Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Fastly Reviews & Ratings
    822 Ratings
    Company Website
  • Delska Reviews & Ratings
    14 Ratings
    Company Website
  • phoenixNAP Reviews & Ratings
    6 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    119 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    383 Ratings
    Company Website
  • SpamTitan Reviews & Ratings
    813 Ratings
    Company Website
  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
    Company Website
  • EasyDMARC Reviews & Ratings
    151 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    478 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website

What is Voxility DDoS Protection?

Our solution provides over 1 Tbps of highly praised DDoS protection that is compatible with nearly any application. It is commonly employed to safeguard online gaming platforms, DNS, TCP services, as well as both HTTPS and HTTP websites, ensuring that attackers cannot disrupt your services, regardless of the attack method utilized. The Anti-DDoS Tunnel serves as the fastest means for an entire network and its downstream clients to shield themselves from both volumetric and application-specific DDoS attacks. This fully automated solution activates traffic filtering exclusively when an attack is detected. It is designed to work seamlessly with all edge routers that support GRE or L2TP, granting the network complete authority over which subnets are advertised through the tunnel via BGP advertisements. Meanwhile, the Secure Uplink stands out as the most effective method for Internet Service Providers (ISPs) to defend their networks and their downstream customers against DDoS attacks, whether volumetric or application-specific, up to 1 Tbps. By simply adding an additional upstream provider to their existing list of peers, ISPs can quickly implement this fully automated solution, which filters DDoS attacks for all subnets that are advertised through BGP on this connection. In summary, our DDoS protection ensures that customer services linked to Voxility remain unharmed by any DDoS attacks, providing peace of mind for businesses relying on consistent online performance. Our solutions are tailored to adapt to the evolving landscape of online threats, ensuring that your infrastructure remains robust and resilient.

What is Imperva DDoS Protection?

Imperva's DDoS Protection ensures that all your digital assets are safeguarded at the network edge, allowing for uninterrupted operations. This service helps maintain business continuity by guaranteeing uptime, which is essential since it only takes moments for an organization to go offline, but recovery can be a lengthy process; therefore, every second counts during an attack. With Imperva, you gain peace of mind as it automatically filters out malicious traffic at the edge, which prevents the need for costly bandwidth increases. Specifically tailored for websites, the DDoS Protection service is always active, providing rapid responses to any type or scale of DDoS attack that targets your web applications. This service collaborates with Imperva's cloud web application firewall (WAF) to effectively thwart hacking attempts and bot attacks. A straightforward adjustment to your DNS records routes all HTTP/S traffic for your domain(s) through the Imperva network, ensuring secure handling. Acting as a protective proxy, Imperva’s DDoS protection hides the IP address of your origin server, adding an extra layer of defense against potential threats. By deploying this comprehensive solution, organizations can focus on their primary operations without the ongoing anxiety of DDoS attacks interfering with their services, ultimately fostering a more secure digital environment. This level of protection not only enhances operational efficiency but also strengthens customer trust in your online presence.

Media

Media

Integrations Supported

Acunetix
Buyer Discovery
DigiCert CertCentral
Gigamon
Intelligent Management Center
Microsoft 365
NTT Application Security
Oracle Cloud Infrastructure
Proofpoint CASB
RapidScale Identity as a Service
Red Hat Cloud Suite
SAP Cloud Platform
SolarWinds Access Rights Manager
Splunk APM
Teradata VantageCloud
The Reporting Solution (TRS)
Veracode
Vormetric Data Security Platform

Integrations Supported

Acunetix
Buyer Discovery
DigiCert CertCentral
Gigamon
Intelligent Management Center
Microsoft 365
NTT Application Security
Oracle Cloud Infrastructure
Proofpoint CASB
RapidScale Identity as a Service
Red Hat Cloud Suite
SAP Cloud Platform
SolarWinds Access Rights Manager
Splunk APM
Teradata VantageCloud
The Reporting Solution (TRS)
Veracode
Vormetric Data Security Platform

API Availability

Has API

API Availability

Has API

Pricing Information

$468 per month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Voxility

Date Founded

2004

Company Location

United States

Company Website

www.voxility.com

Company Facts

Organization Name

Imperva

Date Founded

2002

Company Location

United States

Company Website

www.imperva.com/products/ddos-protection-services/

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Categories and Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Popular Alternatives

WEDOS Protection Reviews & Ratings

WEDOS Protection

WEDOS Group SA

Popular Alternatives

MITIGATOR Reviews & Ratings

MITIGATOR

BIFIT
Huawei Anti-DDoS Reviews & Ratings

Huawei Anti-DDoS

Huawei Cloud
WEDOS Protection Reviews & Ratings

WEDOS Protection

WEDOS Group SA