Compare CenturyLink DDoS Mitigation vs. Radware DefensePro

Cancel
You must select at least 2 products to compare!
Kentik Logo
1,949 views|1,075 comparisons
CenturyLink DDoS Mitigation Logo
497 views|306 comparisons
Radware DefensePro Logo
4,127 views|2,935 comparisons
Most Helpful Review
Use CenturyLink DDoS Mitigation? Share your opinion.
Find out what your peers are saying about NETSCOUT, Cloudflare, Imperva and others in DDoS. Updated: October 2020.
443,152 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"We have an annual contract with Kentik that we renew each year for a set number of licenses. We also have some burstable licenses which we can spin up and spin down, and those are paid as they are used."

More Kentik Pricing and Cost Advice »

Information Not Available
"It is sort of middle-of-the-road for this type of solution.""The Radware DefensePro was bundled together with our security platform.""The pricing is based on the amount of network traffic and the number of packets being inspected."

More Radware DefensePro Pricing and Cost Advice »

report
Use our free recommendation engine to learn which DDoS solutions are best for your needs.
443,152 professionals have used our research since 2012.
Questions from the Community
Top Answer: One of the valuable features is the intuitive nature of building out reports, and then triggering actions based on… more »
Top Answer: Without speaking directly about numbers, it's about the cost of a cross-connect, per device per month. Of course, some… more »
Top Answer: I believe they're already working on this, but I would love for them to create better integrations from network flow… more »
Ask a question

Earn 20 points

Top Answer: Arbor has the end to end solution for DDoS protection, while Radware needs to work with their 3rd party partners.
Top Answer: The reporting is very good and provides us with a comprehensive description of where attacks are emanating from.
Top Answer: The pricing is based on the amount of network traffic and the number of packets being inspected.
Popular Comparisons
Compared 22% of the time.
Compared 19% of the time.
Compared 9% of the time.
Compared 7% of the time.
Compared 7% of the time.
Compared 52% of the time.
Compared 10% of the time.
Also Known As
Black Lotus"Radware Defense Pro"
Learn
Kentik
CenturyLink
Radware
Overview

Kentik's AIOps Network Traffic Intelligence platform unifies network operations, performance, security, and business intelligence. 

With a purpose-built big data engine delivered as public or private SaaS, Kentik captures a high-resolution view of actual network traffic data and enriches it with critical application and business data, so every network event or analysis can be tied to revenue & costs, customer & user experience, performance & risk.

Today’s Distributed Denial of Service (DDoS) attacks are growing in size, frequency and complexity. No enterprise is immune to these threats. Application availability, website uptime and infrastructure accessibility are all critical for business continuity. Every minute of downtime can result in lost productivity and revenue. Scrubbing center mitigation techniques alone are not designed to manage today’s massive, highly sophisticated and distributed attacks. To defend against a variety of attack types, it’s essential to deploy a multi-layered security approach backed by extensive threat research. CenturyLink provides layers of defense through enhanced network routing, rate limiting and filtering that can be paired with advanced network-based detection and mitigation scrubbing center solutions. Our mitigation approach is informed by threat intelligence derived from visibility across our global infrastructure and data correlation. Tailored for any business and IT/security budget, our flexible managed service can proactively detect and mitigate the threats of today to help ensure business-as-usual for employees, partners and customers.

DefensePro is a real-time, perimeter attack mitigation device that secures organizations against emerging network and applications threats.

Part of Radware’s attack mitigation solution, DefensePro protects the infrastructure against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information theft and other types of attacks.

Offer
Learn more about Kentik
Learn more about CenturyLink DDoS Mitigation
Learn more about Radware DefensePro
Sample Customers
Pandora, Yelp, Neustar, Box, University of Washington, Zoom, Tata, and Cogent.  TMG Health, MetalForming Inc., Atlantic 10 Conference, Spil Games, Tickets.comSingleHop
Top Industries
REVIEWERS
Comms Service Provider43%
University14%
Computer Software Company14%
Music Company14%
VISITORS READING REVIEWS
Comms Service Provider31%
Computer Software Company21%
Manufacturing Company6%
Financial Services Firm6%
No Data Available
VISITORS READING REVIEWS
Comms Service Provider32%
Computer Software Company29%
Financial Services Firm9%
Manufacturing Company7%
Company Size
REVIEWERS
Small Business9%
Midsize Enterprise18%
Large Enterprise73%
No Data Available
REVIEWERS
Small Business70%
Large Enterprise30%
Find out what your peers are saying about NETSCOUT, Cloudflare, Imperva and others in DDoS. Updated: October 2020.
443,152 professionals have used our research since 2012.
CenturyLink DDoS Mitigation is ranked 22nd in DDoS while Radware DefensePro is ranked 9th in DDoS with 6 reviews. CenturyLink DDoS Mitigation is rated 0.0, while Radware DefensePro is rated 8.6. On the other hand, the top reviewer of Radware DefensePro writes "Verbose and descriptive reporting, reliable, and it is easy to scale". CenturyLink DDoS Mitigation is most compared with Arbor DDoS, Cloudflare, Akamai Prolexic Routed, Akamai Kona Site Defender and Neustar UltraDDoS, whereas Radware DefensePro is most compared with Arbor DDoS, Cloudflare, Imperva Incapsula and Fortinet FortiDDoS.

See our list of best DDoS vendors.

We monitor all DDoS reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.