Our main office still had the local infrastructure, which we had to have safely and avoid any type of threat that could prevent our services from working correctly, for which we needed DDoS protection that was powerful. We recognized, before the investigation of the tool, the need to have strong protection. We found Check Point DDoS protection had the best features, which were completely adapted to our needs.
Modern threat and signature databases are shared among all Check Point DDoS devices globally to increase zero-day protection, which is great for our business. We trust such a comprehensive tool.
Checkpoint DDoS Protection is a tool that gave us network protection in our local environments to avoid zero-day attacks and denial of services, among others, that complicated the day-to-day of our services and stopped work continuity.
This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.
In our country, in recent years, there have been attacks that have stopped companies for which we choose to use this tool to protect SSL/TSL.
We are really happy with the solution.
It is a tool based on a physical device with a lot of documentation to implement in the best way and with the best practices of the Check Point manufacturer.
We have protection against zero-day threats that is very effective, fulfilling, and guarantees network security on our main site.
It offers easy implementation and a lot of support from the specialized partner.
The environment can be coupled to the size and services of each company to have costs adjusted to the needs of the company.
This is a robust tool and is available to implement on-premise.
Check Point DDoS does not escape support issues; it is sometimes difficult to implement. You require support from your partner or Check Point support.
We would like this tool could also be cloud-based. Physical devices have a greater tendency to fail, which is why we would also like to have an improvement to a virtual device.
It is an expensive tool for some companies. It would also be good to have an improvement in cost level and increase competition against other tools from other manufacturers.
In our main office, we use this security device for Check Point DDoS protection to avoid modern attacks that would complicate business productivity. We've used this device since 2020.
Previously, we did not have DDoS protection; however, we read about other manufacturers.
It is important to look up the manufacturer's documentation in order to implement it correctly.
We always evaluate different security devices to find the option that suits our requirements. We firmly believe that this solution is one of the best and safest thanks to its characteristics.