Alternatives to Radware DefensePro
Compare Radware DefensePro alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Radware DefensePro in 2024. Compare features, ratings, user reviews, pricing, and more from Radware DefensePro competitors and alternatives in order to make an informed decision for your business.
-
1
Cisco Umbrella
Cisco
Cisco Umbrella is a cloud-delivered security service that secures internet access and controls cloud application usage across networks, branch offices, and roaming users. The DNS-layer security packages provide protection from malware, phishing, ransomware, and more by analyzing and learning from internet activity patterns to automatically uncover current and emerging threats. It proactively blocks malicious requests before they reach a customer’s network or endpoints. -
2
Cloudflare
Cloudflare
Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and more shift online, ensuring these resources are secure, performant and reliable is a business imperative. Cloudflare for Infrastructure is a complete solution to enable this for anything connected to the Internet. Behind-the-firewall applications and devices are foundational to the work of your internal teams. The recent surge in remote work is testing the limits of many organizations’ VPN and other hardware solutions. -
3
WebTitan
TitanHQ
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture. This makes the WebTitan Cloud DNS filter an ideal solution for organizations needing maximum protection and minimal maintenance. This cloud based web filtering solution provides complete protection from online threats such as viruses, malware, ransomware, phishing and comprehensive content filtering. WebTitan Cloud is a low maintenance solution that can be set up in five minutes to stop your users from accessing inappropriate content online. Start your free Trial of WebTitan today, with full support included. -
4
DataDome
DataDome
The #1 SaaS bot protection solution for e-commerce and classified ads businesses. Deploys in minutes on any web infrastructure. Unmatched bot detection speed and accuracy. Runs on autopilot, easy to customize. Full protection of your websites, mobile apps and APIs. DataDome takes care of all unwanted traffic so that your IT teams don’t have to. No more on-call incidents due to bot attacks! You still remain in full control, thanks to the bot detection software’s most comprehensive dashboard to monitor and optimize detection and response. DataDome runs anywhere, in any cloud. You install it in minutes with a simple piece of code, optimized for your architecture. Our bot detection software offers unified protection of complex architectures. It’s compatible with all major web technologies, including multi-cloud and multi-CDN setups.Starting Price: $1590 per month -
5
DDos Protector
Check Point Software Technologies
DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage. Blocks a wide range of attacks with customized multi-layered protection. Hardware-based SSL engines inspect the latest SSL/TLS standards. Defense Messaging between devices provides accurate and instant mitigation. DDoS (Distributed Denial of Service) is a category of malicious cyber-attacks that hackers or cybercriminals employ in order to make an online service, network resource or host machine unavailable to its intended users on the Internet. Targets of DDoS attacks are flooded with thousands or millions of superfluous requests, overwhelming the machine and its supporting resources. Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. -
6
BloxOne Threat Defense
Infoblox
BloxOne Threat Defense maximizes brand protection by working with your existing defenses to protect your network and automatically extend security to your digital imperatives, including SD-WAN, IoT and the cloud. It powers security orchestration, automation and response (SOAR) solutions, slashes the time to investigate and remediate cyberthreats, optimizes the performance of the entire security ecosystem and reduces the total cost of enterprise threat defense. The solution turns the core network services you rely on to run your business into your most valuable security assets. These services, which include DNS, DHCP and IP address management (DDI), play a central role in all IP-based communications. With Infoblox, they become the foundational common denominator that enables your entire security stack to work in unison and at Internet scale to detect and anticipate threats sooner and stop them faster. -
7
EfficientIP DNS Blast
EfficientIP
The scale, frequency and sophistication of volumetric DNS attacks are increasing rapidly, being amplified by the fast-growing deployments of unsecured IoT devices, mobility and BYOD. DNS service has become one of the most targeted application-layers by hackers, and specifically for layer 7 DDoS attacks. While most organizations are aware of DDoS attack security risks, the majority of them have not deployed modern DNS DDoS protection solutions and are still using traditional enterprise network security solutions such as firewalls, which are not designed for the DNS protocol. New DDoS mitigation techniques must be deployed to tackle these threats. Only purpose-built DNS protection solution offering both high performance and advanced analytics can efficiently and proactively strengthen business continuity, data confidentiality and user experience to the level your company deserves. -
8
Akamai
Akamai Technologies
Akamai keeps digital experiences closer to users than anyone — and keeps attacks and threats farther away. Powering the next frontier in digital transformation, the Akamai Intelligent Edge Platform is the defensive shield that can surround and protect everything — sites, users, devices, data centers, clouds. It is the technology that eliminates friction and enables immersion. A quarter of a million edge servers, deployed in thousands of locations around the world ingest 2.5 exabytes of data per year and interact with 1.3 billion devices and 100 million IP addresses every day. Residing within one network hop of over 90% of the world’s Internet users — it is the only global, massively distributed, intelligent edge platform, with the scale, resiliency and security that businesses demand. Advanced threat intelligence to help manage security risks and protect against cyberattacks. -
9
activeDEFENCE
activereach
From malware to advanced persistent threats (APT) to extortion & internal breaches, threats to your organisation’s infrastructure are unrelenting. Today’s businesses must consider smartphones, tablets, and consumerization of IT, combined with telecommuters, contractors, partners, and business-critical services hosted in the cloud. Security is more important than ever—and far more complex. To defend your information and systems, you need an adaptable, multi-layered defensive strategy that encompasses all the components of your IT environment, from the network to the perimeter, data, applications and endpoints, minimising and managing the weak points and vulnerabilities that expose your organisation to risk. activereach’s end-to-end portfolio of network security solutions can protect your business from advancing threats, enhance network performance, and optimise operational efficiencies. -
10
Thunder TPS
A10 Networks
Used by the top service providers and online gaming companies, Thunder TPS provides scalable and automated DDoS protection powered by advanced machine learning to detect and mitigate attacks. Multi-modal source-based defense pinpoints attackers without damaging users. 5-level adaptive mitigation policy, zero-day Automated Protection (ZAP), actionable distributed denial-of-service weapons Intelligence at a scale of 96M-entry black/white lists. Flexible and robust Distributed Denial of Service (DDoS) protection, with a wide range of hardware and software deployment models to meet your exact needs. High precision, automated DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1 Gbps to 500 Gbps. High-performance Netflow, Sflow, IPFIX-based DDoS detector for a complete reactive cyber attack defense solution. Available as a standalone appliance or integrated with aGalaxy 5000. -
11
Prolexic Routed
Akamai
Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Prolexic Routed provides fully managed DDoS protection for your online business. Backed by an industry-leading service level agreement (SLA), Prolexic combines proactive mitigation with Akamai’s world-class security operations center (SOC) to stop attacks now ― and in the future. Prolexic Routed mitigates DDoS attacks in the cloud, providing a forward defense that can stop the largest attacks and scrub DDoS traffic before it reaches your applications and data centers. On-demand and always-on options help you control your mitigation posture. Proactive mitigation controls are designed to stop attacks instantly at the edge — the fastest and most effective response in the industry. -
12
UltraDDoS Protect
Vercara
Distributed Denial of Service (DDoS) attacks represent a constant and persistent threat to the operations and security of every organization that has a digital presence. According to our 2017 research, an organization’s chance of suffering a DDoS attack is 80 percent, and when attacked, that same percentage can expect repeated assaults. But the damage doesn’t end there: Nearly half of reported attacks are conducted in concert with a breach, often leaving behind virus infections, data theft, malware activation, and now – ransomware attacks. Mitigating the DDoS attacks of today and tomorrow requires more than just technology. UltraDDoS Protect provides you with powerful analytics, top-tier DDoS mitigation, and layer 7 protection that allows you to suppress threats before they become attacks. UltraDDoS Protect is relied upon by companies of all sizes to keep their infrastructure and proprietary information safe and available. -
13
Comodo cWatch
Comodo Group
The CSOC provides 24/7 security monitoring by certified security analysts and uses state-of-the-art technology. Analysts at the CSOC identify and analyze threats, provide alerting when appropriate to engage clients in resolution and to assist in mitigation. Comodo cWatch CSOC extends your internal IT team's capacity to protect your applications with advanced security solutions that are easy to implement, fully managed and do not require large upfront investments. It is designed to absorb the time-consuming and complex security incident investigation process while offloading the high costs of in-house security staff. With real-time web traffic monitoring and proactive incident identification, our security experts are able to notify organizations and take necessary actions quickly when an attack is detected. Continuous monitoring by Comodo CSOC security experts that have deep expertise in application security monitoring and management.Starting Price: $9.90 -
14
CIRA DNS Firewall
CIRA
CIRA's DNS Firewall provides protection against malware and phishing attacks by blocking access to malicious websites. CIRA combines advanced data science with decades of experience managing the DNS to provide a critical element of your defense-in-depth strategy. Cybersecurity is a game of layers. No one cybersecurity solution is 100% effective. Whether you have traditional endpoint or firewall protection, a defense-in-depth strategy that includes a DNS firewall is essential. DNS Firewall adds a cost-effective, low-maintenance layer to your cybersecurity footprint. By monitoring and analyzing your DNS traffic, DNS Firewall can block users from accessing malicious websites, prevent phishing attacks, and even stop malware already on your network from accessing the internet. Faster data can optimally route on networks in Canada to improve performance. Private with all data kept secure and sovereign. -
15
Myra Security
Myra Security
The German technology manufacturer Myra offers a secure, certified Security-as-a-Service platform for protecting digital business processes. The highly certified Security-as-a-Service platform protects your digital business processes against a wide range of risks such as DDoS attacks, bot networks and attacks on databases. Myra is specialized in protecting critical infrastructure, especially in the finance, insurance, healthcare and public sectors. Myra technology is certified by the German Federal Office for Information Security (BSI) according to the ISO 27001 standard based on IT-Grundschutz (Basic IT protection).Starting Price: 1500 €/month -
16
Explore our flexible deployment options, award-winning service, and industry-leading service-level agreements (SLAs). In today's digital economy, your online business must be available 24x7x365 to customers, partners, and employees. Adaptive, behavioral-based algorithms block never-before-seen attacks with the lowest false positive rate in the industry. Accurately distinguishes legitimate from malicious traffic, enabling advanced SLA and increasing service availability. Comprehensive protection eliminates anomalous flows that consume network resources and impact application availability. On-demand, always-on, or hybrid? We give organizations the widest security coverage from today's DDoS attacks. Options include WAF, threat intelligence, advanced analytics, SSL traffic inspection, cloud signaling and hybrid DDoS protection. Cisco Firepower 4100 Series and 9300 appliances have enterprise-grade DDoS mitigation capabilities with Virtual DefensePro (vDP).
-
17
Securd DNS Firewall
Securd
Make sure the Internet is always safe and available, to all your worldwide users, with our global, anycast dns firewall and dns resolver featuring 10ms resolutions, real-time threat protection, and a zero-trust posture to reduce your attack surface at the edge. Anti-virus protection can't keep up with the pace of modern malware, ransomware, and phishing attacks. It takes a layered approach to defend your assets from these threats. Deploying DNS filtering reduces the risk of a successful cyber attack by blocking access to malicious domains, disrupting downloads from compromised sites, or preventing malware from exfiltrating your data. DNS firewalls also provide real-time and historical visibility into endpoint DNS queries and resolution, which is necessary to hunt down and remediate infected and compromised devices quickly. Securd DNS Firewall is powered by a worldwide anycast network. -
18
Azure DDoS
Microsoft
Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application's resources, making the application unavailable to legitimate users. DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet. Every property in Azure is protected by Azure's infrastructure DDoS (Basic) Protection at no additional cost. The scale and capacity of the globally deployed Azure network provides defense against common network-layer attacks through always-on traffic monitoring and real-time mitigation. DDoS Protection Basic requires no user configuration or application changes. DDoS Protection Basic helps protect all Azure services, including PaaS services like Azure DNS.Starting Price: $2,944 per month -
19
Windstream Enterprise DDoS Mitigation
Windstream Enterprise
Distributed Denial-of-Service (DDoS) attacks are malicious, complex, and costly to address, and they’re on the rise. They come in the form of multiple cyber-attacks that attempt to take down an online service your organization depends on, allowing attackers to wreak havoc. Downtime can impact your employees’ productivity and ability to support customers. That’s why your business needs a cost-effective Internet protection service to proactively monitor and protect before there’s an outage. DDoS Mitigation Service is a fully managed service that monitors, detects, validates, and mitigates attacks, including third-party networks before an outage or related damage happens. If a DDoS attack is detected and validated, you are notified within 15 minutes. From there, mitigation begins within 15 minutes based on your attack identification and mitigation service level agreements (SLAs). We can also proactively or automatically mitigate attacks when detected. -
20
FortiDDoS
Fortinet
Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools. 100% security processor (SPU)-based layer 3, 4, and 7 DDoS protection application-aware traffic management. Ability to monitor hundreds of thousands of parameters simultaneously. Behavior-based DDoS protection to eliminate need for signature files. Defense against every DDoS attack: bulk volumetric, layer 7 application, and SSL/HTTPS. Minimal false-positive detections through continuous threat evaluation. Attack protection for DNS services via specialized tools. FortiDDoS is a key component of our Application Security solution. -
21
NextDNS
NextDNS
NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in a matter of nanoseconds) in order to detect and block malicious behavior. With usually only a few hours between domain registration and the start of an attack, our threat intelligence system is built to catch malicious domains earlier than classic security solutions. Block ads and trackers on websites and in apps, including the most devious ones. Use the most popular ads & trackers blocklists, millions of domains all updated in real-time.Starting Price: $39 per month -
22
Webroot DNS Protection
Webroot
Protective filtering for security, visibility, privacy and control. Minimize risks, maximize safety and productivity on the web. Today’s businesses need secure, private, manageable and visible control over internet traffic. The current domain name system (DNS) simply resolves internet requests through a global system of servers, then translates those requests into their unique Internet Protocol (IP) addresses. But this vital service was not designed with security in mind and many DNS exploits and vulnerabilities now exist. By using a protective DNS service like Webroot® DNS Protection organizations control their networks and maintain the security, privacy and visibility they need to protect IT infrastructure and users, even those working remotely. Its primary aim is to create a highly secure, private, resilient and manageable connection to the internet. Automated filtering uses Webroot BrightCloud® Internet Threat Intelligence to automatically block requests. -
23
AT&T DDos Defense service provides cloud-based monitoring of volumetric distributed denial of service attacks with detailed traffic analysis and may activate mitigation to help prevent malicious traffic from entering your network. With full managed AT&T proactive or reactive DDoS defense, customers may call the AT&T threat management center to activate mitigation or rely on alerts sent to AT&T that are generated when malicious traffic against a specific set of IP addresses in the customer’s network are identified. Simple activation and operation of your business-critical applications to maintain the flow of legitimate business traffic. Detailed traffic analysis helps to identify anomalies, so that malicious traffic can be sent to scrubbing facilities and be blocked. The full managed service may notify via e-mail on critical alerts, advisories and attacks. Web portal access for service and status reporting information. The full managed service may monitor a specified IP address range.
-
24
NETSCOUT Arbor DDoS
NETSCOUT
Since 1999, our DDoS protection and network visibility solutions have been tested and proven in the world's largest, most complex networks. We deliver powerful visibility and traffic intelligence, at internet scale, to help customers not only understand their own environment, but threat actors, their tools, behaviors and campaigns on a global basis. Layered, Automated DDoS Attack Protection: Industry best practices recommend a comprehensive layered, approach, backed by continuous threat intelligence. Stop today’s high volume attacks, which are exceeding 600GB/sec. Stealthy application-layer attacks against existing stateful infrastructure devices, such as firewall, IPS and ADCs. Only a tightly integrated defense can adequately protect you from the full spectrum of DDoS attacks. Organizations face increasing pressure to drive technology transformation while managing risk. -
25
RioRey
RioRey
RioRey is the leader in building the best performing DDoS defense systems for automatically detecting and mitigating DDoS attacks. Installed all over the world, our highly intelligent, analytic-driven solutions are designed for networks of all sizes and meet the most rigorous security requirements of major enterprises, large service providers and Telco environments. Our scalable, multi-layer DDoS defense solutions combine powerful on-premise protection with an on-demand cloud-based scrubbing service to combat the full spectrum of DDoS attacks, including stealthy Layer 7 application attacks and large scale volumetric attacks. RioRey's analytic-based technology rapidly identifies and mitigates DDoS traffic immediately after powering up - no signatures, no rules, no waiting. We protect against all the 25 classes of DDoS attacks in our Taxonomy, an industry standard for classifying DDoS. -
26
DomainTools
DomainTools
Connect indicators from your network with nearly every active domain and IP address on the Internet. Learn how this data can inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Gain insight that is necessary to make the right decision about the risk level of threats to your organization. DomainTools Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain and DNS-based intelligence with an intuitive web interface. -
27
Get DDoS protection; global load balancing; and a suite of security, reliability and performance capabilities designed to protect public-facing web content and applications before they reach the cloud. From a high level, a distributed denial-of-service (DDoS) attack is like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination. A DDoS attack is a malicious attempt to disrupt the normal traffic of a server, service or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic. IBM Cloud Internet Services is a simple set of edge network services for clients looking to secure their internet-facing applications from DDoS attacks, data theft and bot attacks, and for those clients needing to optimize their web applications, or ensure global responsiveness and the ongoing availability of their internet-facing applications.
-
28
Imperva Sonar
Imperva
Imperva Sonar protects what matters most. Security analytics continuously learn across thousands of environments to automatically protect the workloads most vital to your customers’ success. Accomplish more with a lower TCO through best-of-breed edge, application, and data security solutions on a unified security platform. Analyze activity from its start at websites and APIs through your applications to its end at structured, semi-structured, and unstructured data stores. Automation enables you to adapt fast enough to stop novel attacks and zero-day exploits. Standalone data and application security lack context to disrupt multi-stage attacks. Imperva Sonar uses analytics to protect what’s most critical. Fully integrated protection for applications and databases everywhere against emerging, automated, and insider attacks -
29
Distributed Denial of Service (DDoS) attacks are happening more frequently — 53 percent of organizations report they're seeing more than 51 attacks per month — up from 44 percent last year. Organization in the Financial Services, Hosting/E-Commerce and Government sectors are top targets. Regardless of Internet provider, mitigating today’s sophisticated DDoS attacks requires high-capacity, regionally distributed scrubbing centers combined with network controls to help reduce latency and maintain performance. To detect and block traffic flood attacks aimed at crashing or reducing availability of servers, applications, websites, and networks, Lumen DDoS Mitigation Service is a cloud-based system designed to absorb malicious traffic via a dozen globally distributed scrubbing centers during a DDoS attack and forward only legitimate traffic to the customer’s internet facing addresses.
-
30
Alibaba Cloud Anti-DDoS
Alibaba Cloud
Comprehensive DDoS protection for enterprises to intelligently defend sophisticated DDoS attacks, reduce business loss risks and mitigate potential security threats. Anti-DDoS service is based on Alibaba Cloud's global scrubbing centers, combined with intelligent DDoS detection and protection systems developed at Alibaba, automatically mitigates attacks and reinforces the security of your applications, reducing the threat of malicious attacks. As the DDoS protection system for Alibaba Group, Alibaba Cloud Anti-DDoS products have been deployed to scrubbing centers across the globe, serving as a secure network with over 10 Tbit/s total mitigation capacity. Alibaba Cloud Anti-DDoS mitigates around 2,500 DDoS attacks on a daily basis and succeeded in protecting against a DDoS attack of 1 Tbit/s. Effectively lower operations and maintenance costs and ensure the stability of your businesses.Starting Price: $2,630 per month -
31
DNSFilter
DNSFilter
The world's fastest DNS based threat protection and content filtering service, powered by artificial intelligence.Starting Price: $20/month -
32
F5 Distributed Cloud DNS ensures high performance and availability of your apps, simplifying DNS delivery across multi-cloud and modern applications. F5 Distributed Cloud DNS provides geo-distributed, SaaS-based primary DNS to deliver maximum scale and performance to your apps worldwide. Automatic Capacity Scaling Deploy and support applications anywhere. Our DNS is built on a global data plane that eases deployment and management, plus scales automatically to meet high-volume demand. Fast Deployment and Delivery Configure and provision in minutes, with one set of APIs, and a single UI delivering simplified configuration for DNS across any app deployment. Layers of Security Get dynamic security with automatic failover that prevents distributed denial-of-service (DDoS) attacks or manipulation of domain responses with built-in protection.
-
33
Corero SmartWall
Corero
The SmartWall family of DDoS protection solutions mitigates a wide range of attacks all while maintaining the availability of applications and services it is protecting and without disrupting the delivery of legitimate traffic. It is designed to handle large network-based DDoS attacks or floods, reflective amplified spoof attacks, as well as attacks that are typically too low to be detected by out of band solutions. Detection and mitigation in seconds, rather than the minutes or tens of minutes taken by legacy solutions, ensuring online business continuity. Comprehensive visibility with reporting and alerting for clear, actionable, intelligence on the DDoS attack activity across the network. Accurate automatic mitigation delivers lowest TCO and enables your IT and security teams to spend more time defending against other threats. -
34
Huawei Anti-DDoS
Huawei Cloud
Anti-DDoS protects your HUAWEI CLOUD resources from DDoS attacks so your services will be more stable and reliable and your bandwidth is always available. Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks. Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices. Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity. Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic. Websites are prone to DDoS attacks, which ultimately can cause them to crash. Anti-DDoS, however, can withstand multi-layered (layer-4 to -7) attacks, which in turn improves the browsing experience. Defends against 100+ types of transmission layer and application layer DDoS attacks to ensure website stability. -
35
Netsweeper
Netsweeper
Netsweeper enables organizations to protect internet users from harmful online content and provides web filtering, digital monitoring, and online activity reporting solutions to ensure digital safety on-premise and in remote environments. The leading web filtering platform with the lowest total cost of ownership, Netsweeper delivers advanced intelligence and management solutions for service provider networks, governments, and enterprises. Capable of being onboarded in cloud and on-premise deployments, Netsweeper works across multiple devices and systems to ensure a high level of protection from any location. The most advanced content filtering platform to manage internet access and activity to protect users from illicit content and web threats. Netsweeper’s dynamic categorization engine scans and sorts the content of billions of websites and adds this information to a database of categorized sites maintained on the Netsweeper Category Name Server (CNS).Starting Price: $1 per month -
36
Cloudbric
Cloudbric
Our cloud SWAP has been vetted to be one of the most comprehensive solutions against threats such as cross-site scripting (XSS), SQL injections, and Distributed Denial of Service (DDoS). Cloudbric’s patented logic-based SWAP (featuring pattern matching, semantic, and heuristic analysis) and core rulesets are fully automated and easy to use. Meaning, is no need for frequent signature updates or complicated configuration of security policies. Customization options are also available for private WAF deployments. Our service ensures your website. will stay online and be protected against distributed denial of service attacks (DDoS). Cloudbric actively blocks layers 3, 4, and 7 DDoS attacks scalable up to 20Tbps. Cloudbric is a fully managed cybersecurity service with policy optimization, malicious traffic monitoring, DDoS protection, online real-time dashboard and 24/7 technical support. -
37
AWS Shield
Amazon
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced. All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks. -
38
ScoutDNS
ScoutDNS
Content Filtering And Malware Protection At The DNS Layer. Organizations of all sizes depend on ScoutDNS to gain visibility, comply with content obligations, and reduce their malware exposure. Manage 67 content categories. Network wide Google and Bing restricted search filters image and video search results. Supports YouTube Strict and Moderate modes with G Suite support. Block streaming media, P2P, social networks, web proxy, games, and more. Blocks malware, ransomware, and phishing sites. Stop hidden malware and objectionable content inside embedded ads. Easy to deploy with automatic updates to latest threats. Full log reporting and system dashboard. Create and mange multiple whitelists/blacklists. Manage 67+ categories, and create multiple allow/block lists that can be assigned globally or by the policy. Add custom list entries direct from logs with a single click. Sign up for a risk free full featured trial account on a single site. There is no credit card required.Starting Price: $15 per month -
39
Akamai Enterprise Threat Protector
Akamai Technologies
Enterprise Threat Protector is a cloud-based secure web gateway (SWG) that enables security teams to ensure that users and devices can safely connect to the Internet, regardless of where they are connecting from, without the complexity associated with legacy, appliance-based approaches. Deployed on the globally distributed Akamai Intelligent Edge Platform, Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks. This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform and its unprecedented insights into DNS and IP traffic. Protect web traffic at every corporate location and for off-network users quickly and without complexity with a cloud-delivered secure web gateway (SWG). -
40
DDoS-GUARD
DDoS-GUARD
DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets since 2011. Unlike most of other companies, we provide services using our own network of scrubbing centers having sufficient channel and computing capacities to process high volumes of traffic. We do not resell other companies' services claiming them as our own. Today's digital world shows us ever-increasing number of cyber threats. Abreast of the latest trends, the number of DDoS attack types is increasing too. Besides, the attacks themselves become more volumetric, complex and varied. Realizing that, we are constantly modifying traffic scrubbing algorithms, increasing channel capacity, add computational resources to traffic processing centers. It allows us not only provide protection against all known DDoS attack types to our customers, but also detect and block any previously unknown anomalous network activity.Starting Price: $30/month -
41
Radware Threat Intelligence
Radware
Radware’s Threat Intelligence Subscriptions complement application and network security with constant updates of possible risks and vulnerabilities. By crowdsourcing, correlating and validating real-life attack data from multiple sources, Radware’s Threat Intelligence Subscriptions immunize your Attack Mitigation System. It provides real-time intelligence for preemptive protection and enables multi-layered protection against known and unknown vectors and actors as well as ongoing and emergency filters. Radware’s Live Threat Map presents near real-time information about cyberattacks as they occur, based on our global threat deception network and cloud systems event information. The systems transmit a variety of anonymized and sampled network and application attacks to our Threat Research Center and are shared with the community via this threat map. -
42
Trend Micro TippingPoint
Trend Micro
Go beyond next-gen IPS without compromising security or performance. TippingPoint integrates with the Deep Discovery Advanced Threat Protection solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation. The TippingPoint®️ Threat Protection System is part of Trend Micro Network Defense. It’s powered by XGen™️ security, a blend of cross-generational threat defense techniques that deliver faster time to protection against known, unknown, and undisclosed threats. Our smart, optimized, and connected technology ensures that everything is working together to give you visibility and control across the evolving threat landscape. -
43
Cloud-delivered DDoS protection that detects and mitigates attacks before they reach your network infrastructure. In this time of uncertainty, help keep your organization safe with cloud-delivered DDoS protection that detects and mitigates attacks—before they reach you. F5 Distributed Cloud DDoS Mitigation Service is a managed, cloud-delivered protection service that detects and mitigates large-scale, SSL, or application-targeted attacks in real time—defending your business from even those attacks that exceed hundreds of gigabits per second. The F5 Security Operations Center (SOC) is on the front lines when it comes to protecting your business.
-
44
Get comprehensive DDoS protection for your network and at the application layer with flexibility and scale for inline, out-of-band, and hybrid deployments. Traditional DDoS solutions focus solely on a narrow range of attacks. Here are some of the reasons they’re only partially effective: By black-holing or rate-limiting, they cripple the connections of legitimate users in network layer (or flood) attacks. They’re blind to SSL traffic and dependent on their placement in the network when application layer attacks hit. On-premises defenses are rendered useless when a WAN bandwidth saturation shuts down Internet connectivity. Fortunately, F5 BIG-IP DDoS Hybrid Defender provides a greater depth of defense. It’s the only multi-layered defense that protects against blended network attacks and sophisticated application attacks, while enabling full SSL decryption, anti-bot capabilities, and advanced detection methods, all in one appliance.
-
45
Project Shield
Project Shield
Project Shield, created by Google Cloud and Jigsaw and powered by Google Cloud Armor, provides free unlimited protection against DDoS attacks, a type of digital attack used to censor information by taking websites offline. Project Shield filters out malicious traffic using Google's infrastructure and DDoS tools. If your website is targeted by a DDoS attack, our servers will block attacking traffic to keep your website up and running. Project Shield can be configured to fetch content from your website's servers once and serve a cached copy on subsequent requests. This reduces traffic to your servers and absorbs potential DDoS attacks. Project Shield caches content to strengthen DDoS defenses, improve site performance, and save bandwidth to sites. Users have the ability to invalidate caches for their site's needs. Project Shield provides controls such as JavaScript cookies and IP denylists for increased site protection. -
46
Core CSP
Core Security (Fortra)
Core CSP is a purpose-built security system that is designed to monitor Internet Service Provider (ISP) and telecommunications subscribers for cyberthreats. This lightweight and scalable service provider solution passively monitors extremely large networks and identifies malicious activity on a subscriber network originating from PC, tablet, and mobile devices. ISPs and telecommunications companies must increasingly fend off cyber threats that hijack bandwidth capabilities. These attacks put subscribers at risk of having credentials stolen, falling victim to fraudulent transactions, or having devices commandeered and used for cryptomining, botnets, or other persistent attacks. DDoS attacks, often committed by botnets, are particularly problematic because they consume bandwidth with floods of requests, disrupting normal traffic or crashing the infrastructure entirely. Threat actors use networks to access any number of unsuspecting targets. -
47
Darktrace
Darktrace
The Darktrace Immune System is the world’s leading autonomous cyber defense platform. Its award-winning Cyber AI protects your workforce and data from sophisticated attackers, by detecting, investigating and responding to cyber-threats in real time wherever they strike. The Darktrace Immune System is a market-leading cyber security technology platform that uses AI to detect sophisticated cyber-threats, from insider threat and criminal espionage, to ransomware and nation-state attacks. Analogous to the human immune system, Darktrace learns the ‘digital DNA’ of the organization, and constantly adapts to changing environments. Self-learning, self-healing security has arrived. Machine-speed attacks like ransomware are simply too fast for humans to deal with. Autonomous Response takes the burden off the security team, responding 24/7 to fast-moving attacks. AI that fights back. -
48
Tencent Cloud Anti-DDoS Advanced
Tencent
Backed by globally deployed nodes of Tencent Cloud, Anti-DDoS Advanced comes with strong resource advantages, enabling it to provide defense capabilities at the Tbps level. It currently has five major protection nodes in China and dozens of traffic cleaning centers around the world. This ensures cleaning near the attack source for global business deployment. Leveraging the protection clusters independently developed by Tencent Cloud and a smart AI engine, Anti-DDoS Advanced continues to optimize multi-dimensional algorithms for protection policies, IP profiling, behavior pattern analysis, and cookie challenges. Anti-DDoS Advanced can hide the IP of the real server. It deploys an alternative IP with high defense capability so the real server does not get exposed to the attack traffic, thus improving security. -
49
Barracuda Web Application Firewall
Barracuda Networks
Application security is increasingly complex. Barracuda makes it simple. Barracuda Web Application Firewall is a part of Barracuda Cloud Application Protection, an integrated platform that brings a comprehensive set of interoperable solutions and capabilities together to ensure complete application security. Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. By combining signature-based policies and positive security with robust anomaly-detection capabilities, Barracuda Web Application Firewall can defeat today’s most sophisticated attacks targeting your web applications. Barracuda Active DDoS Prevention, an add-on service for the Barracuda Web Application Firewall, filters out volumetric DDoS attacks before they ever reach your network and harm your apps. -
50
UltraDDR
Vercara
UltraDDR is a cutting-edge protective DNS (PDNS) solution purposely built to secure the human element of online interactions, offering automatic threat eradication and setting a new standard in layer 8 cybersecurity. Discover UltraDDR (UltraDNS detection and response), the industry’s leading protective DNS solution that preempts attacks. By integrating both recursive and private DNS resolver technologies, UltraDDR proactively blocks malicious queries and maps adversary infrastructure. The shift from a reactive to a proactive security stance ensures your business remains a step ahead of malicious traffic and cybercriminal activity. Proactively protect employees at work, at home, and on the go. Automatically detect and block nefarious connections or new threat actors the very first time they appear in any phishing, social engineering, or supply chain attack. Enforce acceptable usage policies with category-based web filtering and customized block/allow lists.