Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 1 Rating

Total
ease
features
design
support

Description

High precision, automated, scalable, and intelligent DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1Gbps to over 1Tbps. The solution minimizes downtime with multi-vector DDoS mitigation, leveraging FPGA-based acceleration and various clustering techniques to provide protection at scale. Auto policy escalation, intelligent zero-day mitigation, and streamlined SecOps elevates efficacy while lowering TCO.

Description

DataDome protects businesses from cyberfraud and bot attacks in real time, securing digital experiences across websites, mobile apps, ads, and APIs. Named a Leader in the Forrester Wave for Bot Management, DataDome is powered by AI that analyzes 5 trillion signals daily, delivering unmatched protection without compromising performance. Its Cyberfraud Protection Platform seamlessly integrates into any tech stack, offering record-fast time to value. Fully automated, it detects and blocks every malicious click, signup, and account login. Backed by a global team of advanced threat researchers and 24/7 SOC support, DataDome stops over 350 billion attacks annually. Experience protection that outperforms, every time. DataDome offers transparent insights, easy deployment, and 50+ integrations. The solution adds no latency to protected end-points, responding to each request in under 2 milliseconds thanks to 30+ regional PoPs and autoscaling technology. DataDome is frictionless for consumers while providing optimal protection and offers the only secure, user-friendly, and privacy-compliant CAPTCHA and Device Check, the first invisible alternative.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon CloudFront
Amazon Web Services (AWS)
Aruba Cloud
Avaya Aura
ExtremeCloud IQ
F5 BIG-IP
Fidelis Endpoint
Flowmon
HAProxy Enterprise
Microsoft Azure
Microsoft Cloud App Security
NEC EXPRESSCLUSTER
NGINX
Nutanix AHV
Red Hat Cloud Suite
Salesforce Commerce Cloud
Trellix Data Encryption
Trend Micro Endpoint Encryption
Venafi
Webroot DNS Protection

Integrations

Amazon CloudFront
Amazon Web Services (AWS)
Aruba Cloud
Avaya Aura
ExtremeCloud IQ
F5 BIG-IP
Fidelis Endpoint
Flowmon
HAProxy Enterprise
Microsoft Azure
Microsoft Cloud App Security
NEC EXPRESSCLUSTER
NGINX
Nutanix AHV
Red Hat Cloud Suite
Salesforce Commerce Cloud
Trellix Data Encryption
Trend Micro Endpoint Encryption
Venafi
Webroot DNS Protection

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$1590 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

A10 Networks

Founded

2004

Country

United States

Website

www.a10networks.com/products/a10-defend-mitigator/

Vendor Details

Company Name

DataDome

Founded

2015

Country

New York

Website

datadome.co

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives

AWS Shield Reviews

AWS Shield

Amazon