Coming October 25: PeerSpot Awards will be announced! Learn more

Top 8 Distributed Denial of Service (DDOS) Protection

Arbor DDoSImperva DDoSCloudflareRadware DefenseProAkamai Kona Site DefenderCheck Point DDoS ProtectorNexusguard DDoS ProtectionFastly
  1. leader badge
    The solution provides good protection against volumetric DDoS attacks. Arbor DDoS's best feature is that we can put the certificates in, and it will look at layer seven and the encrypted traffic and do the required signaling.
  2. leader badge
    The three-second service level agreement is already better than the competition.The setup of Imperva DDoS was easy.
  3. Buyer's Guide
    Distributed Denial of Service (DDOS) Protection
    September 2022
    Find out what your peers are saying about NETSCOUT, Imperva, Cloudflare and others in Distributed Denial of Service (DDOS) Protection. Updated: September 2022.
    635,987 professionals have used our research since 2012.
  4. From what I've seen so far, there are no negatives to report as of yetThere are key things that are used for our enterprise customers, such as Lambda and DNS.
  5. The initial setup is easy.Its functionality is very good.
  6. The most valuable feature is the custom rules feature. This is because many of our customers require a lot of custom rules. Because it's a very customized project for our customers, I think they have the best of everything already.
  7. This comprehensive tool validates and exploits complex vulnerabilities that other vendors fail to find and resolve to increase security.It uses several layers of security.
  8. report
    Use our free recommendation engine to learn which Distributed Denial of Service (DDOS) Protection solutions are best for your needs.
    635,987 professionals have used our research since 2012.
  9. Cloud Diversion is another good feature packaged with the whole solution. When attack traffic is detected, Cloud Diversion triggers to automatically route our prefix to Nexusguard’s scrubbing center, ensuring that all attack traffic is dropped in the shortest time possible.
  10. Fastly uses configuration versioning, where you can deploy a new version in less than one minute.

Advice From The Community

Read answers to top Distributed Denial of Service (DDOS) Protection questions. 635,987 professionals have gotten help from our community of experts.
Lamine Boulahlib - PeerSpot reviewer
Lamine Boulahlib
Technical Manager with 10,001+ employees
I have around ten years of experience working as a technical manager for a Telecom company with more than 10,000+ employees.  We are currently researching DDoS protection solutions. Which is the best DDoS protection solution for a big ISP with more than 1.5 terabytes for monitoring and mitigatin...
Read More »
Darryl Theron - PeerSpot reviewer
Darryl TheronI would recommend A10 Networks due that it delivers high performance in a small… more »
7 Answers
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)

What are the best solutions that protect from DDoS attacks? Why do you suggest this particular one?

Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)

Is it important to differentiate between them? In what cases?

Eric Rise - PeerSpot reviewer
Eric RiseNetanya, Good question. I hope to give you a very simplistic answer. A DoS… more »
4 Answers

Distributed Denial of Service (DDOS) Protection Articles

Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Apr 25 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features...
Read More »
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi community members, Here we go with a new Community Spotlight. We publish it to help YOU catch up on recent contributions by community members. Trending What open-source HCI solution do you recommend? How much time does SSO save? What are the main technical differences between Microso...
Read More »

Distributed Denial of Service (DDOS) Protection Topics

How does a DDoS attack work?

DDoS attacks are designed to overwhelm sites with traffic from hundreds or even thousands of sources, making it nearly impossible to stop them. To render an online resource unavailable, attackers will most commonly use a network of computers that are already infected with a virus (known as a botnet) to gain remote access. To launch an attack, hackers typically send a command to the control server through which the botnets are controlled, which then sends a signal to the bots to launch malicious network requests. The botnets work by harnessing the power of several machines to obscure the source of traffic. Because the traffic is distributed, it becomes harder for security teams or tools to detect the attack until it is well underway. The network of remotely controlled hacked computers are often referred to as “zombie computers” and work by sending overwhelming amounts of data that exceed and exhaust bandwidth capabilities.

Is DDoS a virus?

While DDoS is not a true virus, it uses malware (malicious software) to affect normal computer operations. Malware can come in the form of viruses, Trojans, spyware, and adware, and other types, and is used by hackers to gain unauthorized access to systems when carrying out DDoS attacks. A DDoS attack incorporates malicious programs in order to target the victim, making the virus more effective and destructive. Malware affects vulnerable devices by turning them into bots. Once the devices have been modified, a DDoS attack is launched as part of the botnet.

Why is a DDoS dangerous?

A DDoS attack is dangerous because it can cause major disruptions and become a threat to business continuity. These types of attacks affect mission-critical applications that organizations rely on, such as email, CRM systems, salesforce automations, and many other daily business operations. DDoS attacks can force companies to spend fortunes on repairs, can affect consumer trust, can lead to lost revenue, and can damage an organization’s reputation. When applications become unavailable or a public-facing website is down, productivity suffers. Unfortunately, one DDoS attack means that more attacks are likely expected to continue until more robust defense solutions are deployed.

Benefits of DDoS Protection

Below is a list of benefits of how an effective DDoS protection solution can help protect your organization from attacks:

  • Prevents malicious traffic from reaching its target
  • Decreases business risk and minimizes downtime
  • Reduces costs related to web security
  • Enforces security rules which are constantly updated to defend against new and existing threats
  • Saves money because it is effective, reliable, predictable, and steady
  • Curbs operational costs by eliminating the need to hire IT staff, purchase more bandwidth capacity, or outsource protection to a third-party scrubbing center.
  • Protects your organization from loss of revenue
  • Secures your brand, making sure your reputation doesn’t become compromised
Features of DDoS Protection

While DDoS attacks are very challenging to stop, there are steps you can take to limit your exposure and defend against them. Here are some features to look for when researching DDoS protection options:

  • Name server protection: A solid DDoS protection solution will protect against DDoS techniques that aim to disrupt or crash a DNS name server.
  • Application protection: When reviewing your options, look for a DDoS protection tool that protects common applications such as CRM, FTP, ERP, and email.
  • Individual IP protection: Initially, DDoS protection methods would only be able to protect entire IP ranges. It is best to look for one that can offer protection for individual IPs, to allow you to register a public IP or domain name as well as to add the DDoS service to your existing DNS configuration.
  • Network capacity: This is an important feature, as it determines the overall scalability available to you during an attack. Consider bandwidth availability and which scalable deployment model you will use (either cloud-based or on-premises).
  • Pricing: Another key factor to consider is the pricing model. Opt for one that is the most suitable for your company, whether it is pay-as-you-go pricing, pricing based on the volume of attacks, service-based pricing, or flat monthly fee pricing.
  • Support: Make sure support is offered - even if your DDoS protection solution is fully automated.
Buyer's Guide
Distributed Denial of Service (DDOS) Protection
September 2022
Find out what your peers are saying about NETSCOUT, Imperva, Cloudflare and others in Distributed Denial of Service (DDOS) Protection. Updated: September 2022.
635,987 professionals have used our research since 2012.