I am not in a position to speak about the areas where the solution needed improvement because I resigned during the implementation phase. At that time, the implementation was ongoing, and everything seemed to be going well. Using the solution, our team managed to transfer a couple of routers through a few areas. However, I believe the migration is still ongoing. Nonetheless, the first phase of the implementation was successful before my departure. There was a certain level of performance degradation in the solution, which I don't know if it can be tuned. This is because I was working for a short period on the solution. In my experience, it is an area that can be improved while also considering the stability and scalability aspects of the solution. If one wants to scale up, then one needs to change their plan. However, the thing is, one can always go for the larger scale based on one's anticipation of future traffic.
One of the features that should be added to the next release is report generation. Currently, reports can be downloaded every month and are only available at the beginning of each month. It would be nice to generate the reports based on specific dates that we prefer and not have to wait until the next month for the current month’s report. In addition, we would prefer to customize the overview that we need on a case-by-case basis.
Systems Specialist at a logistics company with 1,001-5,000 employees
User
2021-12-06T07:38:00Z
Dec 6, 2021
If the application security can be improved within the current deployment of Origin Protection, that would be of additional benefit. We need to have complete coverage on different attack vectors when subscribed to Origin Protection. The mitigation scope of Origin Protection is not fully efficient as there could be delays in activating the countermeasures. Therefore, analysis on the application layer would be a good improvement for this product. Overall, we do not have not many concerns with the rest of the coverage as it is tailor-fitted to resolve volume-based DDoS Attacks.
So far, we are satisfied with the current protection that we have from Nexusguard. We are certain that Nexusguard's security team is doing its best on keeping the solution up to date and by trying to research and identify all types of attacks across the internet as much as possible. One thing that we would like to improve from them is to provide more training to SOC team for them to have a deep understanding of the solution so that they would always be ready to answer anything without the need to escalate queries to senior personnel. Other thing that Nexusguard should consider is to be more internationally competitive. Though scalability is not an issue at the moment but in my opinion they should prepare the solution to be able to cater the demands of dozens customers with capacity getting larger and larger without compromising the protection from DDoS attacks. Lastly, Nexusguard should keep on being innovative to maintain its global presence.
Learn what your peers think about Nexusguard DDoS Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Founded in 2008, Nexusguard is the global leader in fighting malicious internet attacks. Nexusguard protects clients against a multitude of threats, including distributed denial of service (DDoS) attacks, to ensure uninterrupted internet service. Nexusguard provides comprehensive, highly customized solutions for customers of all sizes, across a range of industries, and also enables turnkey anti-DDoS solutions for service providers. Nexusguard delivers on its promise to maximize peace of mind...
The solution must provide features for the post-processing of the traffic type and the traffic quality.
I am not in a position to speak about the areas where the solution needed improvement because I resigned during the implementation phase. At that time, the implementation was ongoing, and everything seemed to be going well. Using the solution, our team managed to transfer a couple of routers through a few areas. However, I believe the migration is still ongoing. Nonetheless, the first phase of the implementation was successful before my departure. There was a certain level of performance degradation in the solution, which I don't know if it can be tuned. This is because I was working for a short period on the solution. In my experience, it is an area that can be improved while also considering the stability and scalability aspects of the solution. If one wants to scale up, then one needs to change their plan. However, the thing is, one can always go for the larger scale based on one's anticipation of future traffic.
One of the features that should be added to the next release is report generation. Currently, reports can be downloaded every month and are only available at the beginning of each month. It would be nice to generate the reports based on specific dates that we prefer and not have to wait until the next month for the current month’s report. In addition, we would prefer to customize the overview that we need on a case-by-case basis.
If the application security can be improved within the current deployment of Origin Protection, that would be of additional benefit. We need to have complete coverage on different attack vectors when subscribed to Origin Protection. The mitigation scope of Origin Protection is not fully efficient as there could be delays in activating the countermeasures. Therefore, analysis on the application layer would be a good improvement for this product. Overall, we do not have not many concerns with the rest of the coverage as it is tailor-fitted to resolve volume-based DDoS Attacks.
So far, we are satisfied with the current protection that we have from Nexusguard. We are certain that Nexusguard's security team is doing its best on keeping the solution up to date and by trying to research and identify all types of attacks across the internet as much as possible. One thing that we would like to improve from them is to provide more training to SOC team for them to have a deep understanding of the solution so that they would always be ready to answer anything without the need to escalate queries to senior personnel. Other thing that Nexusguard should consider is to be more internationally competitive. Though scalability is not an issue at the moment but in my opinion they should prepare the solution to be able to cater the demands of dozens customers with capacity getting larger and larger without compromising the protection from DDoS attacks. Lastly, Nexusguard should keep on being innovative to maintain its global presence.