Neustar UltraDDoS Overview

What is Neustar UltraDDoS?

Distributed denial of service (DDoS) attacks are growing in size, complexity, and malice. Neustar offers flexible solutions so you can stay connected, reduce the threat of theft, and protect your bottom line:

  • Cloud-Based DDoS Protection: Neustar SiteProtect cloud is the optimal choice for attacks too big for on-premises hardware to manage. Rely on our massive global network and scrubbing capacity to defend your Internet presence.
  • Hybrid DDoS Protection: Get the best of both worlds: on-premises hardware to stop smaller attacks instantly, plus the Neustar SiteProtect cloud when attack volume and complexity explode. We offer the largest and most effective hybrid platform solution.
  • On-Premises DDoS Protection: On-premises Arbor Networks hardware, fully managed by the NSOC, monitors your appliance and mitigates attacks 24/7.
  • Contingency/Failover Service: Gain backup or parallel processing capacity to stop large attacks faster. For SaaS providers, large financial organizations, and carriers especially, it’s a cost-effective way to uphold service quality.

Neustar UltraDDoS is also known as Neustar UltraDDoS, UltraDDoS.

Buyer's Guide

Download the DDoS Buyer's Guide including reviews and more. Updated: June 2021

Neustar UltraDDoS Customers


Neustar UltraDDoS Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Manager Strategic Planning at Endurance International Group
Real User
Identifies a request that comes up multiple times, block holds that particular IP, and lets the genuine traffic pass through

What is our primary use case?

Our company has a lot of hosting service and DDoS analytics service. If somebody downloads DDoS on a shared service all of our customers can have an adverse attack. We use mitigation services from Neustar which helps us mitigate this service so that if there is any request that is coming up multiple times, Neustar protection identifies it, block holds that particular IP, and lets the genuine traffic pass through.

Pros and Cons

  • "In the DDoS it's difficult to validate what is a genuine request from an end user. We've started being able to do that with the logistics that they have set up. With the protection that they have provided, they are able to identify what is valid and what is not valid. We see that a person who is getting DDoS Neustar service is able to block that particular user. However, while they are doing that it doesn't affect other customers on the server."
  • "I would like to see a dashboard that shows you the data that is transferred from which end. It's where people start looking at abuse management. People keep questioning when the mitigation is on what service it is and how many GBs are passing through. An end user dashboard that will help you identify all of these questions and that can be visible in your entire organization is something that would make sense."

What other advice do I have?

Always go with a player who is known in the market from a scalability standpoint. At times when you are dealing with mitigation, you could hit traffic that is in the trillions. You need to have an infrastructure that supports that. Go with a good, known player who has great infrastructure backing. I would rate this solution an eight out of ten because there is a scope of improvement from a mitigation standpoint.