Ratings and Reviews 0 Ratings
Ratings and Reviews 32 Ratings
What is dotDefender?
dotDefender stands out as a premier software solution for Web Application Firewall (WAF) security. Known for its robust enterprise-level protection, it boasts advanced integration capabilities, easy maintenance, and an appealing low total cost of ownership (TCO). This combination makes dotDefender an excellent option for protecting your website and web applications today. Notably, dotDefender offers adaptability to various environments, ensuring smooth functionality wherever your business operates. Whether you deploy your web applications in a Windows or Linux environment, on dedicated servers, virtual machines, or through cloud services, dotDefender Web Application Security is designed to effectively secure your operations. You can acquire dotDefender through either a perpetual or annual license from Applicure or its authorized global partners. Additionally, it is also offered as a Software as a Service (SaaS) via our broad network of hosting and managed services partners, providing you with flexibility in how you implement this essential security solution. With dotDefender, you can achieve peace of mind knowing that your digital assets are well-protected against emerging threats.
What is A10 Defend Threat Control?
A10 Defend Threat Control is a cloud-based service integrated into the A10 software suite. It features an up-to-the-minute DDoS attack map along with a comprehensive inventory of DDoS threats.
Unlike many existing tools that prioritize ease of use but often generate false positives or negatives, A10 Defend Threat Control offers in-depth insights into both attackers and their targets. This includes analytics on various vectors, emerging trends, and other critical data points. By delivering actionable intelligence, it empowers organizations to enhance their security measures and effectively block harmful IP addresses that could initiate DDoS attacks. Ultimately, this tool stands out in its ability to combine thorough analysis with practical defense strategies for businesses facing evolving cyber threats.
Integrations Supported
A10 Defend DDoS Mitigator
A10 Thunder ADC
Fortinet
Palo Alto Networks Next-Generation Firewalls
Integrations Supported
A10 Defend DDoS Mitigator
A10 Thunder ADC
Fortinet
Palo Alto Networks Next-Generation Firewalls
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Applicure Technologies
Company Location
Israel
Company Website
www.applicure.com
Company Facts
Organization Name
A10 Networks
Date Founded
2004
Company Location
United States
Company Website
www.a10networks.com/
Categories and Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention
Categories and Features
Application Delivery Controllers (ADC)
CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention