Business Software for A10 Defend DDoS Mitigator

Top Software that integrates with A10 Defend DDoS Mitigator

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    60,933 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    SafeConnect NAC Reviews
    The essence of SafeConnect NAC lies in its ability to guarantee that every device connected to the network is monitored and assessed for compliance in real-time, allowing for immediate action to block or permit access, which significantly diminishes the likelihood of security breaches. Protecting your organization’s data and reputation is paramount; therefore, it is crucial to safeguard your network, the personal information of your stakeholders, and your intellectual assets from potential threats. Organizations are increasingly confronted with the challenge posed by a plethora of unrecognized devices attempting to access their vital infrastructure. The presence of employees, customers, contractors, guests, and suppliers—along with their devices—presents a complex challenge when trying to enforce network security measures without compromising operational efficiency. Additionally, there is the significant responsibility of ensuring that user and device access records meet regulatory standards and can be utilized for security investigations, adding another layer of complexity to network management. This multifaceted approach is essential to maintaining a secure and efficient operational environment.
  • 3
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure serves as a versatile cloud computing platform that facilitates swift and secure development, testing, and management of applications. With Azure, you can innovate purposefully, transforming your concepts into actionable solutions through access to over 100 services that enable you to build, deploy, and manage applications in various environments—be it in the cloud, on-premises, or at the edge—utilizing your preferred tools and frameworks. The continuous advancements from Microsoft empower your current development needs while also aligning with your future product aspirations. Committed to open-source principles and accommodating all programming languages and frameworks, Azure allows you the freedom to build in your desired manner and deploy wherever it suits you best. Whether you're operating on-premises, in the cloud, or at the edge, Azure is ready to adapt to your current setup. Additionally, it offers services tailored for hybrid cloud environments, enabling seamless integration and management. Security is a foundational aspect, reinforced by a team of experts and proactive compliance measures that are trusted by enterprises, governments, and startups alike. Ultimately, Azure represents a reliable cloud solution, backed by impressive performance metrics that validate its trustworthiness. This platform not only meets your needs today but also equips you for the evolving challenges of tomorrow.
  • 4
    Amazon Web Services (AWS) Reviews
    Top Pick
    AWS is the leading provider of cloud computing, delivering over 200 fully featured services to organizations worldwide. Its offerings cover everything from infrastructure—such as compute, storage, and networking—to advanced technologies like artificial intelligence, machine learning, and agentic AI. Businesses use AWS to modernize legacy systems, run high-performance workloads, and build scalable, secure applications. Core services like Amazon EC2, Amazon S3, and Amazon DynamoDB provide foundational capabilities, while advanced solutions like SageMaker and AWS Transform enable AI-driven transformation. The platform is supported by a global infrastructure that includes 38 regions, 120 availability zones, and 400+ edge locations, ensuring low latency and high reliability. AWS integrates with leading enterprise tools, developer SDKs, and partner ecosystems, giving teams the flexibility to adopt cloud at their own pace. Its training and certification programs help individuals and companies grow cloud expertise with industry-recognized credentials. With its unmatched breadth, depth, and proven track record, AWS empowers organizations to innovate and compete in the digital-first economy.
  • 5
    IBM Cloud Reviews
    IBM Cloud® offers features that enhance both business agility and resilience, allowing users to discover a platform that provides 2.5 times the value. Tailored for various industries, it emphasizes security and the flexibility to develop and operate applications in any environment. The platform facilitates the transformation of business workflows through the integration of automation and artificial intelligence. Furthermore, it boasts a robust technology partner ecosystem that addresses specific industry demands, leveraging deep expertise and tailored solutions. Its processes are automated and auditable, ensuring compliance and efficiency. With unique functionalities ensuring top-tier cloud security and monitoring, users benefit from a uniform security and control framework across all applications. Additionally, its containerized solutions foster seamless DevOps practices, automation, data management, and security enhancements. The platform offers streamlined integration along with a consistent application development lifecycle, making it user-friendly. Beyond these features, IBM Cloud harnesses advanced technologies such as IBM Watson®, analytics, the Internet of Things (IoT), and edge computing, enabling businesses to innovate and stay ahead of the competition.
  • 6
    Oracle APEX Reviews
    Build enterprise apps 20x faster with 100x less code. Oracle Application Express (APEX) is a low-code development platform that enables you to build scalable, secure enterprise apps, with world-class features, that can be deployed anywhere. Using APEX, developers can quickly develop and deploy compelling apps that solve real problems and provide immediate value. You won’t need to be an expert in a vast array of technologies to deliver sophisticated solutions. Focus on solving the problem and let APEX take care of the rest. Oracle APEX is the world’s most popular low-code platform for enterprise apps. See how customers are using APEX, get started today, and become a part of the community. Did you know that if you have Oracle Database, you already have Oracle APEX? APEX is a fully supported no-cost feature of Oracle Database – the most complete, integrated, and secure data platform for any scale deployment. Using APEX, developers can quickly develop and deploy compelling apps that solve real problems and provide immediate value.
  • 7
    SAP Access Control Reviews
    Provide employees with the necessary applications and services while safeguarding data and processes from unauthorized access. Simplify the management and validation of user access through governance tools that automate user provisioning and ensure compliance with access certification for on-premise applications and data. By integrating preventive policy checks and monitoring emergency access, governance can be effectively enforced. Automatically detect and address access risk violations within SAP and external systems, while embedding compliance checks and essential risk mitigation into operational workflows. Facilitate user-initiated, workflow-oriented access requests and approvals, ensuring transparency and efficiency in the process. Accurately identify and resolve issues related to segregation of duties and critical access by incorporating integrated risk analysis. Streamline user access assignments across SAP and third-party systems automatically, while defining and maintaining compliance roles in clear, business-friendly terminology to enhance understanding and adherence. This comprehensive approach not only mitigates risks but also fosters a secure and efficient operational environment.
  • 8
    OpenText Core DNS Protection Reviews
    OpenText Core DNS Protection delivers continuous, comprehensive oversight of DNS traffic to defend organizations against stealthy, fast-moving attacks. It inspects every DNS resolution request—from applications, browsers, and background processes—and immediately filters out malicious queries before harm can occur. The solution helps prevent data loss by blocking communication with Command and Control infrastructure used for exfiltration and ransomware operations. With dynamic detection of unauthorized DNS servers, it ensures that encrypted DNS traffic cannot bypass corporate policies. Administrators can centrally manage rules, analyze DNS patterns, and identify vulnerabilities through built-in reporting dashboards. Hybrid and remote workers stay fully protected because the agent enforces DNS policies on any network. Setup is fast and frictionless, giving organizations instant security improvements without major infrastructure changes. By restoring full visibility and control over DNS activity, the platform strengthens the security posture of modern, distributed environments.
  • 9
    Microsoft Cloud App Security Reviews

    Microsoft Cloud App Security

    Microsoft

    $14.80 per user per month
    Enhance your security framework by asserting dominance over your cloud ecosystem. Utilize Microsoft Cloud App Security, a cloud access security broker (CASB), to pinpoint and mitigate cyber threats spanning all your cloud services, offering comprehensive visibility, data travel management, and advanced analytics. Simplify your approach to cloud access security by managing, regulating, and auditing your applications and resources through Cloud App Security. Uncover shadow IT within your organization, gain insights into your digital information landscape, and leverage this knowledge to your benefit. Employ real-time controls to fortify threat protection across all access points interacting with your environment. Achieve a deeper understanding of your cloud applications and services while leveraging advanced analytics to proactively identify and address cyber threats. Regulate the consumption of your data, regardless of its location, and uncover the cloud applications and services in use within your organization. Detect any irregular activities across your cloud applications to uncover ransomware incidents, compromised user accounts, or unauthorized applications that may pose a risk. By maintaining vigilance and employing these strategies, you can significantly bolster your organization's overall security posture.
  • 10
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 11
    A10 Defend Threat Control Reviews
    A10 Defend Threat Control is a SaaS component within the A10 suite. It offers a DDoS attack map in real-time and a proactive, detailed list DDoS weapons. A10 Defend Threat control is unlike other tools that are available today, which provide convenience but at the expense of false positives or false negatives. It provides insights into attackers and victims, analytics and vectors, trends and other characteristics. This helps organizations establish a stronger security posture by providing actionable insights that block malicious IPs who can launch DDoS attacks.
  • 12
    AVX ONE Reviews
    AVX ONE stands out as a cutting-edge SaaS platform for managing the lifecycle of certificates within enterprise environments, specifically catering to PKI, IAM, security, DevOps, cloud, and application development teams. By offering enhanced visibility, automation, and control over certificates and keys, AVX ONE fosters crypto-agility, allowing organizations to swiftly adapt to cryptographic shifts, counteract potential threats, avert service interruptions, and gear up for the era of Post-Quantum Cryptography. Through a single, cohesive platform, AppViewX delivers immediate benefits with comprehensive CLM across enterprises, facilitating automation for Kubernetes and container TLS, providing scalable PKI-as-a-Service, simplifying the modernization of Microsoft PKI, ensuring secure code signing, bolstering IoT identity security, managing SSH, and preparing for Post-Quantum Cryptography (PQC) while leveraging AI and ML capabilities to mitigate risks in intricate hybrid, multi-cloud, and edge scenarios. Furthermore, the integration of these features allows organizations to maintain a robust security posture while seamlessly navigating the complexities of modern technological landscapes.
  • 13
    NEC EXPRESSCLUSTER Reviews
    NEC’s EXPRESSCLUSTER software offers a robust and cost-effective way to ensure uninterrupted business operations through high availability and disaster recovery capabilities. It effectively mitigates risks of data loss and system failures by enabling seamless failover and data synchronization between servers, without the need for expensive shared storage solutions. With a strong presence in over 50 countries and a market-leading position in the Asia Pacific region for more than eight years, EXPRESSCLUSTER has been widely adopted by thousands of companies worldwide. The platform integrates with numerous databases, email systems, ERP platforms, virtualization environments, and cloud providers like AWS and Azure. EXPRESSCLUSTER continuously monitors system health, including hardware, network, and application status, to provide instant failover in case of disruptions. Customers report significant improvements in operational uptime, disaster resilience, and data protection, contributing to business efficiency. This software is backed by decades of experience and a deep understanding of enterprise IT needs. It delivers peace of mind to businesses that rely on critical systems to remain online at all times.
  • 14
    ExtremeCloud IQ Reviews
    ExtremeCloud™ IQ represents a revolutionary approach to cloud management, enhancing both wired and wireless network operations while providing new insights for IT and business through the power of machine learning. Developed from the ground up by Extreme Networks, this innovative network management system offers a next-generation solution for wireless cloud networking, significantly lowering operational complexity and costs for users. By enabling unified management of both wired and Wi-Fi networks, ExtremeCloud IQ simplifies configuration processes, facilitates real-time monitoring of clients and events, and streamlines troubleshooting efforts. Additionally, it features versatile RF planning tools and supports API integration, making it an incredibly flexible platform. With a wealth of valuable data regarding devices, clients, and applications within the network, ExtremeCloud IQ is designed to leverage this information effectively to assist in network management. Ultimately, this system revolutionizes how organizations manage their network environments, driving efficiency and productivity.
  • 15
    k0rdent Reviews
    k0rdent is a Kubernetes-native platform engineering solution designed to unify and simplify distributed container infrastructure. Built as a fully open-source environment, it helps organizations manage multi-cluster and multi-cloud operations with consistency and control. By leveraging Kubernetes and Cluster API, k0rdent provides a portable and vendor-neutral foundation for modern application platforms. The platform allows teams to assemble custom developer platforms using validated, composable components and reusable templates. Declarative configuration and continuous reconciliation ensure clusters remain compliant and self-healing over time. k0rdent accelerates developer onboarding through self-service environments with minimal learning curves. It integrates seamlessly with GitOps and modern CI/CD pipelines to reduce manual operations. Unified observability improves insight into system health and resource usage. Policy-driven automation strengthens security and compliance across environments. k0rdent enables teams to scale infrastructure reliably while reducing cost and operational complexity.
  • 16
    Ivanti Connect Secure Reviews
    Zero trust access to the cloud or data center. Secure, reliable access leads to higher productivity and lower costs. Before granting access to cloud, it ensures compliance. Data protection via lockdown mode and always-on VPN. This is the most widely used SSL VPN for all sizes of organizations and in every industry. One client allows remote and on-site access to reduce management complexity. Directory Services, Identity Services. Before connecting, ensure that all devices meet security requirements. Access to cloud-based and on-premise resources is simple, secure, and easy. On-demand, per application and always-on VPN options protect data-in-motion. Centrally manage policy, track users, devices, security status, and access activity. You don't need to install anything to access web-based apps or virtual desktop products. Access to and protection of data for compliance with industry regulations.
  • 17
    Kentik Reviews
    Kentik provides the network analytics and insight you need to manage all your networks. Both old and new. Both the ones you have and those you don't. All your traffic from your network to your cloud to the internet can be viewed on one screen. We offer: - Network Performance Analytics - Hybrid Analytics and Multi-Cloud Analytics (GCP. AWS. Azure) Internet and Edge Performance Monitoring - Infrastructure Visibility DNS Security and DDoS Attack Defense - Data Center Analytics - Application Performance Monitoring Capacity Planning Container Networking - Service Provider Intelligence - Real Time Network Forensics - Network Costs Analytics All on One Platform for Security, Performance, Visibility Trusted by Pandora and Box, Tata, Yelp. University of Washington, GTT, and many other! Try it free!
  • 18
    Archer Reviews
    With decades of expertise and numerous deployments across various areas of risk management, our platform caters to organizations at any stage of their risk management journey. Whether your team is seeking to consolidate visibility in an advanced Risk Management function or is just beginning to explore a specific risk area, our solution fosters efficiency and collaboration among all stakeholders. Archer provides a unified understanding of risk, simplifying cooperative efforts in its management. By employing consistent taxonomies, policies, and metrics for all risk data, we enhance visibility for all users, boost collaboration, and streamline processes. Delve into our all-encompassing strategy for integrated risk management by scheduling a demo of Archer. Experience the user interface firsthand and learn how our features, dashboards, and capabilities can effectively tackle your organization’s distinct risk and compliance challenges, regardless of whether you choose our on-premises solution or SaaS model. Additionally, our commitment to innovation ensures that we continuously adapt and improve our offerings to meet the evolving needs of your organization.
  • 19
    Flowmon Reviews

    Flowmon

    Progress Software

    Real-time network anomalies can be addressed and made decisions. Flowmon's actionable information is available in cloud, hybrid, and on-premise environments. Flowmon's network Intelligence integrates SecOps and NetOps into a single solution. It is capable of automated traffic monitoring, threat detection, and provides a solid foundation for informed decision-making. Its intuitive interface makes it easy for IT professionals to quickly understand incidents and anomalies, their context, impact, magnitude and, most importantly, their root cause.
  • 20
    Nutanix AHV Reviews
    Virtualization has evolved from a complicated, standalone component of the IT ecosystem to an integrated solution that simplifies management and deployment. AHV Virtualization provides a robust, secure solution that enhances operational efficiency. By integrating virtualization management directly with the Nutanix Cloud Platform, users can effortlessly oversee all aspects from a single interface. This approach alleviates pressure on IT teams through the implementation of security best practices, network microsegmentation, and comprehensive configuration audits. Research and customer feedback indicate that AHV Virtualization offers a superior total cost of ownership compared to alternative virtualization solutions. Furthermore, AHV Virtualization is specifically optimized to ensure top-tier application performance on Nutanix Cloud Infrastructure, catering to the needs of the most demanding enterprise applications, thereby solidifying its position as a preferred choice for modern businesses.
  • 21
    CyberArk Machine Identity Security Reviews
    CyberArk Machine Identity Security delivers a robust solution for managing and securing every type of machine identity, from certificates and secrets to workload identities and SSH keys. The platform provides unified observability across your infrastructure, enabling security teams to monitor all machine identities from a single dashboard. With policy-driven automation, it minimizes manual effort while improving security posture by automating lifecycle management and privilege controls. CyberArk’s comprehensive approach helps organizations safeguard their digital infrastructure and prepare for future challenges like quantum computing and AI-driven workloads.
  • 22
    Trend Micro Endpoint Encryption Reviews
    Trend Micro™ Endpoint Encryption secures data across various devices, including laptops, desktops, PCs, Macs, USB drives, and other removable storage. Offered as an independent agent, this solution integrates comprehensive full disk, file/folder, and removable media encryption to safeguard against unauthorized access to sensitive information. With a unified management console, users can conveniently manage their security needs, utilizing the same interface for both endpoint protection and other Trend Micro security offerings. Implementing the Endpoint Encryption agent not only strengthens your data security but also adapts to the evolving requirements of mobile computing within your organization. This flexibility ensures ongoing protection as your technology landscape and user needs progress.
  • 23
    Trellix Data Encryption Reviews
    Trellix offers Data Encryption solutions that protect devices and removable storage to guarantee that only authorized personnel can access the stored data. You can implement encryption policies from one management dashboard, which also allows for monitoring the encryption status and producing compliance documentation. Select from a wide array of policy choices to safeguard data across various devices, files, and removable media, all efficiently overseen from a single platform. With Trellix Native Drive Encryption, the management of both BitLocker and FileVault is centralized, streamlining operations into one accessible console that can be utilized on-premises or through SaaS. This approach not only conserves time but also optimizes resources for organizations dealing with various operating systems, as tasks such as encryption key and PIN management are consolidated in one place, enhancing overall efficiency. Additionally, this centralized system aids in maintaining a consistent security posture across the organization.
  • 24
    Aruba Cloud Reviews
    Cloud solutions have been simplified and tailored to fit your needs. Our offerings include IaaS and PaaS services specifically designed for your cloud computing applications. With a backup service that enables hassle-free auto-backups, you can efficiently manage and safeguard your valuable data. Our Object Storage service, grounded in the IaaS framework, allows you to create and oversee storage solutions for all your data requirements. The Domain Center, provided by Aruba Cloud, is an online platform that facilitates the purchase, transfer, and DNS management of domain names. Keep an eye on all your websites, Cloud Servers, and dedicated servers, regardless of whether they are hosted in Aruba Cloud facilities or with other providers. Should any failures or errors occur in the resources or services being monitored, our Cloud Monitoring system will instantly notify you via email or SMS, ensuring that you are always informed about the status of your infrastructure in real time. This prompt alert system empowers you to take immediate action when necessary, enhancing the reliability of your operations.
  • 25
    Avaya Aura Reviews
    Avaya tackles the increasing challenge of modern communications with the Avaya Aura® Platform, an innovative real-time communications framework that leverages session-based collaboration technologies. Rather than complicating matters or necessitating a complete overhaul of existing systems, the Avaya Aura® Platform provides a streamlined and evolutionary approach that transitions from today's isolated, single-purpose, and geographically constrained communication systems. The outcome is a transformative and economical multimedia communications framework that effectively integrates both current and future investments in voice, video, real-time collaboration, and beyond. Specifically designed to meet the demands of people-centric collaboration within the contemporary engaged enterprise, the Avaya Aura® Platform employs a distinct application of the Session Initiation Protocol (SIP) to harmonize media, networks, devices, applications, and presence over a shared infrastructure. This unification not only enhances communication efficiency but also fosters greater collaboration across various platforms and devices.
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB