DDoS Features

Read what people say are the most valuable features of the solutions they use.
reviewer1202292 says in a Kentik review
Principal Engineer at a software R&D company with 501-1,000 employees
Having the access to the flow. It gives me the ultimate exit type of stuff, which I wouldn't get in a basic flow-analysis engine. Also, I am able to do a lot of work on the visualization end to create different visualizations and different ways to get information out of it. The real-time visibility across our network infrastructure is good. The drill-down into detailed views of network activity helps to quickly pinpoint locations and causes. All the information is there. As an organization, we're still trying to figure out the best way to use it across all different skill levels. I worked with some of the sales developers to get a sales view. I'm working with the NOC to get a NOC view, because it is a very information-dense product. Someone who doesn't know what they're doing will easily get lost in it. But it does light up dashboards and views for people who aren't as skilled with it, to answer questions easily. View full review »
Алексей Юдин says in a CDN77 review
Коммерческий директор at a tech vendor
* Purge pages: It is a fast solution for updating my content from all datacenters. * Support HTTPS protocol * Details report View full review »
Sanaz Afshar says in an Imperva Incapsula review
System Administrator at a tech services company with 51-200 employees
* I like to see the security. On the site security, I can see which countries have incidents, whether it was a robot attack, a real human user, or non-human user. For this feature, I like it because I can see information quickly without going into long logs and details. It is very comprehensive regarding what is going on behind the scenes on the website traffic. * The option saying activity launch. On the activity log, I can see the exact details, the visit, and the threat. If I click on the details, it shows me exactly where it came from, who the user agent is, and what page they tried to enter. Then, it gives me the session. Also, I have the option to put them on the blacklist or the white list. Therefore, I like this option because it is more detailed. If someone causes more than one of the incidents, then they are maybe suspicious, and we want to learn more about it. Here we can get the data, and under the data, we can see the IP addresses, therefore tracking and copying that IP address and putting it under IP lookup. * The dashboard is good and user-friendly. You can easily understand it, even if you don't have any prior knowledge. Looking at it, you can easily see what is happening because it is a very user-friendly menu and user interface. I don't come from this exact background, but it seems I am supposed to manage and work with this stuff. Because of the user interface, I can understand even without having prior knowledge or education of it. * The real-time option is cool as well. On the real time, you can see live traffic, which is flowing into our website. View full review »
YacovHabusha says in a Reblaze review
Network and Security Department Manager at a non-tech company with 501-1,000 employees
The most valuable features were the real-time monitoring and the management. With this kind of product, you need a very good management system to allow you to see false positives in real-time; to see what's happening in real-time. If you have a block, you need to understand what is being blocked and why. You need a very good management system to support that. The clarity stood out. It was very visible and very easy to navigate; very easy to find the data we were looking for. View full review »
SnirDaan says in a Reblaze review
CTO at Eloan
Reblaze knows how to manage security. For me as, someone who knows little about security, it's good that I have a firm that optimizes everything according to their standards. It's their responsibility and they are fully hands-on. They know what they're doing so, if there's a risk of something, they report it to me. They tell me, for example, "Listen, we have an IP that has been trying to contact you too many times. Do you know this IP or do you want to close it?" They take care of everything. They provide a one-person contact who can help you manage your service better and the traffic that goes in and goes out. View full review »
reviewer1034934 says in a Radware DefensePro review
Product Manager at a comms service provider with 10,001+ employees
All of our traffic has to pass through the appliance, so we can very quickly mitigate the attack. This is a very valuable feature. On top of that, it's not only volumetric attack protection that the solution offers, but also layer 7 attack protection as well. Another valuable aspect is that DefensePro can work together with Alteon and AppWall as one big platform. We can offer one holistic web application firewall, which covers aspects such as layer 7 protection, volumetric protection, and the web application firewall. The integration potential of the solution is great. The solution is very user-friendly. View full review »
reviewer1181427 says in a FortiDDoS review
IT Network Engineer at a tech services company with 11-50 employees
Some of this solution's policies are good for security reasons, like the firewall and all the inundation when you configure the firewall. Then you have to purchase and apply the security of FortiDDos. I also like its ease of use and the technical support. I find the interface easy to use because I'm the Linux expert in our company. View full review »
reviewer1195920 says in a Kentik review
Manager, Automation Tools at a tech services company with 1,001-5,000 employees
The queries, in general, are great, being able to add tagging to the flows. Having the API access allows us to do a great deal of automation around a lot of our reporting and management tools. I'm the manager of automation at our company, so for me, that's the big winner. We're using the dashboard, but that's not as high-priority a use case for us. We're also using Kentik to ingest metrics. It's a useful feature, and its response time, whenever we're pulling back the data, is higher than our on-prem solution. That's one of the points in its favor. View full review »
reviewer1194984 says in a Kentik review
Director, Backbone Engineering at a software R&D company with 10,001+ employees
The analytics part is really important for me. I have seen some things pop up periodically that I did not expect, so it is important for me to dig into them. The ability for me to look at the traffic and see where it's going to is extremely important. I really love the Data Explorer. I use it all the time to go in and craft exactly what I need to see. I'm able to then take that story and explain it to the executives. I've done that a couple of times and it is helpful. And I'm really liking the alerting. It's super-helpful. In terms of the solution’s real-time visibility across our network infrastructure, I have not been able to find any other monitoring or netflow visualization tool that gives me the kind of information I get from Kentik. If I need to take a deep-dive into something that I see, it's really easy for me to do that. Whereas with most other things, I have to use five or six other tools to get that kind of data, with Kentik, I have it all in one place. Data visualization is extremely important. View full review »
Todd DeWitt says in an A10 Thunder TPS review
Director of IT Networks at a comms service provider with 201-500 employees
All it does is mitigation. It mitigates and scrubs bad traffic. We send the bad traffic to it, it determines the good traffic and allows the good traffic to come through. That's the only feature we use on it, the DDoS mitigation. Given its 1RU form factor, the performance has been excellent for us so far. What they said was that it is about 38.5 Gig of throughput. We've not really hit that yet, we haven't tested the extremes, but so far it's doing well and we haven't had any performance issues. The response time to an attack is instant. We've used some outsourced solutions in the past, out in the cloud, that weren't so quick. But it's all within our control now. We control how fast it mitigates. View full review »
Tim Paulson says in an A10 Thunder TPS review
Ethernet IP Engineer at a comms service provider with 11-50 employees
We're just using a portion of it, the mitigation aspect. View full review »
SocManag35a5 says in an A10 Thunder TPS review
SOC Manager at a media company with 1,001-5,000 employees
The most valuable feature is the DDoS mitigation availability, the ability to be able to block different types of attacks, and large attacks. That's the main function of the device that we use today. They're able to block attacks that we see against us, to prevent attacks as we see them, to prevent further outage to the environment. Also, based on previous equipment that we had, it's amazing that this device can do what it can do in a 1U form factor. The devices that we have right now have never gone over capacity and we've actually mitigated some pretty large attacks with these devices. The solution's response time to an attack is pretty good. Normally, it's a matter of milliseconds and most of the time, within one minute, we have a response and we have mitigation in place. That limits the impact to our environment when we do have an attack. We use the solution's programmable automated defense using RESTful API quite a lot. We don't use it for configuring the device, but we do use it for things such as grabbing stats and data as well as doing automated blacklisting of IPs and using class lists within devices. It works fairly well. For the most part, we only use the RESTful API for certain tasks. A10's aGalaxy uses API to configure the devices as well and we rely on that for all basic configuration such as IP addresses and port configuration. View full review »
Joakim Sörqvist says in an Imperva Incapsula review
Senior Systems Engineer - Channel Manager at Exclusive GRP
They're quite easy to install and quite easy to set up. Clients really like that. Especially when you're dealing with the cloud, it's really easy. It also has the ability to integrate with other firewalls. That's really important today. Most end-users are looking for something that can integrate with other solutions and with APIs. They're looking for solutions that have an open API. View full review »
AjayJawla says in an Imperva Incapsula review
Technical Sales Director at Revere Technologies
The most valuable features for our organization are auditing capabilities and compliances. The product meets the needs of our business model and we can see the health of the architecture at a glance. There are some instances where a client needs to meet with compliances in their industry, and this product is capable of meeting those needs. View full review »
Oluwatosin Omojola says in a F5 Advanced Firewall Manager review
Systems Engineer at Datasure Solutions
I would have to say that F5 excels in all aspects of network protection. There are five modules and I have yet to use them all. I use the LTM that's Local Traffic Manager, then I've worked with APM or Access Policy Manager, and I've worked with AFM which is Advanced Firewall Manager. If I were a CPO of an organization, I would just get F5 in my infrastructure to perform all the network security activities. I could just do that if I have the budget rather than bringing in separate solutions like Barracuda from one vendor and then bringing one other solution from another vendor. This is a unified solution that is already integrated and optimizes performance. F5 will do load balancing, security, act as the firewall and F5 excels in executing all of them. How it gets deployed depends on the customer and on what particular features the customers want. From a deployment perspective, F5 is excellent in all of them. View full review »
Directhost465 says in an Imperva Incapsula review
Director Of Hosting Services at a tech services company with 51-200 employees
I found that it is very easy to set everything up. I like the user-friendly interface. View full review »
Srinfosecr67 says in an Imperva Incapsula review
Sr Associate Information Security at a tech services company with 51-200 employees
The solution has good DDoS protection, and some good common features, such as no attack surfaces, parameter sanitization, and attack analytics. View full review »
Raphael Maunier says in an A10 Thunder TPS review
Co-Founder at Acorus Networks
We use all the features, but our customers have started asking for key features around SIP. We are also using some proxy features. The solution’s response time to an attack is fast. When it is configured in line, it is automatically done. When we have to stop the attack, it takes 10 to 15 seconds. We selected the solution because of its programmable automated defense using RESTful API. We didn't want to connect to the box. We wanted to be able to do some automation. We wanted to have our own portal because we wanted to connect our customers to our own UI using the A10 API. It has been good and exactly what we need. The TPS has reduced the amount of manual intervention required during an attack. When we have an attack, and we need to block some stuff everywhere, we just click on a button and push the rules. Then, it's deployed in Asia, Europe, and US. We don't have to do anything more. The aGalaxy is a control plane for the product. It controls the entire TPS so you don't have to connect to the box. You just have to connect to this control plane. View full review »
Ido Hacohen says in a Reblaze review
Co-Founder at HcscSec
We like the website protection. It's really good. The dashboard is really simple to use. View full review »
reviewer1057971 says in a Radware DefensePro review
Senior Engineer at a tech services company with 51-200 employees
The DDoS protection that the solution provides is its most valuable feature. View full review »
Abhay Chrungoo says in an Akamai Kona review
CTO at a tech services company with 10,001+ employees
It's a SaaS solution and so it's scalable outside of our infrastructure. That's the most valuable thing for us. View full review »
Oren Yeger says in a Reblaze review
Managing Director at cloudnow
The feature I find most valuable is the user-friendly dashboard. It is easy to understand how everything works and it allows you to make decisions quickly and efficiently. The second thing I like is their agile ability to custom change my needs. Every time we needed them to make some modifications according to our needs, they were very supportive and they know how to provide us with the relevant support. So for them, it is not just plug-and-play, they offer great support. The solution enabled me to evolve in my cloud secure architecture and to know the roles of what needed to be done, using Reblaze. I could implement it very easily. View full review »
Bart van der Sloot says in an A10 Thunder TPS review
Managing Director Leaseweb Network at Leaseweb
The primary benefit that we see from their systems is that their filtering technology has the ability to detect and drop the malicious traffic from the legitimate traffic with a high success rate. That, in combination with the very small effort needed to manage their systems, are the two most important benefits to us. On the one hand, it's the quality of scrubbing, and on the other hand, it's the low total cost of operations for us to keep these systems alive and working efficiently. The quality of the scrubbing is, of course, what the system is supposed to do. It's the key functionality of the system. That's what we bought the equipment for. And the small effort to manage the systems and keep them alive, of course, immediately translates into a benefit that we have a low cost of managing those systems. That means we can allocate the time of our network engineers to other activities. If you look at the total response time that we see in our solution, which means the time between the start of an attack and the time that the scrubbing really starts, we typically see two to three minutes. But the majority of that time is actually used by our detection technology, not so much the A10 network scrubbing technology. And then it takes a bit of time to reroute the traffic to the A10 equipment. Once it has been rerouted, the scrubbing starts very fast, so the start of the scrubbing is only a small part of the two to three minutes. In general, we're very happy with the response times and the scrubbing quality of the A10 equipment. View full review »
IT Service Delivery Manager at Consys.it
The most valuable feature is that you can implement it in a positive or negative model. Most customers implement the protection with a negative model because implementing with a positive model is not simple. We need help from the development team. View full review »
Computer & Network Security Professional at a financial services firm with 10,001+ employees
I find the signature base is very helpful to see traffic, to see the increase in web traffic. View full review »
Sign Up with Email