Try our new research platform with insights from 80,000+ expert users

Check Point DDoS Protector vs Fortinet FortiDDoS comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 5, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point DDoS Protector
Ranking in Distributed Denial-of-Service (DDoS) Protection
20th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
12
Ranking in other categories
No ranking in other categories
Fortinet FortiDDoS
Ranking in Distributed Denial-of-Service (DDoS) Protection
11th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
15
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2025, in the Distributed Denial-of-Service (DDoS) Protection category, the mindshare of Check Point DDoS Protector is 1.0%, up from 0.9% compared to the previous year. The mindshare of Fortinet FortiDDoS is 2.8%, down from 3.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Distributed Denial-of-Service (DDoS) Protection
 

Featured Reviews

Petr Zemánek - PeerSpot reviewer
Protect from DDoS attacks with good management and easy setup
I have used Fortinet FortiDDoS. Fortinet is a little bit cheaper. Both solution was effective. The management of Check Point solution is a little bit better. It is 50 percent cheaper than Fortinet. It's very modern now to have an AI in the management for fast finding of attacks or investigation. Check Point have these features in a new releases.
Yazan Omar - PeerSpot reviewer
An easy-to-use tool with great GUI
The product's initial setup phase was really easy. There is a lot of time involved in the testing phase and other processes related to the area of deployment, so it may take up to two weeks to deploy the solution. The solution is deployed on an on-premises model. One person is enough to take care of the deployment phase of the product. The person involved in the deployment phase needs to better understand topologies when dealing with Fortinet.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."
"From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution."
"It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
"It uses several layers of security."
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
"Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point."
"As our business continues to grow, we can grow this product simultaneously."
"This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform."
"Packet inspection has been effective for mitigating DDoS attacks."
"The equipment works very well, and I have not encountered any issues with it. It is a good solution for my company."
"I find the interface easy to use."
"The equipment works very well, and I have not encountered any issues with it."
"The most valuable feature is the cloud DDoS scrubbing capability."
"This solution can protect Layer 3, Layer 4 and Layer 7 attacks of applications for us."
"We have researched them all, and it's a good solution all around."
"The solution is very user-friendly and very easy to use."
 

Cons

"Monitoring and reporting are the things that can be introduced in the future."
"It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
"It is an expensive tool for some companies."
"Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."
"I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes."
"The solution can be a little more user-friendly and it can be more affordable."
"The web interface could be much better."
"Alerts and reporting features must be improved."
"The tool needs to focus more on the area of application traffic management, where it currently has some shortcomings."
"I find that there have been issues in the past year with the solution hanging. It freezes often."
"I would like to see analytics, big data."
"The only thing they need to do is to automate it. Today, you must create tools that do not require the use of an expert or anyone with special skills."
"The main improvement would be to change the firewall model, however, currently, everything is fixed and working well."
 

Pricing and Cost Advice

"The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
"It's an expensive solution. It's one of the most expensive solutions in the world. It's cheaper than Palo Alto and Cisco but these are expensive solutions. Fortinet is cheaper."
"I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on."
"The product’s pricing needs improvement."
"The solution is reasonably priced."
"It's quite pricey."
report
Use our free recommendation engine to learn which Distributed Denial-of-Service (DDoS) Protection solutions are best for your needs.
856,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
32%
Manufacturing Company
15%
Computer Software Company
8%
Financial Services Firm
8%
Computer Software Company
14%
Financial Services Firm
9%
Manufacturing Company
9%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your primary use case for Check Point DDoS Protector?
The main use case is to protect bank from DDoS attacks. We have it as a service device in network and but it's a common installation.
Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What do you like most about Fortinet FortiDDoS?
The product's initial setup phase was really easy.
What is your experience regarding pricing and costs for Fortinet FortiDDoS?
Fortinet FortiDDoS offers lower costs compared to other solutions. The licensing costs are annually renewed.
 

Also Known As

No data available
Fortinet DDoS, FortiDDos
 

Overview

 

Sample Customers

Boston Properties
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about Check Point DDoS Protector vs. Fortinet FortiDDoS and other solutions. Updated: June 2025.
856,873 professionals have used our research since 2012.