Coming October 25: PeerSpot Awards will be announced! Learn more

Check Point DDoS Protector OverviewUNIXBusinessApplication

Check Point DDoS Protector is #6 ranked solution in top Distributed Denial of Service (DDOS) Protection tools. PeerSpot users give Check Point DDoS Protector an average rating of 7.8 out of 10. Check Point DDoS Protector is most commonly compared to Radware DefensePro: Check Point DDoS Protector vs Radware DefensePro. Check Point DDoS Protector is popular among the large enterprise segment, accounting for 52% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 26% of all views.
Check Point DDoS Protector Buyer's Guide

Download the Check Point DDoS Protector Buyer's Guide including reviews and more. Updated: October 2022

What is Check Point DDoS Protector?

Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage
Learn more about Ddos Protector.


Check Point DDoS Protector Customers

Boston Properties

Check Point DDoS Protector Video

Check Point DDoS Protector Pricing Advice

What users are saying about Check Point DDoS Protector pricing:
"The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."

Check Point DDoS Protector Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
Good support and effective against SSL attacks, but the dashboard is complicated
Pros and Cons
  • "This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform."
  • "It does not provide the capability to upload data for blacklisting/whitelisting in bulk."

What is our primary use case?

We use this product as our DDoS mitigation solution. This is something that needs to be able to protect against DDoS attacks for Volumetric, Low, and Slow attacks across layer three to layer seven. 

The solution also needs to integrate with a scrubbing center and route traffic in the case of a volumetric attack. It must also have deep knowledge of DNS traffic behavior and must have early and accurate detection/mitigation.

A DDoS mitigation solution must be able to handle high rates of DNS packets and provide the best quality of experience, even under attack. It must also be able to allow or block traffic based on geolocation or a specific IP address.

A DNS Subdomain Whitelist is available, allowing only the good DNS queries through.

How has it helped my organization?

This solution is able to mitigate and protect against SSL attacks, which is important because this type of attack is becoming more popular among attackers, as it only requires a small number of packets to cause a denial of service for a fairly large service.

Attackers launch attacks that use SSL because each SSL session handshake consumes more resources from the server-side than from the client-side, meaning the attack has exponentially increased in size without requiring additional bots or bandwidth. As a result of these amplification effects, even a small attack can result in crippling damage

This solution is able to mitigate attacks and provides automated DDoS defense and protection from fast-moving, high volume, encrypted, or very short duration threats. This includes IoT-based attacks like Mirai, Pulse, Burst, DNS, TLS/SSL attacks, and those attacks associated with Permanent Denial of Service (PDoS) and Ransom Denial-of-Service (RDoS) techniques.

What is most valuable?

This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform. 

The SSL decryptor card comes by default with the appliance and can be enabled if needed with the purchase of a license.

This solution uses asymmetric deployment with a challenge/response mechanism that has lower latency & higher capacity to block SSL/TLS attacks.

Behavior-based protection with automatic signature creation against unknown, zero-day DDoS attacks is employed.

Support for wildcard certificates reduces operational complexity because the admin doesn't have to update it every time a certificate changes.

The Cloud Signaling capability is able to route traffic to the scrubbing center in case of a volumetric attack.

It offers effective protection against DNS attacks.

It provides layer three to layer seven protection in on-premises, cloud, and hybrid environments. It's able to detect and mitigate attacks with no performance impact or risk.

This product has a dedicated DoS mitigation engine (DME) that off-loads high-volume attacks, inspecting without impacting user experience.

What needs improvement?

It does not provide the capability to upload data for blacklisting/whitelisting in bulk. Rather, in cases where many IP addresses need to be blacklisted or whitelisted, either a single IP address has to be added or it needs to be done using a script.

It does not provide default server grouping such as default policy that can be enabled on a Web Server or Application Server IP address.

The dashboard is complicated.

It does not provide real-time traffic details; instead, it only provides logs for blocked traffic. During troubleshooting, a complete log file is required for forensics.

A PCAP file is not provided for individual IP, which is something that should be improved.

Buyer's Guide
Check Point DDoS Protector
October 2022
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: October 2022.
634,590 professionals have used our research since 2012.

What do I think about the stability of the solution?

This is a stable product.

What do I think about the scalability of the solution?

These devices are very much scalable and installed in HA. It provides an automatic passthrough option in the case of ethernet for fiber, where the OEM provides a fiber bypass switch that needs to be installed.

How are customer service and support?

Customer support from Check Point and Radware is excellent.

Which solution did I use previously and why did I switch?

We used Cloud Provider Services for DDoS mitigation provided by our ISP. We still use that service for protection against volumetric attacks (Clean Pipe).

How was the initial setup?

The setup was straightforward and the support was excellent.

The configuration requires understanding the services that are hosted against each public IP, as there might be some additional configuration required depending upon the application or services.

What about the implementation team?

This solution was deployed by our in-house team along with the OEM.

What's my experience with pricing, setup cost, and licensing?

The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled.

Which other solutions did I evaluate?

We evaluated a couple of solutions including Arbor DDoS and a product by F5. We found that Check Point was able to provide us superior capabilities and features on the basis we were evaluating.

What other advice do I have?

My advice for anybody who is considering this product is to evaluate based on the following points:

  • Where you want to place or installed your DDOS appliance.
  • What throughput mitigation is required.
  • Whether the device supports cloud signaling.
  • Determine whether the SSL decryption card is available with the box or needs to be purchased in addition.
  • License and port requirements in terms of whether you need copper or fiber. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Real User
Top 5Leaderboard
Good performance and a small number of false positives helps to transparently and reliably prevents attacks
Pros and Cons
  • "The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
  • "For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters consisting of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point DDoS Protector 20 is directly connected to one of the ISPs we are connected to, using LACP and static routing.

How has it helped my organization?

Our DataCenter environment in Taiwan serves the incoming user traffic, thus it is connected to the Internet and needs protection from DDoS attacks. Not all of the Internet Service Providers are able to provide DDoS mitigation.

For example, among the three providers we use in Taiwan, only one provides such a service. To protect the other lines, we had to implement the Check Point DDoS Protector as a hardware solution. Now, all the ISP lines are protected and we can switch the users back and forth between them with the same level of security.

What is most valuable?

The traffic processing latency is at a good level, being about 40 microseconds on the average for our traffic pattern. I believe most of the users will not even notice that this solution is on the traffic path.

The appliances have the hardware-based SSL engine, which allows it to offload and inspect the SSL/TLS encrypted traffic of the various standards.

The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.

What needs improvement?

For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version. I hope in the future, Check Point would release the relevant software version sooner.

In addition, it feels like there is no matching hardware platform in case we will need to switch from the "20" appliance. The next one available is "60", which is too powerful and much more expensive. We would prefer the systems to be modular, so the performance may be upgraded with some relatively cheap modules when there is a need.

For how long have I used the solution?

We have been using the Check Point DDoS Protector for about two years.

What do I think about the stability of the solution?

The solution is stable, and no software or performance issues have been noticed.

What do I think about the scalability of the solution?

The solution is not really scalable, in my opinion. You should buy the correct hardware appliance with a gap for future growth.

How are customer service and technical support?

No support tickets have been opened so far.

Which solution did I use previously and why did I switch?

This is the first hardware DDoS mitigation solution we use.

How was the initial setup?

The setup was quite straightforward with no drawbacks from a technical standpoint. However, you should have at least have a basic understanding of DDoS types and behaviour for the initial setup.

What about the implementation team?

The deployment was done by our in-house team. We have a Check Point Certified engineer working in the engineering team.

Also, we got some help from the ISP's engineers that we were connecting to.

Which other solutions did I evaluate?

Since we have a strong Check Point knowledge expertise among the engineering team, we did not evaluate other options.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point DDoS Protector
October 2022
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: October 2022.
634,590 professionals have used our research since 2012.
Adriamcam - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Good machine learning, low false positives, and great zero-day DDOS protection
Pros and Cons
  • "Check Point DDoS Protector is a product that uses machine learning and behavior analysis."
  • "Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."

What is our primary use case?

Check Point DDoS Protector was first used as an add-on infrastructure solution for DDoS mitigation. We as a company have Azure and we wanted to complete it with another security tool capable of protecting against DDoS attacks for volumetric, low, and slow attacks in layer three to layer seven. For this reason, we decided to implement Check Point to do double security both in the Azure cloud and in the perimeter network to have better DNS packet rates and provide the best quality of experience, even under attack.

How has it helped my organization?

Check Point DDoS Protector has given us great security in zero-day DDOS protection. Intelligent attack mitigation also gives us the most accurate attack detection and prevention without blocking legitimate user traffic. It also provides full investment and lifetime protection in an extended platform. It is another of the key features why we adopted this technology. It offered complete protection of data center applications against emerging network threats and maintains excellent user response time even under attack.

What is most valuable?

Check Point DDoS Protector is a product that uses machine learning and behavior analysis. It also includes a comprehensive suite of four essential security modules: Anti-DDoS, Network Behavior Analysis (NBA), Intrusion Prevention System (IPS), and Protection against SSL attacks. The improved traffic processing latency is at a good level.

Check Point DDoS Protector generates a really low level of false-positive alerts. This is a good thing as they don't fill the mailboxes with false alerts and you don't have to be as vigilant.

What needs improvement?

Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations. 

Another point of improvement is that they should provide more details of the traffic in real-time. To be able to have more detail would be ideal. 

Also, it takes a long time to generate an update of the software version of R80.10. They should be generating updates a little more often to improve the tool since day by day everything is changing in security.

For how long have I used the solution?

It has been implemented for a year and a half.

What do I think about the stability of the solution?

It is a fairly stable product, maintains security, and is reliable.

What do I think about the scalability of the solution?

Check Point DDoS Protector is scalable and provides an auto pass-through option for fiber. it is an excellent tool.

How are customer service and support?

So, far the support has been quite efficient.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The solution is managed in the cloud and we needed to add an extra perimeter solution to the network.

How was the initial setup?

The configuration and implementation were simple. It is very friendly and easy to use.

What about the implementation team?

The implementation and configuration were done jointly with a vendor and the IT department.

What was our ROI?

Check Point DDoS Protector has generated excellent security which has protected our assets.

What's my experience with pricing, setup cost, and licensing?

Check Point DDoS Protector comes with a hardware license where it also comes with other options that can be enabled and is an accessible tool.

Which other solutions did I evaluate?

Other options were not evaluated since we handle several Check Point products already and we wanted to follow the line.

What other advice do I have?

It is an excellent tool for perimeter security.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
Protective, effective, and fast
Pros and Cons
  • "With Check Point and its model of known and unknown threats, its way of dealing with these problems helped us avoid crashes in our front-end infrastructure as well as internal ones."
  • "Something that should be improved across the board is the way they provide support."

What is our primary use case?

We use this technology in our company as a DDoS mitigation solution.

We are required to be able to face modern denial of service attacks for our applications which are really vital for our clients.

It is really important to be able to monitor, prevent, and mitigate attacks of this type. With Check Point and its model of known and unknown threats, its way of dealing with these problems helped us avoid crashes in our front-end infrastructure as well as internal ones. It's generating stability and trust for our clients and users.

How has it helped my organization?

Check Point DDoS Protector was able to help with the mitigation and in addition to that protect us from vulnerabilities at the SSL level. In a very easy way, modern attacks can be prevented to encourage the correct functioning of services. By avoiding these attacks we managed to provide very important stability and business continuity for us.

The protection of Check Point DDoS protector is a very effective and fast solution. It was important to request support from our vendor to be able to put it into proper operation, under the best current Check Point practices. The result was a good implementation and satisfaction for the company.

What is most valuable?

Check Point DDoS Protector uses many features that are very important to us such as machine learning and behavior analysis. Under traffic policies, anything correctly detected as normal traffic is fine but traffic that tends to be malicious and does not adjust with the policies it is immediately blocked.

Its protection generates the automatic creation of signatures to avoid zero-day service denial attacks. Its protection against DNS attacks is very effective.

This technology really meets our expectations.

What needs improvement?

Something that should be improved across the board is the way they provide support. It can be more effective and improve over time.

On the other hand, the generation of either white or black lists cannot be carried out en masse, which generates a lot of administration and management for the security team.

Its administration can be more intuitive. It could be used at the level of SmartConsole or as it is the infinity portal, there are some improvements that can be generated for customer satisfaction.

For how long have I used the solution?

During times of the pandemic, we verified that many of our web applications exposed to the internet were vulnerable targets for denial-of-service attacks. We used a Check Point device to mitigate them during the last six months approximately, and have been really happy with the product.

Which solution did I use previously and why did I switch?

The implementation was carried out with the parameters of best practices sent by the manufacturer with the help of the partner. I do not see that we can improve this. We must continue testing to see in time what must be adjusted. For the moment, everything works right.

What's my experience with pricing, setup cost, and licensing?

Regarding the cost, it doesn't seem like a very expensive option to me. However, new users should also take into account best practices and request support from a good Check Point partner to help implement everything correctly.

Which other solutions did I evaluate?

We haven't really used physical tools. We used Azure WAF for a while to avoid problems, however, this technology is more effective.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Cloud Support - Security Admin at a tech company with 1-10 employees
User
Top 5Leaderboard
Intuitive with good zero-day protection and good threat mitigation
Pros and Cons
  • "It uses several layers of security."
  • "The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."

What is our primary use case?

Our company handles a lot of information and it is vital to have it protected. Currently, DDoS attacks are becoming more modern. They generate new ways to exploit sectors with vulnerabilities which can be exploited to have access to, and seize data among others.

An attack of this type can generate a loss of work continuity generating both information and economic losses, for which we required a proactive tool that will help us correct these possible security flaws, so we opted for the use of Check Point DDoS Protector.

How has it helped my organization?

In our company, we have several applications published in Microsoft Azure in-app services. We required a tool that would help us shield business applications a little more from modern threats - including intelligent SSL attacks, and protection against zero-day attacks - preventing us from having a failure in services that would translate into economic losses for the company.

This is why Check Point perfectly matched the problem we had and helped us solve the security flaws.

It helped us a lot to mitigate and management and the company's top managers feel quite safe with Check Point.

What is most valuable?

First of all, the tool is easy to implement. It is one of the features of Check Point and is up and running with some basic configurations.

It has a quite intuitive portal for the user. In this way, it is possible to generate greater and easier control of the checkpoint security applications.

Zero-day protection is very useful. It really helps to avoid modern threats that can affect or impact the productivity of a business. It uses several layers of security. It's innovative and that helps a lot.

Threat mitigation is very good for both cloud and on-premise environments.

What needs improvement?

The areas where the Check Point manufacturer in general needs to improve, including:

1-The support can provide improvements in the efficiency of the solution of cases, improvements in response times, and more hours of attention to be able to provide users with a more robust security service.

2- The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer. Some found publicly are a bit advanced or the same result is not achieved in the implementation icon.

For how long have I used the solution?

I've used the solution for just over 12 months. This tool works quite well for DDoS protection in our company.

Which solution did I use previously and why did I switch?

We had not used a tool for this type of protection before.

What's my experience with pricing, setup cost, and licensing?

It is important to have the help of a specialized partner who provides guides in addition to validating the client's requirements in order to match them in the best way with the available Check Point tools.

Which other solutions did I evaluate?

Check Point was the first option. It perfectly matched what was requested by management. Its efficiency is very good, and, with the help of the partner, we were able to provide a correct implementation.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
PeerSpot user
Support at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Robust, easy to implement, and protects from zero-day attacks
Pros and Cons
  • "This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security."
  • "It is an expensive tool for some companies."

What is our primary use case?

Our main office still had the local infrastructure, which we had to have safely and avoid any type of threat that could prevent our services from working correctly, for which we needed DDoS protection that was powerful. We recognized, before the investigation of the tool, the need to have strong protection. We found Check Point DDoS protection had the best features, which were completely adapted to our needs.

Modern threat and signature databases are shared among all Check Point DDoS devices globally to increase zero-day protection, which is great for our business. We trust such a comprehensive tool.

How has it helped my organization?

Checkpoint DDoS Protection is a tool that gave us network protection in our local environments to avoid zero-day attacks and denial of services, among others, that complicated the day-to-day of our services and stopped work continuity.

This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.

In our country, in recent years, there have been attacks that have stopped companies for which we choose to use this tool to protect SSL/TSL.

We are really happy with the solution.

What is most valuable?

It is a tool based on a physical device with a lot of documentation to implement in the best way and with the best practices of the Check Point manufacturer.

We have protection against zero-day threats that is very effective, fulfilling, and guarantees network security on our main site.

It offers easy implementation and a lot of support from the specialized partner.

The environment can be coupled to the size and services of each company to have costs adjusted to the needs of the company.

This is a robust tool and is available to implement on-premise.

What needs improvement?

Check Point DDoS does not escape support issues; it is sometimes difficult to implement. You require support from your partner or Check Point support.

We would like this tool could also be cloud-based. Physical devices have a greater tendency to fail, which is why we would also like to have an improvement to a virtual device.     

It is an expensive tool for some companies. It would also be good to have an improvement in cost level and increase competition against other tools from other manufacturers.

For how long have I used the solution?

In our main office, we use this security device for Check Point DDoS protection to avoid modern attacks that would complicate business productivity. We've used this device since 2020.

Which solution did I use previously and why did I switch?

Previously, we did not have DDoS protection; however, we read about other manufacturers.

What's my experience with pricing, setup cost, and licensing?

It is important to look up the manufacturer's documentation in order to implement it correctly.

Which other solutions did I evaluate?

We always evaluate different security devices to find the option that suits our requirements. We firmly believe that this solution is one of the best and safest thanks to its characteristics.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point DDoS Protector Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2022
Buyer's Guide
Download our free Check Point DDoS Protector Report and get advice and tips from experienced pros sharing their opinions.