Try our new research platform with insights from 80,000+ expert users

Check Point DDoS Protector vs Kentik comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 5, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point DDoS Protector
Ranking in Distributed Denial-of-Service (DDoS) Protection
20th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
12
Ranking in other categories
No ranking in other categories
Kentik
Ranking in Distributed Denial-of-Service (DDoS) Protection
17th
Average Rating
9.2
Reviews Sentiment
7.3
Number of Reviews
16
Ranking in other categories
Network Monitoring Software (33rd)
 

Mindshare comparison

As of June 2025, in the Distributed Denial-of-Service (DDoS) Protection category, the mindshare of Check Point DDoS Protector is 1.0%, up from 0.9% compared to the previous year. The mindshare of Kentik is 0.6%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Distributed Denial-of-Service (DDoS) Protection
 

Featured Reviews

Petr Zemánek - PeerSpot reviewer
Protect from DDoS attacks with good management and easy setup
I have used Fortinet FortiDDoS. Fortinet is a little bit cheaper. Both solution was effective. The management of Check Point solution is a little bit better. It is 50 percent cheaper than Fortinet. It's very modern now to have an AI in the management for fast finding of attacks or investigation. Check Point have these features in a new releases.
ADRIANA SALDARRIAGA TOBON - PeerSpot reviewer
Client experience and cybersecurity have improved with an easy setup
The solution is valuable for client experience, especially in the financial sector. The most important feature is cybersecurity. The pricing is good, but the functionality is the most important aspect for clients. The solution is easy to deploy and requires only one person to set up, making it easy and quick. Overall, the ease of use and the fact that it meets client expectations are major positives.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"One of its most outstanding functions is the zero-day DDOS."
"Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point."
"It uses several layers of security."
"Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."
"Check Point DDoS Protector is a product that uses machine learning and behavior analysis."
"From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution."
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
"This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security."
"One of the valuable features is the intuitive nature of building out reports, and then triggering actions based on specific metrics from those reports. It has a really good UI and the ability to surface data through the reporting functions is pretty good. That's helped a lot in the security space."
"The most important feature is cybersecurity."
"Overall, I would give Kentik nine out of ten stars."
"I really love the Data Explorer. I use it all the time to go in and craft exactly what I need to see. I'm able to then take that story and explain it to the executives. I've done that a couple of times and it is helpful."
"The most valuable feature is being able to pull traffic patterns; to and from destinations. We're able to understand where our traffic is going, our top talkers from an AS set, as well as where our traffic's coming from."
"Overall, the ease of use and the fact that it meets client expectations are major positives."
"We're pretty happy with the API functionality. It's web, and it's very simple to set up queries. It has served us well and you don't need to be an expert on the API or the product to set these things up."
"I am able to do a lot of work on the visualization end to create different visualizations and different ways to get information out of it."
 

Cons

"It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
"The Check Point support language is only in English."
"I would like applications for Android and IOS where we can follow the events, and, if necessary, make changes."
"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."
"The product is expensive."
"The solution should greatly improve its interface."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
"Monitoring and reporting are the things that can be introduced in the future."
"I believe they're already working on this, but I would love for them to create better integrations from network flow data to application performance — tracing — so that we could overlay that data more readily. With more companies going hybrid, flow logs and flow data, whether it be VPC or on-prem, matched with application performance and trace data, is pretty important."
"I consider the pricing model as an area for improvement."
"The product could strive for more improvements to become closer to perfect."
"I would like to see them explore the area of cost analysis."
"Sometimes, the tool has complications, so we must deal with the additional support from the tool's end."
"We had faced some issues during an outage and were not able to get the desired results from Kentik tools. It took time to resolve these issues, which is why I give them eight points."
"I've checked out the V4 version of the interface and it's still a little bit clunky for me to use. I still go back to the old interface. That's definitely one that they still need to work on. It doesn't seem like everything that you get in the V3, the older interface, is there. For instance, I was trying to add a user or do the administrative tasks in V4, and I couldn't figure out where I was supposed to do that."
"They're moving more in a direction where they are saying, "Hey, here's information that you may be interested in or may a need," before the question has to explicitly be asked. Continuing to move in that direction would be a good thing."
 

Pricing and Cost Advice

"It's an expensive solution. It's one of the most expensive solutions in the world. It's cheaper than Palo Alto and Cisco but these are expensive solutions. Fortinet is cheaper."
"I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on."
"The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
"We have an annual contract with Kentik that we renew each year for a set number of licenses. We also have some burstable licenses which we can spin up and spin down, and those are paid as they are used."
"The tool is cheaply priced."
report
Use our free recommendation engine to learn which Distributed Denial-of-Service (DDoS) Protection solutions are best for your needs.
856,856 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
32%
Manufacturing Company
15%
Computer Software Company
8%
Financial Services Firm
8%
Computer Software Company
14%
Financial Services Firm
12%
Comms Service Provider
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your primary use case for Check Point DDoS Protector?
The main use case is to protect bank from DDoS attacks. We have it as a service device in network and but it's a common installation.
What is your experience regarding pricing and costs for Kentik?
Kentik’s pricing is competitive in the marketplace. It depends on the sizing, and once you have the right sizing, it's usually okay.
What needs improvement with Kentik?
In recent months, I've noticed that while the industry is trending towards AI, Kentik has room for improvement in this area. Specifically, more work is required to integrate AI for troubleshooting,...
What is your primary use case for Kentik?
I have been evaluating Kentik ( /products/kentik-reviews ) against other tools to see what it can provide differently. Primarily, I have used it for network monitoring, specifically in multi-vendor...
 

Comparisons

 

Overview

 

Sample Customers

Boston Properties
Pandora, Yelp, Neustar, Box, University of Washington, Zoom, Tata, and Cogent. 
Find out what your peers are saying about Check Point DDoS Protector vs. Kentik and other solutions. Updated: June 2025.
856,856 professionals have used our research since 2012.