We observed traffic over six months to create a benchmark. We created alerts to trigger and be sent to our SOC once the traffic exceeds the benchmark.
Information Security Analyst at a financial services firm with 1,001-5,000 employees
The introduction of IP-intelligence helps in determining IPs with a bad reputation
Pros and Cons
- "In the GUI, the packet capture is a very good option, as is the option to block an IP address."
- "There is definitely room for improvement in third-party intelligence and integrations."
What is our primary use case?
How has it helped my organization?
The introduction of IP-intelligence helps in determining IPs with a bad reputation. We recently upgraded to the latest version and that functionality is enabled now. They've come up with centralized intelligence based on their own cloud, and they feed the data, the intelligence.
What is most valuable?
In the GUI, the packet capture is a very good option, as is the option to block an IP address. These help in analyzing traffic and blocking unwanted IP addresses as a preliminary troubleshooting step.
Also, they have a customer program where, if we find a blacklisted or bad-reputation IP, we can submit it to Arbor directly.
What needs improvement?
There is definitely room for improvement in third-party intelligence and integrations. I would like to see more threat intelligence and internal traffic monitoring for C & C communications.
Buyer's Guide
Arbor DDoS
June 2025

Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is very stable.
What do I think about the scalability of the solution?
We have not faced any scalability issues since we have a very confined environment.
How are customer service and support?
Tech support is good. They have really good expertise from the appliance point of view.
Which solution did I use previously and why did I switch?
We did not have a previous solution.
How was the initial setup?
Although I was not involved in the initial setup, I understand that it is easy. In terms of the specifics of our implementation, it's sensitive information so it can not be made public. Because of the criticality, I cannot comment on configuration or how is it implemented.
Regarding the simple setup, it is because of the out-of-the-box configurations which Arbor provides you with. I don't think there is another way to implement it as such. It was per Arbor's standards, so there was nothing that was done differently.
What's my experience with pricing, setup cost, and licensing?
Pricing is average.
What other advice do I have?
Go for the latest appliances.
We do have plans to increase our usage of this type of solution, but now there are a lot of other services coming up so we are looking in parallel at other stuff, for other functionalities and features from Arbor itself.
I rate Arbor DDoS at eight out of ten. They have done a considerable amount of development in the last few years when it comes to features. However, there is a restriction when the environment is hosted in the cloud and it is on-prem, so there a challenge there: The full-fledged features don't comply with certain requirements. There are always challenges.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Senior Project Engineer at a tech services company with 10,001+ employees
We're able to block traffic before it gets to the firewall, but alerts on the main page can't be cleared when resolved
Pros and Cons
- "It provides packet capture and we can block or whitelist whichever IPs we need to. Whatever traffic we want to block - and we get IPs from internal teams and from national teams - we block at the Arbor level only, because if it gets to the firewall then firewall bandwidth will be taken."
- "On the main page there are alerts that we are unable to clear, even though the issue has been resolved."
What is our primary use case?
We have captured a profile for every production group which has a server-type configuration. We also enable signaling. If there is a huge amount of traffic, it will indicate that to us. Accordingly, we will inform them to take action or whatever. We will determine whether it is legitimate or not based on the requirements.
There is a given bandwidth for any organization, an expected amount of traffic at a given point of time. If it sees more than the traffic which we are expecting at a given point of time, it could be an anomaly. We will then check internally whether a download or upload is happening, etc. Normally, if it sees a huge amount of traffic at the same time, then automated cloud signaling will be enabled and, automatically, the traffic will be dropped.
How has it helped my organization?
There are multiple malicious IPs which are present everywhere. So, wherever the traffic comes from, it comes directly to the internet firewall, which utilizes the firewall's bandwidth, latency, etc. We block such traffic directly at the Arbor level only.
Also, with network-level signatures, we can block things like malicious packets at the Arbor level only.
What is most valuable?
It's very user-friendly. Everything is done through a GUI. It doesn't take much time to learn how to use it. Once you see it a few times you understand it.
It provides packet capture and we can block or whitelist whichever IPs we need to. Whatever traffic we want to block - and we get IPs from internal teams and from national teams - we block at the Arbor level only, because if it gets to the firewall then firewall bandwidth will be taken.
With Arbor, every six or 12 months, we can do DDoS testing.
Also, there are HTTP connections. We can tell it there are multiple production categories which are present in a server-type configuration and we can use that.
In very rare situations we use it to capture traffic. If there is any malicious traffic we can capture the packet where we can see the HTTP request.
What needs improvement?
On the main page there are alerts that we are unable to clear, even though the issue has been resolved.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The stability is very good. We have never faced an issue with it.
What do I think about the scalability of the solution?
The scalability depends on the box but we have never had any issues with that.
How is customer service and technical support?
We use technical support when there is some issue with the box or traffic and we are unable to resolve it. Our interaction with them is good. They check the issues. It usually takes them one or two days to respond. They're knowledgeable and helpful.
The last issue we contacted them on was during implementation. We connected to one of two management ports but it was not working. They told us to change the management port and when we did everything was fine.
How was the initial setup?
I did the initial setup. It's not complex. We have a default admin and password where we need to set a management IP. Once management IP is set, if we connect it through a comm port, we need to set our system IP tools in the same subnet so that we can connect to Arbor. After that, we can set up usernames, passwords, and an IP access list. We can even change the group password.
If you have some knowledge, the implementation will only take between a half-hour and an hour. The only scenario where it takes time is when we put it into inline mode; when we mount the devices into the network.
One person is enough for deployment, if they have knowledge of how to implement it. There is no need for two or three. The number of people required to maintain it depends on the automation. One person is often enough.
What other advice do I have?
We have seven people who directly access Arbor DDoS, mostly project engineers.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Buyer's Guide
Arbor DDoS
June 2025

Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.
Engineer at railtel corporation of india
I like the IP location policy to control traffic based on geolocation.
What is our primary use case?
Mitigating network level volumetric attacks, complete network visibility and complete control on applying countermeasures.
What is most valuable?
- DDoS amplification
- Flow specs
- Blackhole mitigation, and
- IP location policy to control traffic based on geolocation.
What needs improvement?
Cloud signaling integration with third-party DDoS solution provider. Currently, it supports only its DDoS APS box.
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Advisor at a comms service provider with 10,001+ employees
Key features include Web 2.0 interactive attack alerting and traffic visualization
Pros and Cons
- "Valuable features include simple and centralized management of user access and capabilities, as well as Web 2.0 interactive attack alerting, traffic visualization, and mitigation service control."
- "The following areas need improvement: opening and tracking support tickets, online support resources, software upgrades/updates and replacement media, and event management guidelines."
What is our primary use case?
We use these products because of the increase in frequency and sophistication of Denial of Service and Distributed Denial of Service attacks. As a service provider, we need to control and mitigate these attacks.
What is most valuable?
Valuable features include:
- Simple and centralized management of user access and capabilities
- Viewing and/or configuring of status, history, account, user, AAA, DNS, and NTP settings
- Web 2.0 interactive attack alerting, traffic visualization, and mitigation service control
What needs improvement?
The following areas need improvement:
- Opening and tracking support tickets
- Online support resources
- Software upgrades/updates and replacement media
- Event management guidelines.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
The initial implementation phase was a bit tricky but after that, it worked like a charm.
What do I think about the scalability of the solution?
Provides increased performance, scalability, and availability for Peakflow SP-based managed services.
It enables 25 simultaneous users/API per non-leader device. It scales up to ten PI devices and a maximum of 125 simultaneous logins, deployment-wide.
How was the initial setup?
The setup follows a project plan based on a PIP (Performance Improvement Plan) document and the LLD. A process is created to cover site preparation, hardware staging, hardware installation, and link activation and needs the involvement of the Operations team. Deployment takes three to four months.
Our implementation strategy is as follows:
- Assign a project manager to be onsite when needed during the implementation until signoff
- Understand customer’s policies, requirements, and procedures
- Discuss and agree on the general prerequisites for the proposed solutions
- Conduct site survey
- Site preparation for the proposed solutions
- Design the proposed solutions
- Provide detailed project plan for the entire assignment
- Provide Low-Level Design
- Delivering the proposed SW and HW to the site
- Configure the solutions based on best practices
- Complete integration, fine-tuning, testing, and knowledge transfer to provide templates and guidance on use of templates to team members
- Finalize the deliverables along with the client
What about the implementation team?
We did include an SI for the deployment. Our experience with that team was excellent as they knew what they were doing.
What's my experience with pricing, setup cost, and licensing?
Pricing is slightly on the higher side.
What other advice do I have?
It's an excellent product DDoS protection against attacks.
We have more than 7,000 users at all levels of access.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Team Lead for DDoS Protection at a comms service provider with 10,001+ employees
Our customers can check how many attacks they have faced and how many have been blocked
Pros and Cons
- "Our customers are very happy when we provide them with the interface... They can check how many attacks they have faced and how many attacks have been blocked."
- "Because we had some routers that were somewhat old, they were not integrated with Arbor. They did not support the NetFlow version that Arbor was running. That was a challenge. We had to upgrade the routers. Some backward-compatibility would be helpful."
What is our primary use case?
We use it to protect websites, usually. But it's hosted in our network, our infrastructure, and the company websites as well. We are an ISP company and we provide internet services and other services to companies, like banks, etc. Part of our services is DDoS protection.
How has it helped my organization?
We are the ISP for government websites here in Saudi Arabia. We had a lot of attacks on those sites. The way we mitigated those attacks was by asking the people who are hosting the website about the features they were using for the websites. They specified two of the ports, and they said we're not going to allow any other port, any other service apart from these two services. We allowed the websites to be accessible through those two ports only. We blocked everything else. This was four years ago and everything has been smooth ever since.
We have a monitoring team here, which is on watch 24/7. The monitoring part is very easy with this solution.
What is most valuable?
Our customers are very happy when we provide them with the interface. We give them read-only privileges and they can review the results by themselves. They can check how many attacks they have faced and how many attacks have been blocked. That is a very valuable feature offered by Arbor DDoS.
We can also give them more privileges. They can do some tweaking according to their own systems. If they have a database running or if they have a website, they can tweak the features themselves.
What needs improvement?
Because we had some routers that were somewhat old, they were not integrated with Arbor. They did not support the NetFlow version that Arbor was running. That was a challenge. We had to upgrade the routers. Some backward-compatibility would be helpful.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
The deployment is okay, stable. But when you are manipulating the countermeasures, that is the difficult part. You have to be very careful, and you have to be sure that these countermeasures will kick in when needed, that they're going to work.
We have to customize the countermeasures for each customer. That is a real challenge. We should be reviewing them every month. They might be changing their services, they might be using different ports. We have to keep asking our customers, "Okay what are you running now? What are you using now? Which port are you running now?" so that we know what to expect. We need to know which traffic would be legit and which traffic is illegitimate so that we can block the illegitimate traffic without mistakes. We don't want to block the real traffic. There is a feature in Arbor called auto-learning. We can run that and it will help us. But at the end of the day, it's for us to decide what to allow.
You cannot rely on auto because, for example, if you're running auto-learning, and the services have been running on 80, and all of a sudden it switches to 443, it will keep on blocking. You have to expect what's coming. You cannot rely on auto. Human involvement is always necessary.
What do I think about the scalability of the solution?
If the network is expanding, of course, we would expect to need to add more equipment. We would need to expand our solution.
We had two customers from the government which came in, and they are super-important. Their services cannot go down. We had another solution from Arbor called Pravail. We had that installed for those two customers specifically. Their expected traffic is almost 8 MB, and their throughput is 12 MB. Any noise or malformed packets or out-of-sequence packets get filtered by the Pravail Solution. The bigger attacks will be handled by the TMS, the Threat Mitigation System.
Scalability is not a problem for Arbor.
How are customer service and technical support?
Technical support is really good. ATAC has been good with us. We haven't had any problem contacting them or getting them engaged in our activities. For example, sometimes we need to customize the portal banner. For that, they have been helpful.
Which solution did I use previously and why did I switch?
This is our first DDoS solution.
How was the initial setup?
The initial setup is kind of complex because it requires peering. We have to design it from scratch, which makes it a little bit complex. It depends on whether we want to get it inline or if we want to apply offloading, and whether the company can afford a TMS of its own or we need to send traffic to a remote TMS, hosted by Arbor itself.
The last deployment I was involved in took almost a month-and-a-half, with another 15 days for documentation.
It took about eight to 12 people to get the deployment operational. We had people from the core who were engaged with us for the integration and bringing up the systems. After that, we had to hire some fresh resources, because, honestly, it's a new product and it's not very common. We can't really find experienced people for DDoS.
It was not much of a challenge when we were developing it and when we were deploying it because we had a resident engineer who was planning everything, who was leading everything. But after that, when we were mitigating the attacks, there were challenges because we didn't have experienced people over here and the attacks were coming day and night, 24 /7. I had to come to the office after midnight and at midday.
But now, the system stable and the people that I'm managing are more experienced. They know stuff and it's pretty smooth now.
What about the implementation team?
We engaged Arbor itself. We had a resident engineer from Arbor who came here and deployed the system. He was here for a month more for support and for any types of issues that we faced.
What other advice do I have?
Go for it. It's one of the best solutions you can get for DDoS. It doesn't matter what services you're going to use. As long as you have the whole solution, the TMS and everything in-house, it's the best solution.
We have a team of 12 to deploy and monitor the solution; we have three shifts running around the clock. They monitor the system alerts. They monitor the websites using the controls that we have to protect the clients. If one of them catches an attack, there is a high-alert flag and we focus on the attack to see if it has been mitigated or not. If it needs anything, if it needs some tweaking, we have two resources on each watch, a senior resource and a junior. The junior one keeps on monitoring. The senior one comes in whenever there is something to correct or if something needs to be changed in the system.
For ISPs, Arbor DDoS would be the best solution. For smaller organizations, we can buy the services from Amazon for DDoS protection, and there's Cloudflare. But for ISPs, it's better to have Arbor DDoS because we have everything in-house. ISPs like ours have almost 120 gig bandwidth. For throughput, it's the best one.
We don't have plans to increase usage currently because when we brought the solution four years ago, we measured it a lot. We bought more than what we needed. The plan is to improve the human operability on the system itself. Things look smooth, but you cannot rely on two or three people. We have to have redundancy in the human workforce. We're planning to expand the team so that we don't need to hire any fresh resources and train them from the start. These services are very expensive and our customers are expecting a perfect solution.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
We're able to develop threshold values for clients' servers to help flag suspicious traffic
Pros and Cons
- "There are a number of valuable features in this product, like Cloud Signaling and Threat Intelligence feeds."
- "Sometimes it blocks legitimate traffic. If a legitimate user is trying to access the server continuously, the product suspects that this is a DoS traffic file. That is a case where it needs to improve. It needs machine-learning."
What is our primary use case?
Our primary use case is developing threshold values for all groups. We use it to analyze packets to build a use-case for when a server group hits the limit of incoming traffic. In such a case we suspect traffic.
We use it to build use-case scenarios, based on the server input and a client's requirements. Some clients have a number of users accessing a given server which affects the bandwidth. In each case, we need to tell DDoS what is considered legitimate traffic.
How has it helped my organization?
It prevents all unwanted or malicious traffic, using the Threat Intelligence feeds.
What is most valuable?
There are a number of valuable features in this product, like Cloud Signaling and Threat Intelligence feeds.
There are two modes in the product: The first is a learning mode and the other is a production mode. First, we learn the traffic using the learning mode. We use it to fine-tune what is suspicious data and what is legitimate traffic.
What needs improvement?
Sometimes it blocks legitimate traffic. If a legitimate user is trying to access the server continuously, the product suspects that this is a DoS traffic file. That is a case where it needs to improve. It needs machine-learning. Self-learning would be an improvement.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The stability of Arbor DDoS is good. It's not that complex as a product and stability is not an issue.
What do I think about the scalability of the solution?
The scalability is good. Configuration-wise, an administrator could create issues. But the product itself is good.
I have implemented it multiple times in industries like oil and gas, banking, and insurance.
How is customer service and technical support?
The response from Arbor's technical support is good. They respond within two days.
How was the initial setup?
The initial setup is straightforward. It's very simple. I have deployed the product for multiple clients. Implementation takes less than three to four hours, but the fine-tuning takes some time, based on the organization's needs. That can take more than a month.
Our implementation strategy is based on how many servers and groups there are and what kind of traffic is coming to/from the internet. These are the factors that affect how we deploy it. Deployment requires two to three consultants who are security architects. For maintenance, one administrator is fine.
What's my experience with pricing, setup cost, and licensing?
Licensing is based on features, I believe.
What other advice do I have?
Implementation is very easy but making the product work optimally is more difficult.
It's the best product. I would rate it at eight out of ten. There are some minor issues with blocking legitimate traffic and that's why it's not a ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Manager IP Services at a tech company with 10,001+ employees
Has a global ranking in reliability and credibility. They are very unique and can respond to a very wide scope of threats from their global deployment.
Pros and Cons
- "Arbor has a global ranking in reliability and credibility. They are very unique and can respond to a very wide scope of threats from their global deployment."
- "I think the diversity of protection is extremely limited. It must be expanded in future upgrades and versions."
What is our primary use case?
I was working in the ISP environment and the Arbor DDoS solution is integrated in there.
How has it helped my organization?
We have certain gaming server data centers having some big or small LAN protectors. All protectors have been added to Arbor for mitigation and protection and the IPs with frequent attacks are separately added for more focus monitoring. Usually when gaming users go online they experience this type of high volume attack. We pick those IPs and separately define an Arbor for mitigation and the whether those are positive.
What is most valuable?
Specifically in the ISP infrastructure where I was working, Arbor DDoS is integrated to detect the threats and mitigation. Basically, the peak flow TMS solution and peak flow SP solution has been procured by my company. We are providing services to customers and protecting our own infrastructure as well.
When you work in an ISP or enterprise environment, the main priority is to protect your services or your customers services, like bandwidth. There must be no high volume breach towards any customer, such as a DDoS attack or application level attack. The purpose of procuring a peak flow TMS solution is to mitigate the high volume attacks towards our customers and to protect our internal infrastructure as well. This is our priority in this aspect.
What needs improvement?
I think the diversity of protection is extremely limited. It must be expanded in future upgrades and versions. Plus, hardware stability is a big issue with Arbor. We have frequent outages with the hardware.
For how long have I used the solution?
One to three years.
What do I think about the scalability of the solution?
Arbor is good for expansions or forecasts, and helps us as well. Their pre-sales team is very dedicated and focused and they just nominate the POC, who then provides the capability, descriptions and presentations to us.
How are customer service and technical support?
They are helpful. Their response time is good.
Which solution did I use previously and why did I switch?
No, we were just manually blackholing at level three, an upper level. We were not using any specific DDoS solutions like Arbor.
How was the initial setup?
Initial setup is a bit complex because it is a Linux based working environment for configuration. A bit of expertise is required to configure the setup. It requires an expert level assistance from Arbor to complete the configuration or to apply any new system.
Deployment took around 3-4 months because we had two sites nationwide on which peak flow was deployed.
What about the implementation team?
Yes. They were just handling the physical connectivity, the mounting, placement and insertion of the cords. By law, integration is pushed by the Arbor expert.
What's my experience with pricing, setup cost, and licensing?
Licensing is good and they are very helpful to us. Without licensing you cannot get the complete features of the product, as well as the complete level of support, so licensing is obviously a good option.
Which other solutions did I evaluate?
Actually there is a different planning team which takes care of the projects, so I don't know if they were considering any other vendor or not, but right now Arbor is the first choice and we are working with it.
Arbor has a global ranking in reliability and credibility. They are very unique and can respond to a very wide scope of threats from their global deployment. So, Arbor is very helpful to have inside of the most recent attacks and their backgrounds.
What other advice do I have?
Arbor has a global ranking and global recognition. Whenever you do a search on Google, you can find Arbor on the top three or top five DDoS protection vendors. Obviously, Arbor is very reliable.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Consultant with 51-200 employees
Operating the solution is easy, it's just one dashboard with mitigation
Pros and Cons
- "It's just one dashboard with mitigation. You decide which mitigation you want and at what threshold to do this or that. Its operation is pretty simple. It's easy."
- "For troubleshooting problems, it's not so intuitive. It's not straightforward. This is the core of their kernel, so they need to improve it a little bit... In F5 I have full control of everything."
What is our primary use case?
I work at the service provider level. I did a deployment at a multinational telecommunications company. They have network separation, and each network has its own SP which is a controller, the "mind" of the solution, and multiple TMS's, which are the scrubbing centers for the illegal traffic. They are forwarding suspected denial-of-service traffic to the scrubbing centers, based on the SP intelligence. It will scrub the data and forward it to the normal traffic after mitigating the denial-of-service attack.
How has it helped my organization?
I work as a security consultant and integrator. We deploy Arbor for our customers. Arbor is a great network service solution. Most of the bigger enterprises or service providers use Arbor. I don't think there's another option.
What is most valuable?
The DDoS mitigation. There is no other feature.
It's just one dashboard with mitigation. You decide which mitigation you want and at what threshold to do this or that. Its operation is pretty simple. It's easy. Once you deploy it, you're optimizing your network and using the solution to its fullest.
What needs improvement?
For troubleshooting problems, it's not so intuitive. It's not straightforward. This is the core of their kernel, so they need to improve it a little bit. I don't have a specific example, but I don't feel comfortable troubleshooting Arbor issues. You don't have full control of the system. I also work on F5 in which you have access to the kernel, bare-bones Linux, so you can do whatever you want. Maybe this is a security hazard. Someone may miss something with F5, but for me, as troubleshooter, I have full control of everything. On Arbor, you don't have the same type of control.
But otherwise, from a user perspective, it's pretty straightforward.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It's pretty stable. Every now and then you'll hit a bug, but it's pretty stable.
What do I think about the scalability of the solution?
Scalability is pretty good because you have the SP, which is a controller, and you can add TMS's based on your needs.
There's a problem when using Arbor, but it's mostly not related to Arbor itself, it's connected to scaling. What happens is, you will design a deployment and, after some time, you find that the deployment is not enough for the throughput of your network. Then you have CPU spikes, memory spikes, and some other issues.
How are customer service and technical support?
Tech support is very good. On a scale of one to ten, they are a seven to eight. They're very responsive. Compared to most of the vendors, they're pretty good. The quality of the people handling the tickets is high.
Which solution did I use previously and why did I switch?
I used Juniper and F5, but F5 is not an on-premise solution. They have multiple protections but it's not a full-blown solution. We still offer F5.
When I joined this company I found that they work with Arbor. They told me there's something called Arbor and I had to do a deployment and start working with it.
How was the initial setup?
The complexity of the initial setup depends. If you have a simple network, the deployment will be easy, but if you have something more complex and you are trying to inject Arbor, it won't be easy. Most likely, you'll do it as Layer 2, and you have VRFs and VLANs. After the design is complete, the configuration will be straightforward, but the design part is not easy. That's not about Arbor itself, it's about how big networks work.
The implementation strategy also depends. Every service provider and big enterprise has its own type of networks and its own type of logical flow. So there's no standard strategy.
The last implementation I did took about two months. But again, it's not about the deployment itself, it's about the meetings, the design part, meeting with other teams. After two months it was up and running. Before that, the first one I did, took three months, but we had two SPs and eight TMS's in different data centers, so it was quite a big implementation.
When it's a service provider, multiple teams handle multiple things, so you have to have one person from every team to sit in a meeting; everyone has his own concept or his own ideas. After a couple of meetings, after a couple of suggestions, and after checking if what was discussed is possible, if it is the better option, it can go well.
In terms of staff for deployment, it's mostly a one-person job. For day-to-day administration, it takes three to four people. They would need security backgrounds, SOC or security device managers.
What was our ROI?
I don't have visibility into customers' ROI but the potential is there for ROI because denial of service is the number-one attack that can destroy your reputation and destroy your business. If you're safe from that type of attack, it's really good for your business and your investment.
What's my experience with pricing, setup cost, and licensing?
To be honest, I don't care about numbers. I'm a technical guy. But I know it's expensive compared to its competitors. After you have the on-premise solution, for your solution to be effective you have to subscribe to an "upper level," so there's another cost. There is also a subscription to cloud services, which is another cost.
What other advice do I have?
Try to design it properly for injecting it into a network. If not, it could be that when you deploy it you will cause a "black hole" in your network and everything will go down. That has happened. In the case where it happened, it had something to do with routing. Arbor was injecting traffic to the TMS's but the TMS's were not able to forward the traffic to its original source.
I rate Arbor DDoS at eight out of ten. For me, that's a pretty high rating because nothing is a nine. It's still a new solution and they're developing it. Every couple of months there's a new release with bug-fixes or some new way to do stuff. They're investing in the solution. Symantec Blue Coat is good, for example, but for quite some time there has been no development. Even with the recent version, there is nothing that different in Blue Coat. For a dynamic environment, you have to have a vendor that you can trust.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.

Buyer's Guide
Download our free Arbor DDoS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Distributed Denial-of-Service (DDoS) ProtectionPopular Comparisons
Cloudflare
Cloudflare One
Imperva DDoS
Akamai App and API Protector
Radware DDoS
Azure DDoS Protection
AWS Shield
Fastly
Uplynk
Prolexic
F5 Silverline Managed Services
Fortinet FortiDDoS
Kentik
Corero
Nexusguard DDoS Protection
Buyer's Guide
Download our free Arbor DDoS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Prolexic vs. Arbor Networks: How do they compare?
- What is the biggest difference between Arbor and Radware?
- What are the differences between Arbor DDoS and Fortinet FortiDDos?
- We are looking at managed DNS providers and want to know what others are using
- Prolexic vs. Arbor Networks: How do they compare?
- Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
- How does a WAF help to protect against DDoS attacks?
- DDoS solutions: Any other solutions to consider aside from Radware DDoS Protection Service and F5 Silverline DDoS Protection?
- Which is the best DDoS solution and why?
- When evaluating DDoS Protection, what aspect do you think is the most important to look for?