We changed our name from IT Central Station: Here's why

Check Point DDoS Protector vs Fortinet FortiDDoS comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about Check Point DDoS Protector vs. Fortinet FortiDDoS and other solutions. Updated: January 2022.
564,643 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The is a really low level of the false-positive alerts (when the clean traffic is marked as DDoS) due to some advanced techniques used by Check Point under the hood.""This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform."

More Check Point DDoS Protector Pros →

"The solution is very user-friendly and very easy to use.""The solution already has security profiles and it can protect from DDoS attacks and other kinds of attacks."

More Fortinet FortiDDoS Pros →

Cons
"For a long time, there was no software version of R80.10 available for the Check Point DDoS Protector software appliances, and we had to stay on the quite outdated R77.30 version.""It does not provide the capability to upload data for blacklisting/whitelisting in bulk."

More Check Point DDoS Protector Cons →

"The web interface could be much better.""There aren't really any aspects of the solution we are unhappy with. It's been a positive experience overall."

More Fortinet FortiDDoS Cons →

Pricing and Cost Advice
  • "The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled."
  • More Check Point DDoS Protector Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Distributed Denial of Service (DDOS) Protection solutions are best for your needs.
    564,643 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    This product uses auto-learning and behavioral analysis to establish baselines for legitimate traffic, and automatically detects and blocks traffic behavior that does not conform.
    Top Answer: 
    The appliance comes with a loaded hardware license, and additional options such as SSL can be purchased and enabled.
    Top Answer: 
    It does not provide the capability to upload data for blacklisting/whitelisting in bulk. Rather, in cases where many IP addresses need to be blacklisted or whitelisted, either a single IP address has… more »
    Top Answer: 
    The solution is very user-friendly and very easy to use.
    Top Answer: 
    The cost of the solution is quite reasonable. It's not overly expensive.
    Top Answer: 
    There aren't really any aspects of the solution we are unhappy with. It's been a positive experience overall. I can't recall any features that are lacking.
    Ranking
    Views
    411
    Comparisons
    274
    Reviews
    2
    Average Words per Review
    789
    Rating
    7.5
    Views
    2,109
    Comparisons
    1,667
    Reviews
    1
    Average Words per Review
    461
    Rating
    7.0
    Comparisons
    Also Known As
    Fortinet DDoS, FortiDDos
    Learn More
    Overview

    Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage
    Learn more about Ddos Protector.


    Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

    Offer
    Learn more about Check Point DDoS Protector
    Learn more about Fortinet FortiDDoS
    Sample Customers
    Boston Properties
    Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company36%
    Comms Service Provider26%
    Financial Services Firm5%
    Manufacturing Company4%
    VISITORS READING REVIEWS
    Computer Software Company28%
    Comms Service Provider27%
    Financial Services Firm5%
    Government5%
    Company Size
    No Data Available
    REVIEWERS
    Small Business57%
    Large Enterprise43%
    Find out what your peers are saying about Check Point DDoS Protector vs. Fortinet FortiDDoS and other solutions. Updated: January 2022.
    564,643 professionals have used our research since 2012.

    Check Point DDoS Protector is ranked 11th in Distributed Denial of Service (DDOS) Protection with 2 reviews while Fortinet FortiDDoS is ranked 15th in Distributed Denial of Service (DDOS) Protection with 2 reviews. Check Point DDoS Protector is rated 7.6, while Fortinet FortiDDoS is rated 7.0. The top reviewer of Check Point DDoS Protector writes "Good support and effective against SSL attacks, but the dashboard is complicated". On the other hand, the top reviewer of Fortinet FortiDDoS writes "Stable, with good security but has very bad technical support". Check Point DDoS Protector is most compared with Radware DefensePro, Imperva Incapsula and Arbor DDoS, whereas Fortinet FortiDDoS is most compared with Arbor DDoS, VMware NSX, Radware DefensePro, Fortinet FortiWeb and Cisco Secure Workload. See our Check Point DDoS Protector vs. Fortinet FortiDDoS report.

    See our list of best Distributed Denial of Service (DDOS) Protection vendors.

    We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.