Try our new research platform with insights from 80,000+ expert users
Owner at Ampec Data Service srl
Real User
We have no encountered any stability problems
Pros and Cons
  • "The stability is okay and we have not encountered problems with the solution."
  • "An issue which needs to be addressed concerns information I received of attacks on the radar and Arbor, allegedly, not taking any action."

What is our primary use case?

We receive work orders and implement them for the client. This we do in respects of MMSP solutions. 

We do not help to integrate Arbor in other companies.

What needs improvement?

An issue which needs to be addressed concerns information I received of attacks on the radar and Arbor, allegedly, not taking any action. I wish to compare this with Fortinet DDoS, with which I am more familiar. This solution places more of an emphasis on the behavior of the traffic and provides a response in respects of the volume. But, it also learns the traffic behavior of the customer as concerns its response to other attacks.

I would like to see a feature concerning the response or one which addresses the need for behavior learning of the customer's traffic. I am sure Arbor is working on it. 

For how long have I used the solution?

We've been using Arbor DDoS for three years.

What do I think about the stability of the solution?

The stability is okay and we have not encountered problems with the solution. 

Buyer's Guide
Arbor DDoS
July 2025
Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.

What do I think about the scalability of the solution?

As I mentioned, we only provide support in the role of technical operators, so the question about plans for increased usage should be directed towards the operator. He is in a position to say whether he has plans to sell more equipment to his customers. While the desire to desire to sell is not at issue, the willingness of people in this country to pay for the security is. 

How are customer service and support?

We received from the customer, who is an operator, all of the technical knowledge needed to support NETSCOUT.

How was the initial setup?

The initial setup was okay and did not take long. 

What's my experience with pricing, setup cost, and licensing?

The licensing of a complete Arbor solution, including fire-walling and unified site management, can get expensive. This is a cost-benefit scenario in which the risk of losing everything must be weighed against the increased expense of the solution. This decision lies with the end customer and it depends on his protection policy. Apparently, taking protective measures is not prevalent in our culture, as people have a tendency to think that they will not be the target of an attack, even though this may be the ultimate result. 

What other advice do I have?

I believe we have 10 or 15 users who are working with the solution. 

I rate Arbor DDoS as a ten out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Technical Lead - DEVSECOPS with 1,001-5,000 employees
Real User
Stable, scalable, and handles complex environments
Pros and Cons
  • "We can reduce the bandwidth to minimize the attack level. If we see more than 2.5 GBs we drop it directly."
  • "If we want to see live traffic, we can see do so. But once an attack that lasts for five minutes is done, the data is no longer there. It would be an improvement if we could see recent traffic in the dashboard. We can check and download live traffic, but a past attack, with all the details, such as why it happened and how to mitigate and prevent such future attacks, would be helpful to see."

What is our primary use case?

We use Arbor DDoS in the Asia Pacific region for a couple of government clients and Financial sector. The primary use case is for different types of problems that we do not see with other solutions, such as IPS, IDS, and FireEye. It has that type of detection and it blocks things.

How has it helped my organization?

It detect and protect DDOS effectively.

What is most valuable?

We can reduce the bandwidth to minimize the attack level. If we see more than 2.5 GBs we drop it directly. Many times an attack is with hundreds of GBs on our devices. We're able to filter that out.

Also, it is able to find new, different IPs. Arbor keeps them for one or two days, but it will release them after some time. That enables us to blacklist them permanently so that we don't get that IP's traffic.

It also denies fragmented packets.

What needs improvement?

If we want to see live traffic, we can see do so. But once an attack that lasts for five minutes is done, the data is no longer there.  It would be an improvement if we could see recent traffic in the dashboard. We can check and download live traffic, but a past attack, with all the details, such as why it happened and how to mitigate and prevent such future attacks, would be helpful to see.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

It's a stable solution. We haven't had any issues up until now, except for one or two times. On those occasions, we found attacks were getting through but then we realized we needed to update the signature database. Since then, it has been working fine. It is blocking as it should.

There haven't been any bugs.

What do I think about the scalability of the solution?

We haven't had any issues with the scalability.

How are customer service and technical support?

Technical support is good. They respond swiftly.

Which solution did I use previously and why did I switch?

We found what we wanted in Arbor DDoS. It met our expectations, as IT users of different types of complex environments. It fit our needs. After we did the PoC, we found that this product is good. It was scalable and stable.

How was the initial setup?

The initial setup is complex.

Deployment took about four months. After getting vendor support for installation, we then configured IP ranges for different clients. Then we set up the bandwidth and enabled logins.

There has not been much to deploy and maintain since then.

What about the implementation team?

Arbor directly helped with the deployment.

What was our ROI?

DDoS is a major problem. If it infiltrates one device, it can move laterally, compromising much more. Up until now, we haven't lost any confidential data. The DDoS protection solution is a valuable tool to our organization.

Which other solutions did I evaluate?

We did look at competitors but I don't remember which ones now.

What other advice do I have?

We have two teams that work with it. There is the maintenance team and we are the team that takes action.

I would rate Arbor DDoS at eight out of ten. It's stable, it's scalable, and it can handle complex environments. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Arbor DDoS
July 2025
Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
Informat7f04 - PeerSpot reviewer
Information Security Analyst at a financial services firm with 1,001-5,000 employees
Real User
The introduction of IP-intelligence helps in determining IPs with a bad reputation
Pros and Cons
  • "In the GUI, the packet capture is a very good option, as is the option to block an IP address."
  • "There is definitely room for improvement in third-party intelligence and integrations."

What is our primary use case?

We observed traffic over six months to create a benchmark. We created alerts to trigger and be sent to our SOC once the traffic exceeds the benchmark.

How has it helped my organization?

The introduction of IP-intelligence helps in determining IPs with a bad reputation. We recently upgraded to the latest version and that functionality is enabled now. They've come up with centralized intelligence based on their own cloud, and they feed the data, the intelligence.

What is most valuable?

In the GUI, the packet capture is a very good option, as is the option to block an IP address. These help in analyzing traffic and blocking unwanted IP addresses as a preliminary troubleshooting step.

Also, they have a customer program where, if we find a blacklisted or bad-reputation IP, we can submit it to Arbor directly.

What needs improvement?

There is definitely room for improvement in third-party intelligence and integrations. I would like to see more threat intelligence and internal traffic monitoring for C & C communications.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

We have not faced any scalability issues since we have a very confined environment.

How are customer service and technical support?

Tech support is good. They have really good expertise from the appliance point of view.

Which solution did I use previously and why did I switch?

We did not have a previous solution.

How was the initial setup?

Although I was not involved in the initial setup, I understand that it is easy. In terms of the specifics of our implementation, it's sensitive information so it can not be made public. Because of the criticality, I cannot comment on configuration or how is it implemented.

Regarding the simple setup, it is because of the out-of-the-box configurations which Arbor provides you with. I don't think there is another way to implement it as such. It was per Arbor's standards, so there was nothing that was done differently.

What's my experience with pricing, setup cost, and licensing?

Pricing is average.

What other advice do I have?

Go for the latest appliances.

We do have plans to increase our usage of this type of solution, but now there are a lot of other services coming up so we are looking in parallel at other stuff, for other functionalities and features from Arbor itself.

I rate Arbor DDoS at eight out of ten. They have done a considerable amount of development in the last few years when it comes to features. However, there is a restriction when the environment is hosted in the cloud and it is on-prem, so there a challenge there: The full-fledged features don't comply with certain requirements. There are always challenges.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior Project Engineer at a tech services company with 10,001+ employees
Real User
We're able to block traffic before it gets to the firewall, but alerts on the main page can't be cleared when resolved
Pros and Cons
  • "It provides packet capture and we can block or whitelist whichever IPs we need to. Whatever traffic we want to block - and we get IPs from internal teams and from national teams - we block at the Arbor level only, because if it gets to the firewall then firewall bandwidth will be taken."
  • "On the main page there are alerts that we are unable to clear, even though the issue has been resolved."

What is our primary use case?

We have captured a profile for every production group which has a server-type configuration. We also enable signaling. If there is a huge amount of traffic, it will indicate that to us. Accordingly, we will inform them to take action or whatever. We will determine whether it is legitimate or not based on the requirements.

There is a given bandwidth for any organization, an expected amount of traffic at a given point of time. If it sees more than the traffic which we are expecting at a given point of time, it could be an anomaly. We will then check internally whether a download or upload is happening, etc. Normally, if it sees a huge amount of traffic at the same time, then automated cloud signaling will be enabled and, automatically, the traffic will be dropped.

How has it helped my organization?

There are multiple malicious IPs which are present everywhere. So, wherever the traffic comes from, it comes directly to the internet firewall, which utilizes the firewall's bandwidth, latency, etc. We block such traffic directly at the Arbor level only. 

Also, with network-level signatures, we can block things like malicious packets at the Arbor level only.

What is most valuable?

It's very user-friendly. Everything is done through a GUI. It doesn't take much time to learn how to use it. Once you see it a few times you understand it.

It provides packet capture and we can block or whitelist whichever IPs we need to. Whatever traffic we want to block - and we get IPs from internal teams and from national teams - we block at the Arbor level only, because if it gets to the firewall then firewall bandwidth will be taken.

With Arbor, every six or 12 months, we can do DDoS testing.

Also, there are HTTP connections. We can tell it there are multiple production categories which are present in a server-type configuration and we can use that. 

In very rare situations we use it to capture traffic. If there is any malicious traffic we can capture the packet where we can see the HTTP request.

What needs improvement?

On the main page there are alerts that we are unable to clear, even though the issue has been resolved.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability is very good. We have never faced an issue with it.

What do I think about the scalability of the solution?

The scalability depends on the box but we have never had any issues with that.

How is customer service and technical support?

We use technical support when there is some issue with the box or traffic and we are unable to resolve it. Our interaction with them is good. They check the issues. It usually takes them one or two days to respond. They're knowledgeable and helpful.

The last issue we contacted them on was during implementation. We connected to one of two management ports but it was not working. They told us to change the management port and when we did everything was fine.

How was the initial setup?

I did the initial setup. It's not complex. We have a default admin and password where we need to set a management IP. Once management IP is set, if we connect it through a comm port, we need to set our system IP tools in the same subnet so that we can connect to Arbor. After that, we can set up usernames, passwords, and an IP access list. We can even change the group password.

If you have some knowledge, the implementation will only take between a half-hour and an hour. The only scenario where it takes time is when we put it into inline mode; when we mount the devices into the network.

One person is enough for deployment, if they have knowledge of how to implement it. There is no need for two or three. The number of people required to maintain it depends on the automation. One person is often enough. 

What other advice do I have?

We have seven people who directly access Arbor DDoS, mostly project engineers.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
Engineer at railtel corporation of india
Real User
I like the IP location policy to control traffic based on geolocation.

What is our primary use case?

Mitigating network level volumetric attacks, complete network visibility and complete control on applying countermeasures.

What is most valuable?

  • DDoS amplification
  • Flow specs
  • Blackhole mitigation, and
  • IP location policy to control traffic based on geolocation.

What needs improvement?

Cloud signaling integration with third-party DDoS solution provider. Currently, it supports only its DDoS APS box.

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Security Advisor at a comms service provider with 10,001+ employees
Real User
Key features include Web 2.0 interactive attack alerting and traffic visualization
Pros and Cons
  • "Valuable features include simple and centralized management of user access and capabilities, as well as Web 2.0 interactive attack alerting, traffic visualization, and mitigation service control."
  • "The following areas need improvement: opening and tracking support tickets, online support resources, software upgrades/updates and replacement media, and event management guidelines."

What is our primary use case?

We use these products because of the increase in frequency and sophistication of Denial of Service and Distributed Denial of Service attacks. As a service provider, we need to control and mitigate these attacks.

What is most valuable?

Valuable features include:

  • Simple and centralized management of user access and capabilities
  • Viewing and/or configuring of status, history, account, user, AAA, DNS, and NTP settings
  • Web 2.0 interactive attack alerting, traffic visualization, and mitigation service control

What needs improvement?

The following areas need improvement:

  • Opening and tracking support tickets 
  • Online support resources
  • Software upgrades/updates and replacement media
  • Event management guidelines.

For how long have I used the solution?

More than five years.

What do I think about the stability of the solution?

The initial implementation phase was a bit tricky but after that, it worked like a charm.

What do I think about the scalability of the solution?

Provides increased performance, scalability, and availability for Peakflow SP-based managed services.

It enables 25 simultaneous users/API per non-leader device. It scales up to ten PI devices and a maximum of 125 simultaneous logins, deployment-wide.

How was the initial setup?

The setup follows a project plan based on a PIP (Performance Improvement Plan) document and the LLD. A process is created to cover site preparation, hardware staging, hardware installation, and link activation and needs the involvement of the Operations team. Deployment takes three to four months.

Our implementation strategy is as follows:

  • Assign a project manager to be onsite when needed during the implementation until signoff
  • Understand customer’s policies, requirements, and procedures
  • Discuss and agree on the general prerequisites for the proposed solutions
  • Conduct site survey
  • Site preparation for the proposed solutions
  • Design the proposed solutions
  • Provide detailed project plan for the entire assignment
  • Provide Low-Level Design
  • Delivering the proposed SW and HW to the site
  • Configure the solutions based on best practices
  • Complete integration, fine-tuning, testing, and knowledge transfer to provide templates and guidance on use of templates to team members
  • Finalize the deliverables along with the client

What about the implementation team?

We did include an SI for the deployment. Our experience with that team was excellent as they knew what they were doing.

What's my experience with pricing, setup cost, and licensing?

Pricing is slightly on the higher side.

What other advice do I have?

It's an excellent product DDoS protection against attacks.

We have more than 7,000 users at all levels of access.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Team Lead for DDoS Protection at a comms service provider with 10,001+ employees
Real User
Our customers can check how many attacks they have faced and how many have been blocked
Pros and Cons
  • "Our customers are very happy when we provide them with the interface... They can check how many attacks they have faced and how many attacks have been blocked."
  • "Because we had some routers that were somewhat old, they were not integrated with Arbor. They did not support the NetFlow version that Arbor was running. That was a challenge. We had to upgrade the routers. Some backward-compatibility would be helpful."

What is our primary use case?

We use it to protect websites, usually. But it's hosted in our network, our infrastructure, and the company websites as well. We are an ISP company and we provide internet services and other services to companies, like banks, etc. Part of our services is DDoS protection.

How has it helped my organization?

We are the ISP for government websites here in Saudi Arabia. We had a lot of attacks on those sites. The way we mitigated those attacks was by asking the people who are hosting the website about the features they were using for the websites. They specified two of the ports, and they said we're not going to allow any other port, any other service apart from these two services. We allowed the websites to be accessible through those two ports only. We blocked everything else. This was four years ago and everything has been smooth ever since.

We have a monitoring team here, which is on watch 24/7. The monitoring part is very easy with this solution.

What is most valuable?

Our customers are very happy when we provide them with the interface. We give them read-only privileges and they can review the results by themselves. They can check how many attacks they have faced and how many attacks have been blocked. That is a very valuable feature offered by Arbor DDoS.

We can also give them more privileges. They can do some tweaking according to their own systems. If they have a database running or if they have a website, they can tweak the features themselves.

What needs improvement?

Because we had some routers that were somewhat old, they were not integrated with Arbor. They did not support the NetFlow version that Arbor was running. That was a challenge. We had to upgrade the routers. Some backward-compatibility would be helpful.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

The deployment is okay, stable. But when you are manipulating the countermeasures, that is the difficult part. You have to be very careful, and you have to be sure that these countermeasures will kick in when needed, that they're going to work.

We have to customize the countermeasures for each customer. That is a real challenge. We should be reviewing them every month. They might be changing their services, they might be using different ports. We have to keep asking our customers, "Okay what are you running now? What are you using now? Which port are you running now?" so that we know what to expect. We need to know which traffic would be legit and which traffic is illegitimate so that we can block the illegitimate traffic without mistakes. We don't want to block the real traffic. There is a feature in Arbor called auto-learning. We can run that and it will help us. But at the end of the day, it's for us to decide what to allow.

You cannot rely on auto because, for example, if you're running auto-learning, and the services have been running on 80, and all of a sudden it switches to 443, it will keep on blocking. You have to expect what's coming. You cannot rely on auto. Human involvement is always necessary.

What do I think about the scalability of the solution?

If the network is expanding, of course, we would expect to need to add more equipment. We would need to expand our solution.

We had two customers from the government which came in, and they are super-important. Their services cannot go down. We had another solution from Arbor called Pravail. We had that installed for those two customers specifically. Their expected traffic is almost 8 MB, and their throughput is 12 MB. Any noise or malformed packets or out-of-sequence packets get filtered by the Pravail Solution. The bigger attacks will be handled by the TMS, the Threat Mitigation System.

Scalability is not a problem for Arbor.

How are customer service and technical support?

Technical support is really good. ATAC has been good with us. We haven't had any problem contacting them or getting them engaged in our activities. For example, sometimes we need to customize the portal banner. For that, they have been helpful.

Which solution did I use previously and why did I switch?

This is our first DDoS solution.

How was the initial setup?

The initial setup is kind of complex because it requires peering. We have to design it from scratch, which makes it a little bit complex. It depends on whether we want to get it inline or if we want to apply offloading, and whether the company can afford a TMS of its own or we need to send traffic to a remote TMS, hosted by Arbor itself.

The last deployment I was involved in took almost a month-and-a-half, with another 15 days for documentation.

It took about eight to 12 people to get the deployment operational. We had people from the core who were engaged with us for the integration and bringing up the systems. After that, we had to hire some fresh resources, because, honestly, it's a new product and it's not very common. We can't really find experienced people for DDoS.

It was not much of a challenge when we were developing it and when we were deploying it because we had a resident engineer who was planning everything, who was leading everything. But after that, when we were mitigating the attacks, there were challenges because we didn't have experienced people over here and the attacks were coming day and night, 24 /7. I had to come to the office after midnight and at midday. 

But now, the system stable and the people that I'm managing are more experienced. They know stuff and it's pretty smooth now.

What about the implementation team?

We engaged Arbor itself. We had a resident engineer from Arbor who came here and deployed the system. He was here for a month more for support and for any types of issues that we faced.

What other advice do I have?

Go for it. It's one of the best solutions you can get for DDoS. It doesn't matter what services you're going to use. As long as you have the whole solution, the TMS and everything in-house, it's the best solution.

We have a team of 12 to deploy and monitor the solution; we have three shifts running around the clock. They monitor the system alerts. They monitor the websites using the controls that we have to protect the clients. If one of them catches an attack, there is a high-alert flag and we focus on the attack to see if it has been mitigated or not. If it needs anything, if it needs some tweaking, we have two resources on each watch, a senior resource and a junior. The junior one keeps on monitoring. The senior one comes in whenever there is something to correct or if something needs to be changed in the system.

For ISPs, Arbor DDoS would be the best solution. For smaller organizations, we can buy the services from Amazon for DDoS protection, and there's Cloudflare. But for ISPs, it's better to have Arbor DDoS because we have everything in-house. ISPs like ours have almost 120 gig bandwidth. For throughput, it's the best one.

We don't have plans to increase usage currently because when we brought the solution four years ago, we measured it a lot. We bought more than what we needed. The plan is to improve the human operability on the system itself. Things look smooth, but you cannot rely on two or three people. We have to have redundancy in the human workforce. We're planning to expand the team so that we don't need to hire any fresh resources and train them from the start. These services are very expensive and our customers are expecting a perfect solution.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
Security Consultant at a tech services company with 10,001+ employees
Real User
We're able to develop threshold values for clients' servers to help flag suspicious traffic
Pros and Cons
  • "There are a number of valuable features in this product, like Cloud Signaling and Threat Intelligence feeds."
  • "Sometimes it blocks legitimate traffic. If a legitimate user is trying to access the server continuously, the product suspects that this is a DoS traffic file. That is a case where it needs to improve. It needs machine-learning."

What is our primary use case?

Our primary use case is developing threshold values for all groups. We use it to analyze packets to build a use-case for when a server group hits the limit of incoming traffic. In such a case we suspect traffic.

We use it to build use-case scenarios, based on the server input and a client's requirements. Some clients have a number of users accessing a given server which affects the bandwidth. In each case, we need to tell DDoS what is considered legitimate traffic.

How has it helped my organization?

It prevents all unwanted or malicious traffic, using the Threat Intelligence feeds.

What is most valuable?

There are a number of valuable features in this product, like Cloud Signaling and Threat Intelligence feeds.

There are two modes in the product: The first is a learning mode and the other is a production mode. First, we learn the traffic using the learning mode. We use it to fine-tune what is suspicious data and what is legitimate traffic.

What needs improvement?

Sometimes it blocks legitimate traffic. If a legitimate user is trying to access the server continuously, the product suspects that this is a DoS traffic file. That is a case where it needs to improve. It needs machine-learning. Self-learning would be an improvement.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability of Arbor DDoS is good. It's not that complex as a product and stability is not an issue.

What do I think about the scalability of the solution?

The scalability is good. Configuration-wise, an administrator could create issues. But the product itself is good.

I have implemented it multiple times in industries like oil and gas, banking, and insurance.

How is customer service and technical support?

The response from Arbor's technical support is good. They respond within two days.

How was the initial setup?

The initial setup is straightforward. It's very simple. I have deployed the product for multiple clients. Implementation takes less than three to four hours, but the fine-tuning takes some time, based on the organization's needs. That can take more than a month.

Our implementation strategy is based on how many servers and groups there are and what kind of traffic is coming to/from the internet. These are the factors that affect how we deploy it. Deployment requires two to three consultants who are security architects. For maintenance, one administrator is fine.

What's my experience with pricing, setup cost, and licensing?

Licensing is based on features, I believe.

What other advice do I have?

Implementation is very easy but making the product work optimally is more difficult.

It's the best product. I would rate it at eight out of ten. There are some minor issues with blocking legitimate traffic and that's why it's not a ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
Buyer's Guide
Download our free Arbor DDoS Report and get advice and tips from experienced pros sharing their opinions.
Updated: July 2025
Buyer's Guide
Download our free Arbor DDoS Report and get advice and tips from experienced pros sharing their opinions.