Imperva DDoS and A10 Thunder TPS are competing in the DDoS mitigation market. Imperva DDoS is superior in pricing and support, catering to cost-sensitive tech buyers. In contrast, A10 Thunder TPS attracts clients who prioritize functionality and performance due to its extensive feature set.
Features: Imperva DDoS offers user-friendly management tools, rapid threat detection, and an effective mitigation strategy. A10 Thunder TPS provides advanced security capabilities with real-time threat intelligence, extensive customization options, and flexibility in deployment.
Room for Improvement: Imperva DDoS could enhance its feature set for more comprehensive security options, improve scalability for larger enterprises, and offer deeper integration capabilities. A10 Thunder TPS may benefit from simplifying its interface, offering more straightforward deployment for users, and reducing the learning curve associated with its advanced features.
Ease of Deployment and Customer Service: A10 Thunder TPS facilitates a versatile deployment model, suitable for various network environments. Its customer service is thorough but requires a learning curve. Imperva DDoS offers easier deployment with less technical overhead and efficient support services, ideal for organizations with limited IT resources.
Pricing and ROI: Imperva DDoS is more budget-friendly, offering a quick path to ROI, particularly for smaller organizations. A10 Thunder TPS involves higher setup costs but provides greater long-term value due to its robust features and infrastructure, appealing to enterprises ready to invest in advanced protection.
They know how much money they are losing while the system is down, so by increasing the possibility of not having a down website or web application, return on investment can be calculated easily.
The technical support was quick and accepted my requests.
I would rate the technical support of Imperva DDoS as ten.
Without accessible documentation, setting up can be time-consuming.
99% of customers are using the cloud version of Imperva DDoS protection, so they just purchase the new license and scale as needed.
The stability of Imperva DDoS is very good, as it seems they have a lot of servers around the world.
We had to find workarounds for issues like A10 blocking necessary traffic, sometimes leading to decreased security.
Maybe Imperva DDoS could use endpoints to get information about the attacks before they commence from the endpoint level or establish cooperation with endpoint vendors to share this information.
The global price list is not accessible, making it difficult to work.
I would rate the pricing of Imperva DDoS as five, where one is very cheap and ten is very expensive.
The vendor indicated that Thunder would not be supported, but I was able to add Thunder to the central console management.
Imperva DDoS has User Behavior Analytics and Threat Intelligence on its board, and this helps us to be protected proactively.
The Thunder TPS is a family of high-performance DDoS defense solutions that detect and mitigate multi-vector DDoS attacks. Unlike traditional DDoS defenses that leave a wake of collateral damage against users, Thunder TPS applies a source-based defense-in-depth mitigation pipeline. This multimodal defense that includes actionable DDoS weapons intelligence, operator definable adaptive policies, and machine learning-powered Zero-Day Automated Protection (ZAP) blocks attackers while protecting real users.
The Thunder TPS is uniquely suited for communication service providers, online gaming, and enterprise network operators who protect large networks and need compact solutions with faster response from a fully automated, zero-touch defense during an attack.
Imperva DDoS is a solution that offers protection for web applications and websites and all their associated business-critical data from cyberattacks. The cloud-based application delivery service helps improve user experiences by improving their performance. Through its security platform, Imperva DDoS also provides DDoS mitigation, a web application firewall, and a global load balancer, and includes a content delivery network — all designed to maximize performance.
Imperva DDoS Features
Imperva DDoS has many valuable key features. Some of the most useful ones include:
Imperva DDoS Benefits
There are several benefits to implementing Imperva DDoS. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Imperva DDoS users.
PeerSpot user, Etienne W., CDN & Cybersecurity Engineer - Web performance & security at CDN Tech / Ecritel, says, “It is a good solution that allows us to protect websites. It is stable, scalable, quick and easy to use.” He goes on to explain, “WAF protection works almost out-of-the-box. The Anti-DDoS mitigation in less than 1s, I saw it many times in production, I can say it works. CDN has high performances, and the Smart Caching mode is really "smart" (you can do some efficient caching even if you're not a specialist). Its unique interface for managing security performance and ease of use are the most valuable features of this solution."
An IT Senior Manager at an outsourcing company mentions, “The most valuable features are DDoS protection. The Incapsula [Imperva DDoS] environment helps us monitor all the web activity. All the web activity is passed through their WAF cloud services, then that can help us to monitor those activities. That can help protect against DDoS hacking.”
Another PeerSpot reviewer, Ben D., Sales Executive at EVVO LABS, comments, "Imperva Incapsula [DDoS] has many valuable features. One, it protects the top 10 OWASP vulnerability, the open web application software platform, this is standard. Secondly, it protects against broken authentication. As well, it has remote execution of code."
A Solutions Architect at a financial services firm states, “The solution's most valuable aspect is that it is easy to configure. The solution keeps itself up to date itself and there's no customization that we need to do. It makes it extremely easy and cuts back on the amount of work required, and saves us on man-hours.”
We monitor all Distributed Denial-of-Service (DDoS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.