Arbor DDoS Pros and Cons

Arbor DDoS Pros

Roman Lara
Sr. Security Engineer at Rackspace
We use it not only for DDoS detection and protection, but we also use it for traffic analysis and capacity planning as well. We've also been able to extend the use of it to other security measures within our company, the front-line defense, not only for DDoS, but for any kind of scanning malware that may be picked up. It's also used for outbound attacks, which has helped us mitigate those and lower our bandwidth costs...
View full review »
reviewer1335690
Network Security Architecture at a financial services firm with 501-1,000 employees
The auto-mitigation, that signaling feature, where it automatically raises an alarm that a line is under attack, is important. The upstream service provider will then do something to reduce the load on our internet lines. The fact that it's automated means I don't have to sit and always be looking at threats coming through. It does it almost automatically, without any intervention by me.
View full review »
Ashutosh
Technical Lead - DEVSECOPS with 1,001-5,000 employees
We can reduce the bandwidth to minimize the attack level. If we see more than 2.5 GBs we drop it directly.
View full review »
Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,301 professionals have used our research since 2012.
Steve Puluka
Network Architect at DQE Communications
Using standard BGP, NetFlow and SNMP ensure wide compatibility. There are also peering traffic reports that can help identify upstream peering opportunities. The ATLAS aggregation service allows us to contribute to the global DDoS data and benefit from overall trends.
View full review »
Informat7f04
Information Security Analyst at a financial services firm with 1,001-5,000 employees
In the GUI, the packet capture is a very good option, as is the option to block an IP address.
View full review »

Arbor DDoS Cons

Roman Lara
Sr. Security Engineer at Rackspace
I would also like more visibility into their bad actor feeds, their fingerprint feeds. We try to be good stewards of the internet, so if there are attacks, or bad actors within our networks, if there were an easier way for us to find them, we could stop them from doing their malicious activity, and at the same time save money.
View full review »
Ashutosh
Technical Lead - DEVSECOPS with 1,001-5,000 employees
If we want to see live traffic, we can see do so. But once an attack that lasts for five minutes is done, the data is no longer there. It would be an improvement if we could see recent traffic in the dashboard. We can check and download live traffic, but a past attack, with all the details, such as why it happened and how to mitigate and prevent such future attacks, would be helpful to see.
View full review »
Steve Puluka
Network Architect at DQE Communications
The upgrade process is mildly complex requiring treatment of the custom embedded OS separately from the application. The correlation of the underling OS to the application version can be easily missed.
View full review »
Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,301 professionals have used our research since 2012.
Informat7f04
Information Security Analyst at a financial services firm with 1,001-5,000 employees
There is definitely room for improvement in third-party intelligence and integrations.
View full review »
Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: January 2021.
455,301 professionals have used our research since 2012.