We performed a comparison between Check Point DDoS Protector and Radware DefenseFlow based on real PeerSpot user reviews.
Find out what your peers are saying about Cloudflare, NETSCOUT, Akamai and others in Distributed Denial of Service (DDOS) Protection."This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security."
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood."
"It can be deployed as a hardware appliance, virtual appliance, or as a cloud service."
"Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point."
"Check Point DDoS Protector is a product that uses machine learning and behavior analysis."
"From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution."
"It uses several layers of security."
"As our business continues to grow, we can grow this product simultaneously."
"The tool's machine learning and artificial intelligence help to prevent attacks by analyzing real-time traffic."
"Recently, our company has been facing difficulties due to attacks originating from the Russian Federation. DefenseFlow has proven to be a highly effective solution in protecting our customers."
"Check Point DDoS Protector does not provide the ability to upload data for the blacklist/whitelist in bulk, which is one of the big points that need to be improved to facilitate configurations."
"It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
"Check Point should develop a DDoS solution because they don't have one and we need to use another solution, in our case, Imperva. This is a problem because we need to have two firewalls. We would like to only have one solution because it would improve the management, we would have fewer incidents, and we wouldn't need to talk to more than one person for support."
"The solution should greatly improve its interface."
"Monitoring and reporting are the things that can be introduced in the future."
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."
"The Check Point support language is only in English."
"The public documentation is a detail that must be improved in order to have greater implementations with the best practices in this case of the Check Point manufacturer."
"Its documentation is not 100% clear, making it the weakest aspect of Radware. We have encountered some difficulties in understanding how to configure it correctly."
"Radware DefenseFlow should add new features and algorithms to make it efficient."
Check Point DDoS Protector is ranked 12th in Distributed Denial of Service (DDOS) Protection with 11 reviews while Radware DefenseFlow is ranked 23rd in Distributed Denial of Service (DDOS) Protection with 2 reviews. Check Point DDoS Protector is rated 8.0, while Radware DefenseFlow is rated 9.0. The top reviewer of Check Point DDoS Protector writes "Good support and effective against SSL attacks, but the dashboard is complicated". On the other hand, the top reviewer of Radware DefenseFlow writes "A security solution to protect networks with extensive troubleshooting". Check Point DDoS Protector is most compared with Radware DefensePro, Arbor DDoS, Cloudflare and Fortinet FortiDDoS, whereas Radware DefenseFlow is most compared with Radware DefensePro and Arbor DDoS.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.