Ratings and Reviews 3 Ratings
Ratings and Reviews 32 Ratings
What is Relianoid?
Our ADC solution is crafted to elevate your online services, enhancing performance, security, and dependability significantly. It guarantees smooth traffic management and optimal resource usage while offering robust defenses against cyber threats. With our ADC solution, you gain extensive scalability and remarkable availability for your applications, services, and networks. It boasts multi-core compatibility, supports unlimited throughput, and accommodates numerous connections and farms, all while being specifically optimized for multi-core environments. There is no need for installation, enabling swift production consolidation and effortless deployment. The integration into your existing infrastructure is straightforward, promoting a cost-effective and efficient setup. By utilizing shared hardware resources, you can cut down on expenses related to physical equipment, making it a financially savvy choice. Additionally, it is equipped to support 64-bit platforms, which enhances performance and creates a strong operational environment. This architecture allows for a greater allocation of performance resources compared to its counterparts, ensuring that your services run smoothly and efficiently. Ultimately, our ADC solution positions your organization for future growth and resilience.
What is A10 Defend Threat Control?
A10 Defend Threat Control is a cloud-based service integrated into the A10 software suite. It features an up-to-the-minute DDoS attack map along with a comprehensive inventory of DDoS threats.
Unlike many existing tools that prioritize ease of use but often generate false positives or negatives, A10 Defend Threat Control offers in-depth insights into both attackers and their targets. This includes analytics on various vectors, emerging trends, and other critical data points. By delivering actionable intelligence, it empowers organizations to enhance their security measures and effectively block harmful IP addresses that could initiate DDoS attacks. Ultimately, this tool stands out in its ability to combine thorough analysis with practical defense strategies for businesses facing evolving cyber threats.
Integrations Supported
A10 Defend DDoS Mitigator
A10 Thunder ADC
Amazon Web Services (AWS)
Apache Tomcat
Fortinet
IBM Cloud Bare Metal Servers
JSON
KVM
Lenovo ThinkSystem Rack Servers
Lynx
Integrations Supported
A10 Defend DDoS Mitigator
A10 Thunder ADC
Amazon Web Services (AWS)
Apache Tomcat
Fortinet
IBM Cloud Bare Metal Servers
JSON
KVM
Lenovo ThinkSystem Rack Servers
Lynx
API Availability
Has API
API Availability
Has API
Pricing Information
$1,356 one-time payment
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Relianoid
Company Location
United States
Company Website
www.relianoid.com/products/enterprise/adc-software-appliance/
Company Facts
Organization Name
A10 Networks
Date Founded
2004
Company Location
United States
Company Website
www.a10networks.com/
Categories and Features
Application Delivery Controllers (ADC)
CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)
Load Balancing
Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers
Categories and Features
Application Delivery Controllers (ADC)
CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention