Check Point DDoS Protector Valuable Features

Robert Plese - PeerSpot reviewer
Network Engineer at a tech services company with 51-200 employees

From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution. There can be some false positives, but in general, it works fine.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform. 

The SSL decryptor card comes by default with the appliance and can be enabled if needed with the purchase of a license.

This solution uses asymmetric deployment with a challenge/response mechanism that has lower latency & higher capacity to block SSL/TLS attacks.

Behavior-based protection with automatic signature creation against unknown, zero-day DDoS attacks is employed.

Support for wildcard certificates reduces operational complexity because the admin doesn't have to update it every time a certificate changes.

The Cloud Signaling capability is able to route traffic to the scrubbing center in case of a volumetric attack.

It offers effective protection against DNS attacks.

It provides layer three to layer seven protection in on-premises, cloud, and hybrid environments. It's able to detect and mitigate attacks with no performance impact or risk.

This product has a dedicated DoS mitigation engine (DME) that off-loads high-volume attacks, inspecting without impacting user experience.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Check Point DDoS Protector is a product that uses machine learning and behavior analysis. It also includes a comprehensive suite of four essential security modules: Anti-DDoS, Network Behavior Analysis (NBA), Intrusion Prevention System (IPS), and Protection against SSL attacks. The improved traffic processing latency is at a good level.

Check Point DDoS Protector generates a really low level of false-positive alerts. This is a good thing as they don't fill the mailboxes with false alerts and you don't have to be as vigilant.

View full review »
Buyer's Guide
Check Point DDoS Protector
March 2024
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

One of its most outstanding functions is the zero-day DDOS. This allows us personalized protection of layers and not only extends to the mitigation of SSL attacks based on hardware that inspects the latest SSL and TLS standards. We can take it to the cloud, from on-premise to the cloud, being precise and distant. These characteristics are part of the best solutions and the innovation that Check Point constantly gives us is great. It's making our applications and services more secure.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

One of the features that we have liked the most as administrators and users of the tool is the possibility of the solution being scalable. We're now protecting data according to the needs of our organization, which allows us to protect our network from denial attacks. As our business continues to grow, we can grow this product simultaneously. We understand that these solutions have a very high level of availability, which offers us a guarantee that the service will be online, and accessible to all our customers, even during the attacks we have had. It is a protection that is still efficient in times of crisis. 

View full review »
NG
Support at a security firm with 51-200 employees

The solution provides protection at multiple layers of the network, including the network layer, transport layer, and application layer, to defend against various types of DDoS attacks.

The real-time monitoring is excellent with monitoring.

It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.

I have a centralized management console that enables security teams to configure and manage policies across multiple devices and locations.

The product includes advanced analytics capabilities that enable security teams to analyze attack data and identify patterns and trends to better protect against future attacks.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

The expanded protection features are great. Its ability to detect and mitigate attacks in real-time is an essential feature for our company as it ensures the infrastructure is being protected from attacks at all times. 

It's important to understand that this type of objective attack (DDoS) is to overload the capacity of our infrastructure by making illegitimate requests. That is why detection and mitigation is a critical process for our organization. It helps reduce downtime of infrastructure capacity that is flooded with requests. The solution provides us with detection and reporting and multiple layers of protection to help identify and mitigate each type of attack.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The traffic processing latency is at a good level, being about 40 microseconds on the average for our traffic pattern. I believe most of the users will not even notice that this solution is on the traffic path.

The appliances have the hardware-based SSL engine, which allows it to offload and inspect the SSL/TLS encrypted traffic of the various standards.

The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

It is a tool based on a physical device with a lot of documentation to implement in the best way and with the best practices of the Check Point manufacturer.

We have protection against zero-day threats that is very effective, fulfilling, and guarantees network security on our main site.

It offers easy implementation and a lot of support from the specialized partner.

The environment can be coupled to the size and services of each company to have costs adjusted to the needs of the company.

This is a robust tool and is available to implement on-premise.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

First of all, the tool is easy to implement. It is one of the features of Check Point and is up and running with some basic configurations.

It has a quite intuitive portal for the user. In this way, it is possible to generate greater and easier control of the checkpoint security applications.

Zero-day protection is very useful. It really helps to avoid modern threats that can affect or impact the productivity of a business. It uses several layers of security. It's innovative and that helps a lot.

Threat mitigation is very good for both cloud and on-premise environments.

View full review »
WS
Senior System Administrator at PFCTI

The firewall and antivirus features are the most valuable features. 

View full review »
Buyer's Guide
Check Point DDoS Protector
March 2024
Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.