cloud Support - Security Admin at a tech company with 1-10 employees
The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer.
View full review »Buyer's Guide
Check Point DDoS Protector
August 2022

Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: August 2022.
620,600 professionals have used our research since 2012.