Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities.

Description

Reblaze is a cloud-native, fully managed security platform for websites and web applications. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, DC), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend Threat Control
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Entrust Certificate Hub
Netreo
Pliant
SIRP
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM

Integrations

A10 Defend Threat Control
Axonius
Azure Marketplace
BackBox
Check Point IPS
Check Point Infinity
Datacard Secura
EV Observe
Elastiflow
Entrust Certificate Hub
Netreo
Pliant
SIRP
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

A10 Networks

Founded

2004

Country

United States

Website

www.a10networks.com/products/thunder-adc/

Vendor Details

Company Name

Reblaze

Founded

2011

Country

United States

Website

www.reblaze.com

Product Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Alternatives

Alternatives