18 years helping Australian businesses choose better software
DDoS Protection Software
DDoS (Distributed Denial of Service) Protection Software helps enterprises secure, identify and block malicious traffic from reaching website and applications. This type of software monitors web traffic, automatically detects botnets, configures rules and alert situations and analyzes the attack patterns.
Read more
Read less
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
"Overall it's the superior VPN provider so despite its drawbacks it's the best of the bunch. I've..."
Read the full review
Lois
Copywriter in Cyprus
This information was sourced from NordVPN
Threat Intelligence
Server Monitoring
Alerts/Notifications
IT Incident Management
Reporting/Analytics
Web Traffic Monitoring
This information was sourced from verified user reviews of NordVPN
Pros:
The user interface is very easy to use and connects rapidly.
Read more
Cons:
Plan renewal dates seemed to change over the 3 months I used it so I missed this first cancellation date so needed to pay for an extra month.
Read more
This information was sourced from NordVPN
Who Uses NordVPN?
VPN is a service that gives you safe and private access to the internet. By encrypting your connection, a VPN hides your IP and online activity from...
Australia, Austria, Canada, Denmark, Germany, Ireland, Liechtenstein, Netherlands, New Zealand, Sweden
, Switzerland, United Kingdom, United States
and 3 others
Australia, Brazil, Canada, China, Cyprus, France, Germany, India, Ireland, Israel
, Italy, Japan, Mexico, Netherlands, Norway, Poland, Saudi Arabia, South Africa, Spain, Sweden, Switzerland, United Arab Emirates, United Kingdom, United States
and 14 others
"Webroot DNS protection gives additional easy to implement coverage to our current Security strategy"
Read the full review
Craig
Chief Technology office in Australia
This information was sourced from Webroot DNS Protection
Threat Intelligence
Server Monitoring
Alerts/Notifications
IT Incident Management
Reporting/Analytics
Web Traffic Monitoring
This information was sourced from verified user reviews of Webroot DNS Protection
Pros:
As easy as it could possibly be to install/setup on the client side. The web based management console is easy to use as well.
Read more
Cons:
Sometimes I forget it is there working, so I have to set my calendar for renewal.
Read more
This information was sourced from Webroot DNS Protection
Who Uses Webroot DNS Protection?
Cloud-based solution designed to help businesses of all sizes protect DNS networks and connections from cyberattacks and malware by blocking unwanted...
"Good product and got betters results. Its a value for money product."
Read the full review
Anoop
Lead , AWS support in India
This information was sourced from AppTrana
Threat Intelligence
Server Monitoring
Alerts/Notifications
IT Incident Management
Reporting/Analytics
Web Traffic Monitoring
This information was sourced from AppTrana
Who Uses AppTrana?
AppTrana provides risk-based protection by blocking malicious traffic at the edge. It combines DDoS, API risk, and Bot mitigation solutions to ensure...
Argentina, Australia, Brazil, Canada, France, Germany, India, Indonesia, Italy, Malaysia
, New Zealand, Philippines, Saudi Arabia, Singapore, South Africa, Spain, United Arab Emirates, United States
and 8 others
"* Cut down on operating costs (From competitor)
* Saved us money due to preventing fraud/malicious..."
Read the full review
Anonymous reviewer
This information was sourced from IPQS
Threat Intelligence
Server Monitoring
Alerts/Notifications
IT Incident Management
Reporting/Analytics
Web Traffic Monitoring
This information was sourced from verified user reviews of IPQS
Pros:
The variety of features that they provide integrate seamlessly with my software products from websites to business software that I create.
Read more
Cons:
If you are looking for simple email and phone validation, this can be a pricey product to use for that (but if you are looking for true fraud IP and transaction scoring -- look no further).
Read more
"We originally used a competitor - Distil Networks (now Imperva). Our experience with them was ok,..."
Read the full review
Matthew
Technical Lead in US
This information was sourced from DataDome
Threat Intelligence
Server Monitoring
Alerts/Notifications
IT Incident Management
Reporting/Analytics
Web Traffic Monitoring
This information was sourced from verified user reviews of DataDome
Pros:
DataDome provides a ready to use, easy to integrate solution for detecting bots in realtime, which helps to protect our service.
Read more
Cons:
Unless you understand the entirety of the solution, your implementation can leave gaps for bots to get through, or an incorrect configuration resulting in hours of frustration.
Read more
This information was sourced from DataDome
Who Uses DataDome?
Online businesses and enterprises looking to protect sensitive data and optimize web performance.
Australia, Belgium, Brazil, Canada, Denmark, Finland, France, Germany, Italy, Luxembourg
, Monaco, Netherlands, New Zealand, Poland, Portugal, Singapore, Spain, Sweden, Switzerland, United Kingdom, United States
and 11 others
American Samoa, Andorra, Antigua & Barbuda, Argentina, Aruba, Australia, Austria, Bahamas, Bahrain, Barbados
, Belgium, Bermuda, Brazil, British Virgin Islands, Brunei, Bulgaria, Canada, Cayman Islands, Cook Islands, Cyprus, Czechia, Denmark, Estonia, Faroe Islands, Finland, France, French Polynesia, Germany, Gibraltar, Greece, Greenland, Hong Kong SAR China, Hungary, Iceland, Indonesia, Ireland, Isle of Man, Israel, Italy, Japan, Jersey, Kiribati, Kuwait, Liechtenstein, Lithuania, Luxembourg, Macao SAR China, Malaysia, Maldives, Malta, Marshall Islands, Micronesia, Monaco, Montenegro, Nauru, Netherlands, New Caledonia, New Zealand, Norfolk Island, North Macedonia, Northern Mariana Islands, Norway, Palau, Papua New Guinea, Poland, Portugal, Qatar, Romania, Russia, San Marino, Saudi Arabia, Singapore, Solomon Islands, South Africa, South Korea, Spain, St Pierre & Miquelon, St. Martin, St. Vincent & Grenadines, Sweden, Switzerland, Taiwan, US Virgin Islands, United Arab Emirates, United Kingdom, United States, Vanuatu, Wallis & Futuna
and 78 others
Languages
Brazilian Portuguese, Dutch, English, European Portuguese, French, German, Hebrew, Italian, Japanese, Norwegian
, Portuguese, Spanish
and 2 others
"Searching a database of parameterized data to provide results to buyers. Ingesting millions of..."
Read the full review
Matthew
Technical Lead in US
This information was sourced from Elastic Security
Threat Intelligence
Server Monitoring
Alerts/Notifications
IT Incident Management
Reporting/Analytics
Web Traffic Monitoring
This information was sourced from verified user reviews of Elastic Security
Pros:
We wanted to go to the next step for compliance and security for our organization and we are totally satisfied. There is also o good customer support in our region.
Read more
Cons:
The documentation is poor. Not suitable for transactions.
Read more
This information was sourced from Elastic Security
Who Uses Elastic Security?
Elastic is built for relevance at scale, easily able to support small businesses, the largest multinationals, and everything in between.
Argentina, Australia, Austria, Belarus, Brazil, Bulgaria, Canada, Chile, China, Colombia
, Czechia, France, Germany, Hong Kong SAR China, India, Indonesia, Italy, Japan, Mongolia, Netherlands, Panama, Poland, Qatar, Romania, Russia, Saudi Arabia, Singapore, Slovakia, South Africa, Spain, Sweden, Switzerland, Türkiye, Ukraine, United Arab Emirates, United Kingdom, United States
and 27 others
Albania, American Samoa, Andorra, Anguilla, Antigua & Barbuda, Argentina, Aruba, Australia, Austria, Bahamas
, Bahrain, Barbados, Belarus, Belgium, Belize, Bermuda, Bolivia, Bosnia & Herzegovina, Brazil, British Virgin Islands, Bulgaria, Canada, Cayman Islands, Chile, China, Colombia, Cook Islands, Costa Rica, Croatia, Cuba, Curaçao, Cyprus, Czechia, Denmark, Dominica, Dominican Republic, Ecuador, El Salvador, Estonia, Falkland Islands, Faroe Islands, Fiji, Finland, France, French Guiana, French Polynesia, Germany, Gibraltar, Greece, Greenland, Grenada, Guadeloupe, Guam, Guatemala, Guernsey, Guyana, Haiti, Honduras, Hong Kong SAR China, Hungary, Iceland, India, Indonesia, Ireland, Isle of Man, Italy, Jamaica, Japan, Jersey, Kiribati, Latvia, Liechtenstein, Lithuania, Luxembourg, Malaysia, Maldives, Malta, Marshall Islands, Martinique, Mexico, Micronesia, Moldova, Monaco, Montenegro, Montserrat, Nauru, Netherlands, New Caledonia, New Zealand, Nicaragua, Norfolk Island, North Macedonia, Northern Mariana Islands, Norway, Oman, Palau, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Poland, Portugal, Puerto Rico, Qatar, Romania, Russia, Samoa, San Marino, Saudi Arabia, Serbia, Singapore, Slovakia, Slovenia, Solomon Islands, South Africa, South Korea, Spain, Sri Lanka, St Pierre & Miquelon, St. Kitts & Nevis, St. Lucia, St. Martin, St. Vincent & Grenadines, Suriname, Sweden, Switzerland, Thailand, Tonga, Trinidad & Tobago, Turks & Caicos Islands, Tuvalu, Türkiye, US Virgin Islands, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, Vanuatu, Vatican City, Vietnam, Wallis & Futuna, Yemen, Åland Islands
and 135 others
Languages
Chinese, Danish, Dutch, English, French, German, Hebrew, Italian, Japanese, Korean
, Polish, Portuguese, Spanish, Swedish, Traditional Chinese, Turkish
and 6 others
"We were having an issue that our network starts to choke at a particular time of day which we were..."
Read the full review
Anonymous reviewer
This information was sourced from NetFlow Traffic Analyzer
Threat Intelligence
Server Monitoring
Alerts/Notifications
IT Incident Management
Reporting/Analytics
Web Traffic Monitoring
This information was sourced from NetFlow Traffic Analyzer
Who Uses NetFlow Traffic Analyzer?
We serve IT professionals that want a monitoring partner who can support their evolving dynamic environments and grow with network demands. Geekbuilt....
Sponsored
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest.
Vendors who bid for placement can be identified by the orange “Visit Website” button on their listing.
Highest Rated
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.
Capterra is free for users because vendors pay us when they receive web traffic and sales opportunities. Capterra directories list all vendors—not just those that pay us—so that you can make the best-informed purchase decision possible.