"The GUI is very use-friendly. You can configure it through CLI or GUI, they give you an option to choose. It's a good solution in terms of the appliance itself. It's very light compared to other brands that offer DDoS solutions."
"There are key things that are used for our enterprise customers, such as Lambda and DNS."
"The most valuable feature is the web application firewall."
"The DDoS protection is the most valuable aspect of the solution."
"New and innovative way to protect the client's data."
"It's very user-friendly."
"From what I've seen so far, there are no negatives to report as of yet"
"It is easier to configure and develop documentation to see how we have configured firewalls."
"The solution is very good at mitigating threats."
"They have a cloud scrubbing feature that redirects the traffic if the on-prem appliance can't accommodate a large amount of traffic but it's not available where we are."
"Although I think it's quite good, it doesn't provide me with all the features I would expect to have if I were using Imperva."
"Latencies are always a problem."
"There are some issues with the CDN services."
"The solution could use more analytics on the backend to give us more insights into everything. More reports would be helpful."
"There should be a specific price list for enterprise-level customers."
"It should have easier documentation for the configuration. It's very technical and people who aren't technical should also be able to do the configuration."
"Technical support is lacking."
"The solution could work at being less expensive. It costs a lot to use it."
The Thunder TPS is a family of high-performance DDoS defense solutions that detect and mitigate multi-vector DDoS attacks. Unlike traditional DDoS defenses that leave a wake of collateral damage against users, Thunder TPS applies a source-based defense-in-depth mitigation pipeline. This multimodal defense that includes actionable DDoS weapons intelligence, operator definable adaptive policies, and machine learning-powered Zero-Day Automated Protection (ZAP) blocks attackers while protecting real users.
The Thunder TPS is uniquely suited for communication service providers, online gaming, and enterprise network operators who protect large networks and need compact solutions with faster response from a fully automated, zero-touch defense during an attack.
Cloudflare is the leading performance and security company helping to build a better Internet. Today the company runs one of the world’s largest networks that powers more than 9 million Internet applications. More than 10 trillion Internet requests flow through Cloudflare’s network each month, accounting for nearly 10% of all Internet requests globally.
Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks.
A10 Thunder TPS is ranked 17th in Distributed Denial of Service (DDOS) Protection with 1 review while Cloudflare is ranked 3rd in Distributed Denial of Service (DDOS) Protection with 8 reviews. A10 Thunder TPS is rated 8.0, while Cloudflare is rated 8.2. The top reviewer of A10 Thunder TPS writes "A10 Thunder TPS (Threat Protection System) is the world’s highest-performance DDoS protection solution, leading the industry in precision, intelligent automation, scalability, and performance. ". On the other hand, the top reviewer of Cloudflare writes "Robust, secure and innovative; technical support needs to be improved". A10 Thunder TPS is most compared with Arbor DDoS, Radware DefensePro, Imperva Incapsula, F5 Silverline Managed Services and Corero, whereas Cloudflare is most compared with Imperva Incapsula, Microsoft Azure Application Gateway, Azure Front Door, Palo Alto Networks WildFire and AWS WAF.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.