Try our new research platform with insights from 80,000+ expert users

Kaspersky DDoS Protection vs SiteLock comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Kaspersky DDoS Protection
Ranking in Distributed Denial-of-Service (DDoS) Protection
35th
Average Rating
0.0
Reviews Sentiment
5.4
Number of Reviews
1
Ranking in other categories
No ranking in other categories
SiteLock
Ranking in Distributed Denial-of-Service (DDoS) Protection
28th
Average Rating
6.6
Reviews Sentiment
8.1
Number of Reviews
3
Ranking in other categories
Static Application Security Testing (SAST) (52nd), CDN (20th), Web Application Firewall (WAF) (39th)
 

Mindshare comparison

As of January 2026, in the Distributed Denial-of-Service (DDoS) Protection category, the mindshare of Kaspersky DDoS Protection is 0.3%, up from 0.1% compared to the previous year. The mindshare of SiteLock is 1.0%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Distributed Denial-of-Service (DDoS) Protection Market Share Distribution
ProductMarket Share (%)
SiteLock1.0%
Kaspersky DDoS Protection0.3%
Other98.7%
Distributed Denial-of-Service (DDoS) Protection
 

Featured Reviews

Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
A comprehensive and advanced product that prevents DDoS attacks
Kaspersky DDoS Protection offers three layers of support. The first layer of support is from the reseller, the second from the distributor, and the third from Kaspersky itself. Kaspersky has two support options. If one of my clients to whom I have sold Kaspersky licenses is facing an issue, they have to register themselves and wait in queue for support. It can take around 24-72 hours. A client can buy support from Kaspersky directly for a whole year. This type of support is quick and good since they respond within an hour.
it_user723534 - PeerSpot reviewer
Guitarist at a media company with self employed
It's not easy to get out once you're in
Sitelock may perform a useful service, but be wary of giving them your credit card information. When you sign on for the paid service, Sitelock: * Hides (makes it difficult to find) that they default the auto-renew (you can't sign up without agreeing to have them automatically bill your credit card every year). * Hides (makes it difficult to find) how to stop auto-renew: * You can't just stop auto-renew from your billing panel, the way you can with reputable businesses. * You have to hunt their website for a link (in extremely small font) to the page which contains instructions for cancelling. * When you get to that page, turns out it's the 5000+ word "Terms of Service" document, which you have to scour to find a phone number. Then, you have to call and get put on hold (or if you like, they will call you back three days later). Once you finally get through, you have to jump through a lot of security hoops. All of the above, just to cancel the service. Their product may or may not be OK, but be forewarned that with Sitelock, it's not easy to get out once you're in.
report
Use our free recommendation engine to learn which Distributed Denial-of-Service (DDoS) Protection solutions are best for your needs.
880,685 professionals have used our research since 2012.
 

Questions from the Community

Ask a question
Earn 20 points
What do you recommend for a securing Web Application?
That's one of the most critical questions any development team faces! Securing a web application requires a layered approach, not a single tool. Here is a quick breakdown of what to recommend: In...
 

Overview

 

Sample Customers

goods.ru, Revain Blockchain, Alfa Bank
galaxyguitar.com, robertasinc.com, indiarunning.com, comprarenpr.com, idbasolutions.com, newgrip.com
Find out what your peers are saying about Cloudflare, Radware, NETSCOUT and others in Distributed Denial-of-Service (DDoS) Protection. Updated: January 2026.
880,685 professionals have used our research since 2012.