Audience

Enterprise IT security teams and network administrators looking to safeguard their networks against the latest and more severe DDoS threats

About A10 Defend Threat Control

A10 Defend Threat Control, a SaaS component of the A10 Defend suite, offers a real-time DDoS attack map and proactive, detailed list of DDoS weapons.

Unlike other tools available today that provide convenience at the cost of false positives and false negatives, A10 Defend Threat Control provides hands-on insights into attackers, victims, analytics, vectors, trends, and other characteristics, helping organizations establish a more robust security posture by delivering actionable insights to block malicious IPs that can launch or amplify DDoS attacks.

Pricing

Pricing Details:
Contact sales to request a quote
Free Trial:
Free Trial available.

Integrations

API:
Yes, A10 Defend Threat Control offers API access

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

A10 Networks
Founded: 2004
United States

Videos and Screen Captures

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Phone Support
Online

A10 Defend Threat Control Frequently Asked Questions

Q: What kinds of users and organization types does A10 Defend Threat Control work with?
Q: What languages does A10 Defend Threat Control support in their product?
Q: What kind of support options does A10 Defend Threat Control offer?
Q: What other applications or services does A10 Defend Threat Control integrate with?
Q: Does A10 Defend Threat Control have an API?
Q: What type of training does A10 Defend Threat Control provide?
Q: Does A10 Defend Threat Control offer a free trial?
Q: What pricing for support is available for A10 Defend Threat Control?
Q: What pricing for training is available for A10 Defend Threat Control?

A10 Defend Threat Control Product Features

Application Delivery Controllers (ADC)

Load Balancing
IP Traffic Optimization
Traffic Chaining / Steering
SSL Offload
Web Application Firewall (WAF)
CGNAT
Proxy / Reverse Proxy
Content Redirection
Server Health Monitoring

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
Infrastructure Protection (Layer 3/Layer 4)
High Network Capacity
Illegitimate Traffic Recognition
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Web Application Firewalls (WAF)

DDoS Protection
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

A10 Defend Threat Control Additional Categories