Ratings and Reviews 0 Ratings
Ratings and Reviews 32 Ratings
What is Prolexic Routed?
DDoS attacks can range widely in size, from small and complex to large-scale, overwhelming traffic influxes. The economic repercussions of unexpected outages can be drastic, making it essential to implement swift and effective DDoS protection strategies. Prolexic Routed delivers all-encompassing, managed DDoS defense specifically designed for online businesses. Backed by a superior service level agreement (SLA), Prolexic integrates proactive mitigation techniques with Akamai’s esteemed security operations center (SOC) to address both existing and emerging threats. By executing DDoS attack mitigation in the cloud, Prolexic Routed creates a forward-looking defense that can counter even the most significant attacks, while simultaneously sifting out harmful traffic before it disrupts your applications and data centers. With options for both on-demand and continuous mitigation, businesses can efficiently oversee their defense strategies. Moreover, these proactive measures are crafted to immediately counteract attacks at the network's edge, providing the fastest and most effective response available today, thereby ensuring the security of your enterprise. This blend of innovative technology and specialized knowledge positions Prolexic Routed at the forefront of DDoS threat defense, giving businesses peace of mind in an increasingly digital landscape.
What is A10 Defend Threat Control?
A10 Defend Threat Control is a cloud-based service integrated into the A10 software suite. It features an up-to-the-minute DDoS attack map along with a comprehensive inventory of DDoS threats.
Unlike many existing tools that prioritize ease of use but often generate false positives or negatives, A10 Defend Threat Control offers in-depth insights into both attackers and their targets. This includes analytics on various vectors, emerging trends, and other critical data points. By delivering actionable intelligence, it empowers organizations to enhance their security measures and effectively block harmful IP addresses that could initiate DDoS attacks. Ultimately, this tool stands out in its ability to combine thorough analysis with practical defense strategies for businesses facing evolving cyber threats.
Integrations Supported
A10 Defend DDoS Mitigator
A10 Thunder ADC
Fortinet
Palo Alto Networks NGFW
Integrations Supported
A10 Defend DDoS Mitigator
A10 Thunder ADC
Fortinet
Palo Alto Networks NGFW
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Akamai
Date Founded
1998
Company Location
United States
Company Website
www.akamai.com/es/es/products/security/prolexic-solutions.jsp
Company Facts
Organization Name
A10 Networks
Date Founded
2004
Company Location
United States
Company Website
www.a10networks.com/
Categories and Features
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Categories and Features
Application Delivery Controllers (ADC)
CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention