Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities.

Description

The Lumen℠ Web Application Firewall offers robust protection for your data, employees, and customers, ensuring a seamless security experience that effectively deters hackers and cybercriminals. By providing essential web and application safeguards, LumenSM effectively helps in thwarting attacks while minimizing the risk of expensive data breaches and downtime through a combination of advanced defenses that focus on accurately identifying threats without hindering customer interactions. This service adds a vital layer of security to your existing perimeter firewall infrastructure, featuring continuous 24x7 monitoring that enables prompt and effective responses to emerging threats. It also plays a key role in identifying sensitive data leaks—such as credit card and social security numbers—by analyzing encrypted traffic and blocking harmful web requests. Moreover, it conducts a thorough application security review and analysis of current web applications to pinpoint vulnerabilities that could compromise your site's security, potentially leading to costly interruptions in business operations. As cyber threats evolve, maintaining up-to-date security measures becomes increasingly essential for ensuring the integrity of your digital assets and customer trust.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend Threat Control
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Entrust Certificate Hub
Netreo
Pliant
SIRP
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM

Integrations

A10 Defend Threat Control
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Entrust Certificate Hub
Netreo
Pliant
SIRP
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

A10 Networks

Founded

2004

Country

United States

Website

www.a10networks.com/products/thunder-adc/

Vendor Details

Company Name

Lumen Technologies

Country

United States

Website

www.lumen.com/en-us/security/web-application-firewall.html

Product Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Alternatives

PT AF Reviews

PT AF

Positive Technologies