2019-02-05T07:16:00Z

What do you like most about Check Point DDoS Protector?

Miriam Tover - PeerSpot reviewer
  • 0
  • 1
PeerSpot user
9

9 Answers

NG
User
Top 5Leaderboard
2023-02-25T22:30:00Z
Feb 25, 2023

It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.

Search for a product comparison
Edwin Solano Salmeron - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-02-08T16:00:00Z
Feb 8, 2023

As our business continues to grow, we can grow this product simultaneously.

Adrian  ACosta - PeerSpot reviewer
User
Top 5
2022-12-29T03:09:00Z
Dec 29, 2022

It provides zero-day protection which gives the tool more value since it helps to avoid threats.

Diana Alvarado - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-09-23T07:34:00Z
Sep 23, 2022

This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.

LD
User
Top 5Leaderboard
2022-08-02T19:39:00Z
Aug 2, 2022

It uses several layers of security.

Adrian Cambronero - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-05-24T21:03:00Z
May 24, 2022

Check Point DDoS Protector is a product that uses machine learning and behavior analysis.

Learn what your peers think about Check Point DDoS Protector. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
BD
Real User
2021-05-01T16:52:00Z
May 1, 2021

This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.

OP
Real User
2020-09-27T15:01:00Z
Sep 27, 2020

The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.

WS
Real User
2019-02-05T07:16:00Z
Feb 5, 2019

Currently, we have fewer incidents with viruses. We improved our IQ operations and security using this solution. Our company's better after using Check Point.

Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damageLearn more about Ddos Protector.
Download Check Point DDoS Protector ReportRead more