Check Point DDoS Protector offers valuable features such as real-time detection and mitigation, low latency, hardware-based SSL engine, and behavioral analysis. It utilizes a centralized management console with seamless integration into existing security infrastructure. Zero-day protection and scalable capabilities protect against modern threats in on-premises, cloud, and hybrid environments. Its database of known attacks, high availability, and automatic signature creation enhance security, reducing incidents and ensuring robust defense against DDoS attacks.
- "We found that Check Point was able to provide us superior capabilities and features on the basis we were evaluating."
- "Check Point is one of the solutions that give us the most value, and they are constantly innovating."
- "Now, all the ISP lines are protected and we can switch the users back and forth between them with the same level of security."
Check Point DDoS Protector needs an integrated DDoS response, modularity for scalability, and easier bulk IP management. Users face challenges with outdated versions, costly upgrades, and complex dashboards lacking real-time traffic insights. Improved support, multilingual documentation, and cloud-based options are recommended. Pricing should be more competitive. Some configurations require high expertise, and advanced features are difficult to use. User interface improvements and more detailed, customizable reporting are also needed.
- "It does not provide the capability to upload data for blacklisting/whitelisting in bulk."
- "Currently, two of the things that I would like would be applications for Android and IOS where we can follow the events, and, if necessary, make changes."
- "For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version."