We performed a comparison between Akamai App and API Protector and Arbor DDoS based on real PeerSpot user reviews.
Find out in this report how the two Distributed Denial of Service (DDOS) Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The product has a good user interface."
"They have a fantastic tool for analyzing and viewing your traffic."
"Traffic filtering and WAF are valuable."
"The features are powerful and better than F5."
"The most valuable feature is the DDoS protection, which is the main reason we got it."
"Akamai Web Application Protector is a good solution that provides basic web application protection."
"I can attest to its benefits in terms of understanding and mitigating threats...The solution's technical support team seems to be pretty responsive."
"The solution easily identifies, delays, or allows business traffic."
"Arbor DDoS offers security features that automatically detect and prevent DDoS attacks."
"We have taken on the Arbor Cloud subscription, which is really useful because you secure yourself for anything beyond your current mitigation capacity. This is a really good feature of Arbor that is available."
"We can reduce the bandwidth to minimize the attack level. If we see more than 2.5 GBs we drop it directly."
"The stability is okay and we have not encountered problems with the solution."
"Valuable features include simple and centralized management of user access and capabilities, as well as Web 2.0 interactive attack alerting, traffic visualization, and mitigation service control."
"Its scalability is big. It is for large deployments of big organizations and service providers."
"Using standard BGP, NetFlow and SNMP ensure wide compatibility. There are also peering traffic reports that can help identify upstream peering opportunities. The ATLAS aggregation service allows us to contribute to the global DDoS data and benefit from overall trends."
"The product allows us to check real-time progress, including latency and network activities."
"The product should provide a secure NTP."
"There are some issues with pushing configurations across a network. It still takes about 20 minutes and that means to retract it's another 20 minutes."
"The performance of the cloud monitoring tool is low."
"The WAF features definitely have a lot of room for improvement. A lot of the WAF is really basic. For some products or some of our solutions, we need to run a second layer of more advanced WAF. If it had better layer seven protection then we would not need a second WAF."
"In terms of precedence of Akamai rules, the last one is implemented. That is the one that is operational. If two rules contradict, the last one is implemented. We had a clash, but it was really tough to find that out. I would like to have a rulebook because, in their architecture documentation, it is not mentioned anywhere that if two rules clash, the last one works, and if it does not work, then what to do. This is something we were debating today with their tech support. With AWS, we get documents for the issues so that they do not occur in the future. Akamai's support and knowledge base needs to be improved."
"A lot of piracy happens in India and other countries. If there is a product for protection from piracy, it would be great. For example, there are multiple hackers that hack your event, and there are some channels that pirate and publish the event on some other website. We protect our streaming through DRM and different technologies. We are also protecting the website, but hacking is still happening. If they can work on protecting from piracy, it would be great."
"We are experimenting with EdgeWorkers to write our own code at the Edge level. It could grow to be much better."
"One area where Akamai can improve is the captcha part. Cloudflare provides a captcha if there are a certain number of threats. For example, I can assign that if there are 10 requests within a second from a single IP, it should send a captcha to the user. The user should fill in the captcha, and only after that, the user should be able to access our website. This captcha feature should be built into Bot Manager. I love this captcha feature of Cloudflare."
"The look and feel of the management console is a little old, excessively simple. If you compare it with other solutions, the look and feel of the console is like you're using technology from five or six years ago. It doesn't show all the technology that is actually behind it. It looks like an older solution, even though it is not."
"There is always room for improvement for any product or service. If we can bring in more agility when deploying services, that is definitely a scope which we can work towards. Nowadays, everything is being offered as a service model. It is not that we have to deploy the physical hardware, many things move up to the cloud, or even can be delivered in the VNS form in the customer's environment as well. So, in that space, if we can add more features to make it more seamless for customers to use and make it available through some marketplace, not only at the hyperscalers, but also for any on-prem deployment, that definitely would be a big plus."
"I would also like more visibility into their bad actor feeds, their fingerprint feeds. We try to be good stewards of the internet, so if there are attacks, or bad actors within our networks, if there were an easier way for us to find them, we could stop them from doing their malicious activity, and at the same time save money."
"Sometimes it blocks legitimate traffic. If a legitimate user is trying to access the server continuously, the product suspects that this is a DoS traffic file. That is a case where it needs to improve. It needs machine-learning."
"If we want to see live traffic, we can see do so. But once an attack that lasts for five minutes is done, the data is no longer there. It would be an improvement if we could see recent traffic in the dashboard. We can check and download live traffic, but a past attack, with all the details, such as why it happened and how to mitigate and prevent such future attacks, would be helpful to see."
"An issue which needs to be addressed concerns information I received of attacks on the radar and Arbor, allegedly, not taking any action."
"There is definitely room for improvement in third-party intelligence and integrations."
"There should be an automatic way to configure it to monitor traffic and decide which is an attack and which is not. In Arbor, you need to tweak and set all parameters manually, whereas in Check Point DDoS Protector, you can select the lowest parameters, and over the weeks, Check Point DDoS Protector will learn the traffic and you can then tighten some of the parameters to decide which traffic is regular and which is malicious."
Akamai App and API Protector is ranked 3rd in Distributed Denial of Service (DDOS) Protection with 27 reviews while Arbor DDoS is ranked 2nd in Distributed Denial of Service (DDOS) Protection with 46 reviews. Akamai App and API Protector is rated 8.4, while Arbor DDoS is rated 8.6. The top reviewer of Akamai App and API Protector writes "Easy to learn and gives us a report of traffic". On the other hand, the top reviewer of Arbor DDoS writes "A critical solution for security, as it includes features that can automatically detect and prevent DDoS attacks". Akamai App and API Protector is most compared with Cloudflare Web Application Firewall, Microsoft Azure Application Gateway, AWS WAF, Prolexic and Cloudflare, whereas Arbor DDoS is most compared with Radware DefensePro, Cloudflare, Corero, Imperva DDoS and Prolexic. See our Akamai App and API Protector vs. Arbor DDoS report.
See our list of best Distributed Denial of Service (DDOS) Protection vendors.
We monitor all Distributed Denial of Service (DDOS) Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.