Learn More

Average Ratings 32 Ratings

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

A10 Defend Threat Control is a SaaS component within the A10 suite. It offers a DDoS attack map in real-time and a proactive, detailed list DDoS weapons. A10 Defend Threat control is unlike other tools that are available today, which provide convenience but at the expense of false positives or false negatives. It provides insights into attackers and victims, analytics and vectors, trends and other characteristics. This helps organizations establish a stronger security posture by providing actionable insights that block malicious IPs who can launch DDoS attacks.

Description

Our DDoS protection and network visibility solutions were tested in the most complex networks around the globe since 1999. We provide powerful visibility and traffic information at an internet scale to help customers understand not only their environment but also threat actors, their tools and behaviors on a global level. Layered, Automated DoS Attack Protection: Industry best practice recommends a multilayered approach that is backed by continuous threat information. Stop today's high-volume attacks that exceed 600GB/sec. Stealthy application layer attacks against stateful infrastructure devices such as firewalls, IPS, and ADCs. Only a tightly integrated defense will be able to protect you from all DDoS attacks. Organizations are under increasing pressure to manage risk and drive technology transformation.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend DDoS Mitigator
A10 Thunder ADC
Amazon Web Services (AWS)
BackBox
CyberFlood
DNSWatch
Elastic Observability
Fortinet
Medigate
Microsoft 365
Microsoft Azure
Microsoft Defender for IoT
Network Critical
Optiv Managed XDR
Oracle Cloud Infrastructure
Palo Alto Networks Next-Generation Firewalls
Skype
ThreatSync
UltraWAF
WatchGuard WIPS

Integrations

A10 Defend DDoS Mitigator
A10 Thunder ADC
Amazon Web Services (AWS)
BackBox
CyberFlood
DNSWatch
Elastic Observability
Fortinet
Medigate
Microsoft 365
Microsoft Azure
Microsoft Defender for IoT
Network Critical
Optiv Managed XDR
Oracle Cloud Infrastructure
Palo Alto Networks Next-Generation Firewalls
Skype
ThreatSync
UltraWAF
WatchGuard WIPS

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

A10 Networks

Founded

2004

Country

United States

Website

www.a10networks.com/

Vendor Details

Company Name

NETSCOUT

Founded

1984

Country

United States

Website

www.netscout.com/arbor-ddos

Product Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Alternatives

Alternatives

NetScaler Reviews

NetScaler

Cloud Software Group
WEDOS Protection Reviews

WEDOS Protection

WEDOS Group SA