Compare Akamai Kona vs. Arbor DDoS

Akamai Kona is ranked 4th in DDoS with 2 reviews while Arbor DDoS is ranked 1st in DDoS with 15 reviews. Akamai Kona is rated 7.6, while Arbor DDoS is rated 8.4. The top reviewer of Akamai Kona writes "Enables us to move faster with new products because we have this layer of protection set up in our infrastructure". On the other hand, the top reviewer of Arbor DDoS writes "Our customers can check how many attacks they have faced and how many have been blocked". Akamai Kona is most compared with Shape Security, AWS WAF and Prolexic, whereas Arbor DDoS is most compared with Radware DefensePro, Cloudflare and FortiDDoS. See our Akamai Kona vs. Arbor DDoS report.
Cancel
You must select at least 2 products to compare!
Akamai Kona Logo
7,208 views|5,170 comparisons
Arbor DDoS Logo
10,694 views|6,773 comparisons
Most Helpful Review
Find out what your peers are saying about Akamai Kona vs. Arbor DDoS and other solutions. Updated: September 2019.
366,593 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
It enables us to move faster with new products because we have this layer of protection set up in our infrastructure.It is scalable for DDoS.

Read more »

We can reduce the bandwidth to minimize the attack level. If we see more than 2.5 GBs we drop it directly.In the GUI, the packet capture is a very good option, as is the option to block an IP address.It provides packet capture and we can block or whitelist whichever IPs we need to. Whatever traffic we want to block - and we get IPs from internal teams and from national teams - we block at the Arbor level only, because if it gets to the firewall then firewall bandwidth will be taken.Valuable features include simple and centralized management of user access and capabilities, as well as Web 2.0 interactive attack alerting, traffic visualization, and mitigation service control.Our customers are very happy when we provide them with the interface... They can check how many attacks they have faced and how many attacks have been blocked.There are a number of valuable features in this product, like Cloud Signaling and Threat Intelligence feeds.Arbor has a global ranking in reliability and credibility. They are very unique and can respond to a very wide scope of threats from their global deployment.It's just one dashboard with mitigation. You decide which mitigation you want and at what threshold to do this or that. Its operation is pretty simple. It's easy.

Read more »

Cons
The WAF features definitely have a lot of room for improvement. A lot of the WAF is really basic. For some products or some of our solutions, we need to run a second layer of more advanced WAF. If it had better layer seven protection then we would not need a second WAF.There are some issues with pushing configurations across a network. It still takes about 20 minutes and that means to retract it's another 20 minutes.

Read more »

If we want to see live traffic, we can see do so. But once an attack that lasts for five minutes is done, the data is no longer there. It would be an improvement if we could see recent traffic in the dashboard. We can check and download live traffic, but a past attack, with all the details, such as why it happened and how to mitigate and prevent such future attacks, would be helpful to see.There is definitely room for improvement in third-party intelligence and integrations.On the main page there are alerts that we are unable to clear, even though the issue has been resolved.The following areas need improvement: opening and tracking support tickets, online support resources, software upgrades/updates and replacement media, and event management guidelines.Because we had some routers that were somewhat old, they were not integrated with Arbor. They did not support the NetFlow version that Arbor was running. That was a challenge. We had to upgrade the routers. Some backward-compatibility would be helpful.Sometimes it blocks legitimate traffic. If a legitimate user is trying to access the server continuously, the product suspects that this is a DoS traffic file. That is a case where it needs to improve. It needs machine-learning.I think the diversity of protection is extremely limited. It must be expanded in future upgrades and versions.For troubleshooting problems, it's not so intuitive. It's not straightforward. This is the core of their kernel, so they need to improve it a little bit... In F5 I have full control of everything.

Read more »

Pricing and Cost Advice
Information Not Available
Pricing is slightly on the higher side.I'm a technical guy. But I know it's expensive compared to its competitors. After you have the on-premise solution, for your solution to be effective you have to subscribe to an "upper level," so there's another cost. There is also a subscription to cloud services, which is another cost.Arbor's products are very expensive. Their competitors are cheap when compared with Arbor.As far as I know, they are the best in this sector, in DDoS protection. They know it, I know, because their service prices are too high. They provide cloud DDoS protection for ISPs, but that is also too expensive.Because the solutions from competitors are very different, it's not easy to compare. However, the licensing from Arbor is clear and understandable and the pricing is reasonable when looking at the market, in general.

Read more »

report
Use our free recommendation engine to learn which DDoS solutions are best for your needs.
366,593 professionals have used our research since 2012.
Ranking
4th
out of 28 in DDoS
Views
7,208
Comparisons
5,170
Reviews
2
Average Words per Review
416
Avg. Rating
7.5
1st
out of 28 in DDoS
Views
10,694
Comparisons
6,773
Reviews
13
Average Words per Review
601
Avg. Rating
8.3
Top Comparisons
Compared 18% of the time.
Compared 12% of the time.
Compared 11% of the time.
Compared 22% of the time.
Compared 13% of the time.
Compared 8% of the time.
Also Known As
Arbor Networks SP, Arbor Networks TMS, Arbor Cloud for ENT
Learn
Akamai
Arbor Networks
Overview
Akamai's Kona Site Defender extends security beyond the data center while maintaining site performance and availability in the face of fast-changing threats. It leverages the power of the Akamai Intelligent Platform to detect, identify and mitigate Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks before they ever reach the origin.Arbor Networks, the security division of NETSCOUT, is driven to protect the infrastructure and ecosystem of the internet. It is the principle upon which we were founded in 2000; and remains the common thread that runs through all that we do today. Arbor’s approach is rooted in the study of network traffic. Arbor’s suite of visibility, DDoS protection and advanced threat solutions provide customers with a micro view of their network enhanced by a macro view of global internet traffic and emerging threats through our ATLAS infrastructure. Sourced from more than 300 service provider customers, ATLAS delivers intelligence based on insight into approximately 1/3 of global internet traffic. Supported by Arbor’s Security Engineering & Response Team (ASERT), smart workflows and rich user context, Arbor’s network insights help customers see, understand and solve the most complex and consequential security challenges facing their organizations.
Offer
Learn more about Akamai Kona
Under Attack?

Learn More About Arbor DDoS

Sample Customers
AvidMobile, itBit
Information Not Available
Top Industries
VISITORS READING REVIEWS
Comms Service Provider19%
Financial Services Firm16%
Media Company11%
Manufacturing Company11%
REVIEWERS
Comms Service Provider86%
Financial Services Firm14%
VISITORS READING REVIEWS
Comms Service Provider33%
Software R&D Company17%
Retailer9%
University5%
Find out what your peers are saying about Akamai Kona vs. Arbor DDoS and other solutions. Updated: September 2019.
366,593 professionals have used our research since 2012.
We monitor all DDoS reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email