Coming October 25: PeerSpot Awards will be announced! Learn more

Check Point DDoS Protector vs Fortinet FortiDDoS comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point DDoS Protector and Fortinet FortiDDoS based on real PeerSpot user reviews.

Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.

To learn more, read our detailed Check Point DDoS Protector vs. Fortinet FortiDDoS report (Updated: September 2022).
633,572 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.""This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.""It uses several layers of security.""With Check Point and its model of known and unknown threats, its way of dealing with these problems helped us avoid crashes in our front-end infrastructure as well as internal ones.""This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.""Check Point DDoS Protector is a product that uses machine learning and behavior analysis."

More Check Point DDoS Protector Pros →

"The solution is very user-friendly and very easy to use.""The customer support is helpful.""The solution already has security profiles and it can protect from DDoS attacks and other kinds of attacks.""We have researched them all, and it's a good solution all around."

More Fortinet FortiDDoS Pros →

Cons
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer.""It is an expensive tool for some companies.""Something that should be improved across the board is the way they provide support.""For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version.""It does not provide the capability to upload data for blacklisting/whitelisting in bulk.""Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."

More Check Point DDoS Protector Cons →

"The only thing they need to do is to automate it. Today, you must create tools that do not require the use of an expert or anyone with special skills.""There aren't really any aspects of the solution we are unhappy with. It's been a positive experience overall.""The OS could be less buggy.""The web interface could be much better."

More Fortinet FortiDDoS Cons →

Pricing and Cost Advice
  • "The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
  • More Check Point DDoS Protector Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Distributed Denial of Service (DDOS) Protection solutions are best for your needs.
    633,572 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.
    Top Answer:The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled.
    Top Answer:It does not provide the capability to upload data for blacklisting/whitelisting in bulk. Rather, in cases where many IP addresses need to be blacklisted or whitelisted, either a single IP address has… more »
    Top Answer:Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
    Top Answer:I'm not aware of the exact pricing. I am always looking to the needs of the customer. We usually work with Fortinet, so we will recommend Fortinet firewalls. However, if we need extra features, then… more »
    Ranking
    Views
    608
    Comparisons
    400
    Reviews
    4
    Average Words per Review
    676
    Rating
    7.8
    Views
    2,241
    Comparisons
    1,822
    Reviews
    2
    Average Words per Review
    676
    Rating
    7.0
    Comparisons
    Also Known As
    Fortinet DDoS, FortiDDos
    Learn More
    Overview

    Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage
    Learn more about Ddos Protector.


    Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

    Offer
    Learn more about Check Point DDoS Protector
    Learn more about Fortinet FortiDDoS
    Sample Customers
    Boston Properties
    Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company25%
    Comms Service Provider22%
    Insurance Company6%
    Security Firm5%
    VISITORS READING REVIEWS
    Comms Service Provider21%
    Computer Software Company20%
    Financial Services Firm8%
    Government6%
    Company Size
    REVIEWERS
    Small Business71%
    Midsize Enterprise14%
    Large Enterprise14%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise21%
    Large Enterprise49%
    REVIEWERS
    Small Business56%
    Midsize Enterprise11%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise27%
    Large Enterprise53%
    Buyer's Guide
    Check Point DDoS Protector vs. Fortinet FortiDDoS
    September 2022
    Find out what your peers are saying about Check Point DDoS Protector vs. Fortinet FortiDDoS and other solutions. Updated: September 2022.
    633,572 professionals have used our research since 2012.

    Check Point DDoS Protector is ranked 11th in Distributed Denial of Service (DDOS) Protection with 6 reviews while Fortinet FortiDDoS is ranked 13th in Distributed Denial of Service (DDOS) Protection with 4 reviews. Check Point DDoS Protector is rated 7.8, while Fortinet FortiDDoS is rated 7.0. The top reviewer of Check Point DDoS Protector writes "Good support and effective against SSL attacks, but the dashboard is complicated". On the other hand, the top reviewer of Fortinet FortiDDoS writes "Well suited for small businesses, but the setup is complex". Check Point DDoS Protector is most compared with Radware DefensePro, Arbor DDoS, Imperva DDoS, Cloudflare and Neustar UltraDDoS, whereas Fortinet FortiDDoS is most compared with Arbor DDoS, Fortinet FortiWeb, VMware NSX, Radware DefensePro and Fortinet FortiADC. See our Check Point DDoS Protector vs. Fortinet FortiDDoS report.

    See our list of best Distributed Denial of Service (DDOS) Protection vendors.

    We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.