Try our new research platform with insights from 80,000+ expert users

Check Point DDoS Protector vs Nexusguard DDoS Protection comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 5, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point DDoS Protector
Ranking in Distributed Denial-of-Service (DDoS) Protection
20th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
12
Ranking in other categories
No ranking in other categories
Nexusguard DDoS Protection
Ranking in Distributed Denial-of-Service (DDoS) Protection
10th
Average Rating
9.4
Reviews Sentiment
7.7
Number of Reviews
5
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2025, in the Distributed Denial-of-Service (DDoS) Protection category, the mindshare of Check Point DDoS Protector is 1.0%, up from 0.9% compared to the previous year. The mindshare of Nexusguard DDoS Protection is 1.8%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Distributed Denial-of-Service (DDoS) Protection
 

Featured Reviews

Petr Zemánek - PeerSpot reviewer
Protect from DDoS attacks with good management and easy setup
I have used Fortinet FortiDDoS. Fortinet is a little bit cheaper. Both solution was effective. The management of Check Point solution is a little bit better. It is 50 percent cheaper than Fortinet. It's very modern now to have an AI in the management for fast finding of attacks or investigation. Check Point have these features in a new releases.
ShashikaKodikara - PeerSpot reviewer
A solution requiring straightforward maintenance while remaining cost-effective compared to its competitors in the market
I am not in a position to speak about the areas where the solution needed improvement because I resigned during the implementation phase. At that time, the implementation was ongoing, and everything seemed to be going well. Using the solution, our team managed to transfer a couple of routers through a few areas. However, I believe the migration is still ongoing. Nonetheless, the first phase of the implementation was successful before my departure. There was a certain level of performance degradation in the solution, which I don't know if it can be tuned. This is because I was working for a short period on the solution. In my experience, it is an area that can be improved while also considering the stability and scalability aspects of the solution. If one wants to scale up, then one needs to change their plan. However, the thing is, one can always go for the larger scale based on one's anticipation of future traffic.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security."
"It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
"Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure."
"From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution."
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
"The initial setup takes two hours."
"It uses several layers of security."
"As our business continues to grow, we can grow this product simultaneously."
"Cloud Diversion is another good feature packaged with the whole solution. When attack traffic is detected, Cloud Diversion triggers to automatically route our prefix to Nexusguard’s scrubbing center, ensuring that all attack traffic is dropped in the shortest time possible."
"The support team was helpful."
"The managed service allows us to confidently rely on Nexusguard’s professional team to take relevant actions as and when required to make sure DDoS attacks are successfully mitigated, ensuring 100% uptime of our service."
"Based on the support received for implementation, I rate the solution's technical support a nine out of ten."
"Filters can be customized depending on the characteristics of the attack traffic. This feature has made it easier for Nexusguard's SOC team to further isolate any specific attack that can't be blocked by pre-configured mitigation."
 

Cons

"Monitoring and reporting are the things that can be introduced in the future."
"The mitigation part could be improved."
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."
"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."
"The solution should greatly improve its interface."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
"It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
"Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."
"There was a certain level of performance degradation in the solution, which I don't know if it can be tuned...In my experience, it is an area that can be improved while also considering the stability and scalability aspects of the solution."
"The solution must provide features for the post-processing of the traffic type and the traffic quality."
"The mitigation scope of Origin Protection is not fully efficient as there could be delays in activating the countermeasures."
"One of the features that should be added to the next release is report generation. Currently, reports can be downloaded every month and are only available at the beginning of each month. It would be nice to generate the reports based on specific dates that we prefer and not have to wait until the next month for the current month’s report."
"One thing that we would like to improve from them is to provide more training to SOC team for them to have a deep understanding of the solution so that they would always be ready to answer anything without the need to escalate queries to senior personnel."
 

Pricing and Cost Advice

"I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on."
"It's an expensive solution. It's one of the most expensive solutions in the world. It's cheaper than Palo Alto and Cisco but these are expensive solutions. Fortinet is cheaper."
"The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
"On a scale of one to ten, where one represents a cheap option, and ten represents an expensive option, I would rate the solution a seven in terms of cost."
report
Use our free recommendation engine to learn which Distributed Denial-of-Service (DDoS) Protection solutions are best for your needs.
856,856 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
32%
Manufacturing Company
15%
Computer Software Company
8%
Financial Services Firm
8%
Comms Service Provider
31%
Media Company
11%
Computer Software Company
8%
Educational Organization
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your primary use case for Check Point DDoS Protector?
The main use case is to protect bank from DDoS attacks. We have it as a service device in network and but it's a common installation.
What needs improvement with Nexusguard?
The solution must provide features for the post-processing of the traffic type and the traffic quality.
What advice do you have for others considering Nexusguard DDoS Protection?
Our traffic is not that high. There haven’t been any huge attacks that the solution has solved or protected us from. It produces some alerts, but alerts can be subjective. The tools get the statist...
 

Overview

 

Sample Customers

Boston Properties
21st Century Technologies, Netpluz, REDtone, SNOC, StarHub, aamra
Find out what your peers are saying about Check Point DDoS Protector vs. Nexusguard DDoS Protection and other solutions. Updated: June 2025.
856,856 professionals have used our research since 2012.