• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
DDoS Mitigation Solutions

DDoS Mitigation Solutions Reviews and Ratings

What are DDoS Mitigation Solutions?

The market for distributed denial of service (DDoS) mitigation includes vendors that detect and mitigate DDoS attacks and offer it as a dedicated offering. It includes specialty vendors, whose primary focus is DDoS mitigation, as well as providers that offer DDoS mitigation as a feature of other services. These include dedicated appliance-based vendors, communication service providers (CSPs), content delivery network (CDN) vendors, hosting providers and cloud infrastructure and platform services (CIPS) vendors.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of AWS WAF
AWS WAF
Logo of Azure DDoS Protection
Azure DDoS Protection
Logo of Radware Cloud DDoS Protection Service
Radware Cloud DDoS Protection Service
For 50M-1B USD Companies
Logo of Fastly DDoS Protection
Fastly DDoS Protection
Logo of Prophaze WAF
Prophaze WAF
Logo of Radware DefensePro
Radware DefensePro
For Asia/Pacific
Logo of Prophaze WAF
Prophaze WAF
Logo of Radware Cloud DDoS Protection Service
Radware Cloud DDoS Protection Service
Logo of Radware DefensePro
Radware DefensePro
Integration & Deployment
Logo of Prophaze WAF
Prophaze WAF
Logo of AWS WAF
AWS WAF
Logo of Imperva DDoS Protection
Imperva DDoS Protection

Product Listings

Filter by

Products 1 - 20 of 51
Sort by
Logo of Cloudflare DDoS Protection

Cloudflare DDoS Protection

By Cloudflare

4.5
(286 Ratings)

Cloudflare DDoS Protection is a software designed to identify and mitigate Distributed Denial of Service attacks across web applications and networks. It operates by monitoring traffic patterns in real time and filtering malicious requests while allowing legitimate activity. The software uses various techniques including rate limiting, anomaly detection, and challenge mechanisms to absorb and neutralize large-scale attacks. It aims to prevent service interruptions, reduce downtime, and maintain accessibility for users by automatically responding to volumetric, protocol, and application layer threats. The software is equipped with configurable rules and analytics to give organizations control over their defenses while addressing risks related to traffic surges and malicious activity.

Show More Details
Logo of Radware DefensePro

Radware DefensePro

By Radware

4.6
(82 Ratings)

Radware DefensePro is a software designed to provide real-time network and application security by detecting and mitigating cyber threats such as distributed denial of service attacks, intrusion attempts, and malware infections. The software uses behavioral-based detection and advanced algorithms to protect against known and unknown threats, continuously monitoring traffic patterns to identify suspicious activities. DefensePro aims to deliver automated protection without impacting legitimate user experience and supports multiple deployment options for integration with existing network infrastructure. Its features include adaptive threat mitigation, SSL inspection, and customizable threat intelligence, helping organizations address the challenges of safeguarding network resources and maintaining service availability.

Show More Details
Logo of Imperva DDoS Protection

Imperva DDoS Protection

By Thales Group (Imperva)

4.6
(62 Ratings)

Imperva DDoS Protection provides a comprehensive, always-on defense against Distributed Denial of Service (DDoS) attacks, ensuring your websites, networks, and applications remain online and fully operational even under the heaviest attacks. With Imperva’s cloud-based DDoS protection, mitigation begins in under three seconds, effectively blocking even the largest volumetric attacks, including those that exceed hundreds of gigabits per second.

By continuously monitoring traffic at the network edge, Imperva identifies and mitigates malicious activity before it reaches your infrastructure, protecting against layer 3, 4, and 7 attacks. The solution is fully automated, offering real-time protection without requiring manual intervention, and integrates seamlessly with both on-premises and cloud environments. Additionally, Imperva’s global network of scrubbing centers ensures minimal latency and optimal performance, regardless of where attacks originate.

Show More Details
Logo of Fastly DDoS Protection

Fastly DDoS Protection

By Fastly

4.8
(58 Ratings)

Fastly DDoS Protection is a software designed to safeguard web applications and services from distributed denial-of-service attacks. The software offers real-time detection and mitigation of large-scale threats by analyzing traffic patterns and identifying abnormal spikes that signal potential attacks. It filters malicious requests before they reach the origin servers, helping to maintain service availability and performance. The software integrates with edge cloud infrastructure to distribute security functions closer to users, thereby reducing latency and enhancing response times. It includes features such as traffic monitoring, threat intelligence, customizable security rules, and automated incident response workflows. The software addresses the business problem of website downtime and degraded performance due to malicious network traffic, ensuring continuous access for legitimate users while minimizing the impact of volumetric and application-layer attacks.

Show More Details
Logo of Akamai Edge DNS

Akamai Edge DNS

By Akamai

4.4
(53 Ratings)

Akamai Edge DNS is a software that provides authoritative domain name system services designed to ensure fast and reliable DNS resolution across global networks. The software features distributed architecture to support high availability and mitigate the impact of localized outages. It supports advanced DNS management including granular access controls, automated zone transfers, and secure updates. Akamai Edge DNS facilitates application performance by leveraging a network of edge servers to reduce latency and improve fault tolerance. The software addresses business needs related to maintaining domain integrity, scalability during traffic spikes, and continuous availability for online applications and services. It is used to enable efficient routing of user requests to appropriate web resources while supporting protection against DNS-based threats.

Show More Details
Logo of Azure DDoS Protection

Azure DDoS Protection

By Microsoft

4.4
(51 Ratings)

Azure DDoS Protection is a software developed by Microsoft that provides distributed denial of service mitigation capabilities for applications hosted on Azure. The software continuously monitors network traffic, uses adaptive tuning, and applies automatic attack mitigation to protect resources from large-scale DDoS attacks. It offers real-time telemetry and alerts, enabling administrators to understand attack patterns and respond effectively. The software integrates with other Azure security products to build comprehensive protection strategies and helps businesses maintain application availability and performance by addressing threats that target uptime and network reliability. It supports compliance and reporting with detailed analytics and post-attack analysis.

Show More Details
Logo of Radware Cloud DDoS Protection Service

Radware Cloud DDoS Protection Service

By Radware

4.8
(51 Ratings)

Radware Cloud DDoS Protection Service is a software designed to provide mitigation against Distributed Denial of Service attacks for applications and networks hosted in cloud environments. The software continuously monitors traffic to identify and block malicious activity while allowing legitimate traffic to pass through. It supports automatic detection and response to volumetric, application-layer, and SSL-based attacks. With its scalable architecture, the software aims to address availability and performance concerns by reducing downtime and ensuring that business operations remain uninterrupted during attack periods. The software includes real-time analytics, reporting, and customizable security policies to adapt to various threat scenarios.

Show More Details
Logo of Google Cloud Armor

Google Cloud Armor

By Google

4.4
(35 Ratings)

Google Cloud Armor is a software that helps organizations protect their applications and services from online threats such as distributed denial-of-service attacks, cross-site scripting, and SQL injection. The software offers customizable security policies, access control, and real-time threat detection, enabling users to define rules that filter incoming web requests based on various attributes. It integrates with Google Cloud services and provides adaptive protections using threat intelligence. Google Cloud Armor is designed to support organizations in managing security for their web-based applications and maintaining the availability and integrity of their online resources.

Show More Details
Logo of AWS WAF

AWS WAF

By Amazon Web Services (AWS)

4.6
(33 Ratings)

AWS WAF is a web application firewall software designed to help organizations protect their web applications from common internet threats. The software enables users to create security rules that allow, block, or monitor web requests based on specific criteria such as IP addresses, HTTP headers, and body data. AWS WAF provides features for filtering traffic, preventing attacks including SQL injection and cross site scripting, and managing bot traffic. It integrates with other AWS services to enhance security posture, offers real time visibility into web traffic, and automates responses to detected threats. The software addresses the challenge of securing web applications against evolving cyber risks and helps organizations maintain compliance with security standards.

Show More Details
Logo of F5 Distributed Cloud DDoS Mitigation

F5 Distributed Cloud DDoS Mitigation

By F5

4.5
(33 Ratings)

F5 Distributed Cloud DDoS Mitigation delivers cloud‑based, multi‑layer protection to safeguard your network and applications from massive L3/L4 volumetric floods, advanced L7 attacks, and DNS reflection/amplification. Leveraging F5’s global scrubbing infrastructure and Security Operations Center (SOC), it detects and neutralizes threats in real time. You can choose from an “Always On” mode to continuously filter traffic, or an “Always Available” standby plan for on‑demand activation. Get 24/7 visibility via a unified console with mitigation insights and natural‑language AI analysis and rely on 99.99% uptime SLAs backed by F5 experts to keep your services online under attack.

Show More Details
Logo of A10 Defend DDoS Protection

A10 Defend DDoS Protection

By A10 Networks

4.6
(30 Ratings)
Show More Details
Logo of Prophaze WAF

Prophaze WAF

By Prophaze

4.9
(24 Ratings)

Prophaze WAF is a Native Cloud Web Application Firewall that intelligently tracks down the malicious request into your clients’ Web APIs. It uses multiple attack detection algorithms (with AI) to monitor all the incoming requests and will pass only legitimate requests to the backend apps.

Show More Details
Logo of Arbor Cloud

Arbor Cloud

By NETSCOUT SYSTEMS

4.6
(19 Ratings)

Arbor Cloud is a software solution designed to provide distributed denial of service (DDoS) protection for enterprises and service providers. The software offers scalable mitigation capabilities to detect and neutralize both volumetric and application-layer DDoS attacks. Arbor Cloud integrates with on-premise security tools, enabling organizations to divert attack traffic for scrubbing while allowing legitimate traffic to proceed uninterrupted. The software supports automatic and manual attack detection and mitigation, allowing improved uptime and service availability during threats. Arbor Cloud addresses the business problem of service disruptions caused by DDoS attacks, aiming to ensure continuity of online operations by filtering malicious traffic and reducing downtime risk.

Show More Details
Logo of Akamai Prolexic

Akamai Prolexic

By Akamai

4.5
(13 Ratings)

Akamai Prolexic is a purpose-built distributed denial-of-service (DDoS) protection solution for digital assets and network infrastructure of organizations. Prolexic is available as on-prem, in cloud or as a hybrid solution, with the flexibility of always-on or on-demand protection against network and application layer attacks. Prolexic uses a combination of machine-automation and human intelligence to rapidly detect, analyze and filter out malicious traffic while allowing legitimate requests to reach their destination. Additionally, Prolexic Network Cloud Firewall, which is a stateless cloud-based Access Control List (ACL) orchestration solution, allows network security teams to protect their assets from zero-day vulnerabilities and centrally manage global policies. Akamai Prolexic addresses the business problem of service disruptions and downtime caused by DDoS attacks, helping maintain availability and reliability for critical online services and applications.

Show More Details
Logo of AWS Shield

AWS Shield

By Amazon Web Services (AWS)

4.5
(12 Ratings)

AWS Shield is a security software designed to provide protection against Distributed Denial of Service (DDoS) attacks for applications running on Amazon Web Services. The software offers two tiers of protection that help detect and mitigate various types of DDoS threats, including network and transport layer attacks. AWS Shield integrates with other AWS services to enable automatic responses and detailed visibility into potential threats through monitoring and reporting features. The software addresses the business problem of service disruption and potential loss of availability due to malicious traffic, allowing organizations to maintain consistent access to their AWS-hosted applications and services.

Show More Details
Logo of App & API Protector

App & API Protector

By Akamai

4.8
(10 Ratings)

App & API Protector is a cloud-delivered security service that defends web applications and APIs from modern threats while simplifying operations. It provides multi-layered protection — including web application firewall, DDoS mitigation, bot management, and API security — to prevent data loss, compliance violations, downtime, and reputational risk. Delivered through Akamai’s globally distributed platform, it safeguards applications wherever they run: at the edge, in the cloud, on premises, or in CDN-agnostic environments. Using AI-enhanced detection and adaptive automation, the service continuously evolves to counter new attack patterns and reduce operational overhead. Available in flexible and fully managed service options, App & API Protector helps organizations ensure availability, integrity, and regulatory compliance while extending seamlessly into Akamai’s Zero Trust and AI Security portfolio for unified visibility and control.

Show More Details
Logo of Oracle Dyn DDoS Protection

Oracle Dyn DDoS Protection

By Oracle

4.7
(6 Ratings)

Oracle Dyn DDoS Protection is a software solution designed to help organizations safeguard digital infrastructure against distributed denial-of-service attacks. The software offers detection, mitigation, and reporting capabilities to monitor and respond to traffic anomalies in real time. It uses diverse network-based strategies to prevent malicious traffic from impacting website and application availability, supporting both automatic and manual response options. Oracle Dyn DDoS Protection aims to maintain service continuity and minimize downtime by identifying threats and employing countermeasures. The software addresses business challenges related to cybersecurity risk, service availability, and reputation management, allowing enterprises to maintain ongoing digital operations without disruption from volumetric network-based attacks.

Show More Details
Logo of Alibaba Cloud WAF

Alibaba Cloud WAF

By Alibaba Cloud

4.8
(3 Ratings)

Alibaba Cloud WAF is a software designed to provide web application security through protection against common threats such as SQL injection, cross-site scripting, and distributed denial-of-service attacks. The software offers advanced filtering and detection algorithms to identify and block suspicious traffic before it reaches the application layer. By supporting adaptive learning and real-time monitoring, Alibaba Cloud WAF addresses business needs for safeguarding confidential data, maintaining service availability, and ensuring compliance with security standards. The software also features customizable rule settings, automated threat intelligence updates, and reporting tools to help organizations manage vulnerabilities and reduce the risk of security breaches.

Show More Details
Logo of Anti-DDoS Advanced

Anti-DDoS Advanced

By Tencent Cloud

5
(3 Ratings)

Anti-DDoS Advanced is a software designed to provide protection for online services against distributed denial-of-service attacks. The software offers features such as real-time monitoring, automated traffic analysis, and adaptive mitigation strategies to identify and block abnormal traffic patterns. It aims to ensure service availability and stability by minimizing the impact of large-scale attacks on network infrastructure. The software is used to address business challenges related to service downtime and interruption by providing a defense layer for applications, websites, and networks that require continuous operation in the face of evolving cyber threats.

Show More Details
Logo of Nexusguard Managed DDoS Mitigation Platform

Nexusguard Managed DDoS Mitigation Platform

By Nexusguard

4.7
(3 Ratings)

Nexusguard Managed DDoS Mitigation Platform is a software designed to protect digital assets from distributed denial of service attacks. The software provides automated detection and mitigation features aimed at identifying and responding to evolving network-layer and application-layer threats. It offers capabilities such as real-time monitoring, traffic analysis, and collaborative threat intelligence that enable organizations to maintain service availability and performance during attacks. The software solves business problems related to downtime, service interruption, and potential loss of revenue resulting from DDoS incidents by ensuring continuity and reliability of online services. Nexusguard Managed DDoS Mitigation Platform is utilized by entities seeking comprehensive protection for websites, applications, and infrastructure against malicious network traffic.

Show More Details

Gartner Research

Market Guide for DDoS Mitigation Solutions
Gartner Peer Insights 'Voice of the Customer': DDoS Mitigation Solutions

Top Trending Products

Radware DefenseProFastly DDoS ProtectionRadware Cloud DDoS Protection ServiceCloudflare DDoS ProtectionHuawei AntiDDoS

Popular Product Comparisons

Arbor Cloud vs Cloudflare DDoS ProtectionArbor Cloud vs Radware DefenseProCloudflare DDoS Protection vs Radware DefenseProCloudflare DDoS Protection vs Imperva DDoS ProtectionAzure DDoS Protection vs Cloudflare DDoS ProtectionAkamai Edge DNS vs Cloudflare DDoS ProtectionCloudflare DDoS Protection vs F5 Distributed Cloud DDoS MitigationNSFOCUS ADS vs Radware DefenseProCloudflare DDoS Protection vs Radware Cloud DDoS Protection Service

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.