Advice From The Community

Read answers to top DDoS questions. 431,790 professionals have gotten help from our community of experts.
Lamine Boulahlib
I have around ten years of experience working as a technical manager for a Telecom company with more than 10,000+ employees.  We are currently researching DDoS protection solutions. Which is the best DDoS protection solution for a big ISP with more than 1.5 terabytes for monitoring and mitigating?  Thanks! I appreciate the help.
author avatarTabbrez Balbbale
Real User

Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.

author avatarreviewer1008744 (Technical Solutions Architect II - Application Modernization and Security at a tech services company with 5,001-10,000 employees)
Real User

What type of DDoS protection are you looking for? There are many types of attacks, which vary from volumetric (L3/L4), protocol attacks, and application-layer attacks.

There are also in-band solutions, out-of-band solutions, and hybrid solutions.

I would be happy to discuss in more detail, but I can't suggest a specific vendor/solution without knowing more about the specific customer needs.

author avatarDarryl Theron
User

I would recommend A10 Networks due that it delivers high performance in a small form factor to reduce OPEX with significantly lower power usage, rack space, and cooling requirements compared to other vendors.

I am a gold partner for A10 Networks. Should you have any queries please do not hesitate to contact me on d.theron@tracenetops.net.

author avatarRasman
Real User

Cloudflare. We are moving from Akamai prolexic to Cloudflare. Cloudflare anycast network outperforms Akamai static GRE tunnels. We have decreased site load times on Mobile 3G from 8 to 1,6 seconds by moving to Cloudflare and don't have to care about tuning our own WAF and DDOS protection.

author avatarOLUWASEGUN ADERIBIGBE
Reseller

My recommendation is Imperva.

author avatarAmmar Anis
User

I believe you should look at F5 DDOS solution. Check the URL below
https://www.f5.com/solutions/application-security/ddos-protection##

See more DDoS questions »

What is DDoS?

DDoS solutions are an ever-evolving and highly specialized area of network protection, now a necessity for large organizations to provide 24/7 essential, unmitigated protection. The top DDoS Protection solutions mitigate the threat of a Distributed Denial of Service attack (DDoS). DDoS refers to illegally targeting computer resources to cripple user accessibility and/or completely shut down a computer or computer system. In a DDoS attack, the malicious actor typically hijacks multiple computing resources and sets them to send so many service requests to the target device or network that it cannot sustain the volume and shuts down.

Targets and motives can be varied. The best DDoS solutions are usually intended to permanently take down a website, cause sufficient downtime or disable a service. The perpetrators or Bad Actors can be lone wolf hackers, terrorist organizations, and criminals with various motivations or even business competitors.

IT and DevOps experts know that in order to fight DDoS attacks, special systems and training are essential to keep their systems safe. A large organization will utilize high-capacity, secure and stable Internet channels, specialized software solutions and the most recent technology and hardware.

Well-informed IT and InfoSec specialists require the best integrative technical support to engage and align the services of network security companies, which concentrate on the development and distribution of round-the-clock DDoS Protection. The key, of course, is proactivity. This requires a financial investment, sometimes a substantial one to protect information, assets, and personnel. Global security services often cite what could have been a relatively reasonable financial investment in DDoS Protection before millions had to be spent trying to restore and save sometimes irretrievable or compromised data in a system takedown.

In order to react to critical alarms and attempted system break-ins with actionable solutions, an IT Department must have instant information, pre-arranged permissions and communications across all platforms. IT must be supported by the most updated resources on a daily basis, in spite of organizational boundaries and silos that may impede communications between areas that would crash and fall like dominos without full, internal cooperation. DDoS Protection providers have core competencies and protecting both mobile and web platforms are non-negotiable. Revenue streams, critical data, personal information and essential connections to the “outside world” can all be eliminated or abused without DDoS solutions.

Find out what your peers are saying about NETSCOUT, Cloudflare, Kentik and others in DDoS. Updated: August 2020.
431,790 professionals have used our research since 2012.