Know your gear
Check Point's DDoS Protector keeps businesses running with multi-layered, customizable protections and 12 Gbps performance that automatically defend against network flood and application layer attacks for fast response time against today's sophisticated denial of service attacks. DDoS Protector appliances offer flexible deployment options to easily protect any size business, and integrated security management for real-time traffic analysis and threat management intelligence for advanced protection against DDoS attacks. Check Point also provides dedicated 24/7 support and resources to ensure up-to-the-minute protections.
Enhance your purchase
Check Point DDoS Protector 4412 - security appliance is rated
4.40 out of
5 by
7.
Rated 5 out of
5 by
Petr Zemánek from
Protect from DDoS attacks with good management and easy setup
What is our primary use case?
The main use case is to protect bank from DDoS attacks. We have it as a service device in network and but it's a common installation.
How has it helped my organization?
DDoS Protector is made by a hardware company, and Check Point integrates this solution into its own management and infrastructure.
What is most valuable?
The most effective feature is the database of known attacks and attacker reputations. This database is widely used to stop attacks. It stopped a lot of attacks.
What needs improvement?
The pricing could be cheaper.
For how long have I used the solution?
I have been using Check Point DDoS Protector for 15 years.
How are customer service and support?
We have two levels of support. We have a local partner. We get vendor support through them. We are we are not happy with them. We have no problem with Check Point Support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Fortinet FortiDDoS. Fortinet is a little bit cheaper. Both solution was effective. The management of Check Point solution is a little bit better. It is 50 percent cheaper than Fortinet.
It's very modern now to have an AI in the management for fast finding of attacks or investigation. Check Point have these features in a new releases.
How was the initial setup?
The initial setup takes two hours. We needed one month to learn the device before switching it to production. The configuration itself was fast, but the learning process took time. The solution needs this process to learn the normal traffic patterns. This is because the device isn't just based on attack signatures, but also on behavior analysis.
What's my experience with pricing, setup cost, and licensing?
The product is expensive.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2024-08-08T00:00:00-04:00
Rated 5 out of
5 by
Hugo Alexis Espinoza Naranjo from
Simple and fast protection that can expand as needed
What is our primary use case?
We needed to establish a solution that allows importing several protection factors within the website traffic to improve security and network availability. We wanted to manage it in a simple, fast, and scalable way. This product meets all these necessary characteristics and is robust and scalable.
How has it helped my organization?
We wanted a product that offered many protections in a single solution. We also needed DDoS ??attack protection. Check Point detects and automatically mitigates attacks, which helps our organization protect our infrastructure. It has critical applications that fight against the negative effects of attacks. So far, it has made a difference and has given confidence to our corporation. It's also giving us the ability to analyze and report accurately.
What is most valuable?
The expanded protection features are great. Its ability to detect and mitigate attacks in real-time is an essential feature for our company as it ensures the infrastructure is being protected from attacks at all times.
It's important to understand that this type of objective attack (DDoS) is to overload the capacity of our infrastructure by making illegitimate requests. That is why detection and mitigation is a critical process for our organization. It helps reduce downtime of infrastructure capacity that is flooded with requests. The solution provides us with detection and reporting and multiple layers of protection to help identify and mitigate each type of attack.
What needs improvement?
The mitigation part could be improved. The capacity of the application layer needs to be better. Although it is one of the layers that are included, attacks at the application level should be improved if it is directed at a specific application or service instead of an underlying infrastructure below that number of layers. DDoS attacks generally indicate malicious situations attempting to exploit vulnerabilities in the application or service, which can lead to resource overload and service interruption.
For how long have I used the solution?
I've been using the solution for one year.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-02-19T00:00:00-05:00
Rated 5 out of
5 by
Robert Plese from
Provides good protection, works dynamically, and analyzes traffic for any suspicious behavior
What is our primary use case?
We are not using it in our organization. I'm working for a system integrator, and we have implemented this solution for various customers from the government, telecoms, and so on. Check Point DDoS Protector is used in line on customer networks to protect web services and data center services.
How has it helped my organization?
It hasn't been very beneficial. I'm working in Croatia, which is a very small market for such type of equipment, so it hasn't had a big impact.
What is most valuable?
From my experience, the best part of this solution is behavioral DDoS protection. The DDoS Protector can monitor the traffic, and based on the behavior, it can decide which traffic is malicious and which traffic is regular. It works dynamically, and it's a very good solution. There can be some false positives, but in general, it works fine.
What needs improvement?
Monitoring and reporting are the things that can be introduced in the future. For DDoS protection, it works fine. It takes some time to get all parameters correct for some parts of the traffic, such as DNS and HTTP, but when those parameters are set correctly, it works fine. So, when it comes to DDoS protection, all the basic functions work fine, but its reporting capabilities aren't that good. They can be improved in the future.
Check Point's support for DDoS Protector is not so good.
For how long have I used the solution?
I've been using this solution for almost seven years.
What do I think about the stability of the solution?
The equipment for version 6.14 of Check Point DDoS Protector was not so stable. When an attack was big, the equipment couldn't monitor and identify between the malicious and regular traffic. It would then go into overload, which means all the traffic is passed through, and DDoS wouldn't work at all. This issue was in version 6. Version 8 is much more stable, and there are no such security issues.
What do I think about the scalability of the solution?
It's quite scalable. You can put several pieces of equipment in parallel, and it would work very well. I'd rate it a seven out of ten in terms of scalability.
How are customer service and support?
This is the worst type of support for me from Check Point. I work with many Check Point equipment and not only DDoS. Their support for DDoS Protector is not so good because this is basically Radware equipment. There is a very big delay between my questions or open requests and the solution. It doesn't matter whether it's software-related, configuration-related, or replacement-related. There has been an instance where Check Point needed to replace the equipment in five days, but I received the replacement after thirty days.
The reason for such a service seems to be a mixture of incompetency and a lot of to-and-fro between Check Point and Radware. In my opinion, Check Point doesn't have skilled people for DDoS, and they forward all the questions and problems to Radware and wait for them to solve the problem. Check Point is only a proxy for such type of support in my opinion. Other customers might have a different opinion.
Which solution did I use previously and why did I switch?
I've some experience with NETSCOUT's Arbor DDoS.
How was the initial setup?
It's not straightforward. It's better to use professional services from Check Point or others for the first installation. It's not so easy. I'd rate it a three out of ten in terms of ease of setup.
All of its deployments are on-premises. You can install DDoS Protector in one to two days. It's not a long period, but you need to put it in learning mode to learn the traffic behavior over a few days and weeks. After that, you need to tweak some parameters, and then you need to go back after a few days to see if it's blocking some of the regular traffic. If you have put DDoS Protector in the blocking or protecting mode, you need to tweak some parameters, and then it needs a few days to learn the traffic with the new set of parameters. It takes three to four weeks, but it's not continuous work. It's done in phases.
The number of people required for deployment and maintenance depends on the customer. Generally, service providers in Croatia have one person for DDoS, but that person also does other things in addition to DDoS. It takes about 10% of his or her time. Generally, two to three hours per day are required.
What's my experience with pricing, setup cost, and licensing?
I don't deal with the pricing, but it seems that you need to get basic support in order to upgrade the DDoS database for new attacks and so on.
What other advice do I have?
I'd recommend going for Radware DDoS than Check Point. My company has moved from Check Point DDoS to Radware DDoS because of lousy support. In my personal experience, it's much better and much easier to work with Radware support than Check Point support.
Overall, I'd rate Check Point DDoS Protector an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclaimer: My company has a business relationship with this vendor other than being a customer:Partner
Date published: 2023-02-19T00:00:00-05:00
Rated 5 out of
5 by
Adrian Cambronero ACosta from
Good GUI, easy to implement, and simple to configure
What is our primary use case?
Check Point DDoS Protector was one of the tools that we acquired when we were migrating to the Azure cloud since we were going to have a hybrid infrastructure and needed a tool that was very good at prevention. Apart from that, we were integrating it with the cloud. This tool is multi-cloud and has many functionalities that are coupled to Azure. With it, we doubled the security of our corporate networks and provided excellent quality connection and security to all employees.
How has it helped my organization?
The organization started two years ago to move all services to the Azure cloud where we handle various types of applications. We realized that we needed another type of tool that would provide us with more robust security since these applications provide third-party services. We needed to close all loopholes to avoid SSL attacks and protect against day zero. In addition, the tool is multi-cloud. If we end up having services in another cloud, it facilitates security and administration there as well.
What is most valuable?
One of the great advantages of Check Point products is how easy it is to implement and configure the tool.
The GUI is easy to use, however, with some improvements, it could be better.
It provides zero-day protection which gives the tool more value since it helps to avoid threats. It also has an updated database that is up-to-date with vulnerabilities, and this helps to generate the necessary recommendations to avoid attacks. It helps us to close the ports through which threats can enter.
What needs improvement?
One of the characteristics that should be improved is the generation or migration of the black or white restriction lists. It does not allow doing it in a massive way, and it must be done one by one. The GUI administration is good, yet there are certain details to improve to make it more intuitive.
They should improve the quality of support to be more agile and quick when solving cases and improve the knowledge base.
The documentation is not well organized. It is very messy and this has caused us delays.
For how long have I used the solution?
The solution has been in use for about one year.
What do I think about the stability of the solution?
The stability of the tool is excellent and robust, providing us with peace of mind.
What do I think about the scalability of the solution?
The solution maintains excellent scalability and is very functional.
How are customer service and support?
Technical support should be improved since we have had several problems with delivery time or the resolution of cases.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no solution before.
How was the initial setup?
The configuration of the tool was very easy since it is very user-friendly.
What about the implementation team?
The implementation was done internally after the first phase by an engineer from the provider.
What was our ROI?
It is always good to make an excellent investment in security since it will keep you safe and keep you profitable in the future.
What's my experience with pricing, setup cost, and licensing?
The cost is a bit high yet competitive compared to the other options on the market. That said, Check Point offers more features.
Which other solutions did I evaluate?
We looked into various options including Sophos.
What other advice do I have?
It is a great solution with very good features and provides excellent security.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-01-01T00:00:00-05:00
Rated 5 out of
5 by
Edwin Solano Salmeron from
Secure and efficient but needs to offer support in Spanish
What is our primary use case?
We had a high number of server interruptions, which led to a high cost for denial of services. We looked for solutions that would allow us to solve and avoid these economic losses with a protection solution that would use advanced techniques to detect and block DDoS attacks to improve the overall security of our network.
Based on all these uncertainties, we looked for a proactive defense against attacks to guarantee the availability and continuity of our business.
How has it helped my organization?
This solution is quite effective and complete. It protects the organization from all the attacks that we have had in recent years, giving us high availability and making it one of the solutions that we have scaled since we can control attacks in real-time. We have worked without any inconvenience. Thus the solution has been a technological ally for our company. It ensures service is delivered to our clients at all times. The solution has many outstanding features, however, offering high availability and real-time analysis services are the most beneficial.
What is most valuable?
One of the features that we have liked the most as administrators and users of the tool is the possibility of the solution being scalable. We're now protecting data according to the needs of our organization, which allows us to protect our network from denial attacks. As our business continues to grow, we can grow this product simultaneously. We understand that these solutions have a very high level of availability, which offers us a guarantee that the service will be online, and accessible to all our customers, even during the attacks we have had. It is a protection that is still efficient in times of crisis.
What needs improvement?
The solution should greatly improve its interface. It could be a little more intuitive, easy to use, and improve some cracks in the interface to make it a little faster when loading. That said, it really is a solution that has allowed us to improve in guaranteeing efficiency against denial-of-service attacks. It's really very good in general.
On the other hand, the topic of remote assistance or support is one of those that we need to also be available in Spanish. Today, many of the technicians who attend to us from the manufacturer are only able to communicate in English.
For how long have I used the solution?
I've been using the solution for four years.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-02-09T00:00:00-05:00
Rated 5 out of
5 by
Jonathan Ramos G. from
Great for validating requests, offer personalized protection, and prevents attacks
What is our primary use case?
We have teams in the cloud and on-premise, and normally many DDoS queries were observed. Some were normal. Others were not. It is at this point that we could have poor quality services due to their denial. Once this problem was raised, we began to see solutions that would allow us to solve these incidents, and help us only to block those that were really malicious or that wanted us to block the services. Check Point is one of the solutions that give us the most value, and they are constantly innovating.
How has it helped my organization?
Among the value-added actions, it allowed us to validate, learn and detect which of the requests are true or false and which come from real regions and which are being used - such as attacks on our services and our infrastructure. It gave us that value is having fewer false positives, which is based on network analysis and protection against IPS and SS, protecting applications against known or emerging attacks.
What is most valuable?
One of its most outstanding functions is the zero-day DDOS. This allows us personalized protection of layers and not only extends to the mitigation of SSL attacks based on hardware that inspects the latest SSL and TLS standards. We can take it to the cloud, from on-premise to the cloud, being precise and distant. These characteristics are part of the best solutions and the innovation that Check Point constantly gives us is great. It's making our applications and services more secure.
What needs improvement?
Currently, two of the things that I would like would be applications for Android and IOS where we can follow the events, and, if necessary, make changes. With teleworking and new emerging technologies, we must point to these new work dimensions. The solution must be one of the pioneers in solving new capacities in our day-to-day management. That is why I would like these characteristics to be considered for future designs. We'd like a simple mobility and management strategy.
For how long have I used the solution?
I've used the solution for two years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2022-10-11T00:00:00-04:00
Rated 5 out of
5 by
reviewer192341 from
Great centralized management, real-time monitoring and has analytics capabilities
What is our primary use case?
In our company, we have used this product for our on-premise applications and networks to guarantee that our services do not suffer from zero-day attacks, SSL attacks, DNS, malware, and bots, among other things, that may affect the normal operation of our services.
Most of our services are local, however, some are also public. The public is where we require or need a tool like Check Point. We need help with the perimeter security that we require; we cannot just rely on conventional security.
How has it helped my organization?
It has helped us improve security in applications, services, and the network. We're avoiding attacks that cause us work continuity problems - avoiding great economic losses for the company. Thanks to its great characteristics, we have been able to fully mitigate threats.
What is most valuable?
The solution provides protection at multiple layers of the network, including the network layer, transport layer, and application layer, to defend against various types of DDoS attacks.
The real-time monitoring is excellent with monitoring.
It can be deployed as a hardware appliance, virtual appliance, or as a cloud service.
I have a centralized management console that enables security teams to configure and manage policies across multiple devices and locations.
The product includes advanced analytics capabilities that enable security teams to analyze attack data and identify patterns and trends to better protect against future attacks.
What needs improvement?
Some features are more advanced, however, using them is hard for us. The documentation is not as precise and does not have enough examples to understand how it works.
Advanced knowledge is required to be able to solve problems, otherwise, you need to hire support.
The Check Point support language is only in English. It creates problems for companies in Latin America that may not speak English as a first language.
For how long have I used the solution?
We have used these devices for quite some time with this functionality on-premise to guarantee security in the network and services.
Which solution did I use previously and why did I switch?
Previously we did not use a DDoS tool.
Which other solutions did I evaluate?
It is extremely important to always evaluate the options on the market before purchasing, in addition to verifying if they are the same and ensuring that everything the client needs is required.
Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2023-03-02T00:00:00-05:00