Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated CenturyLink DDoS Mitigation and Application Security Alternatives

CenturyLink DDoS Mitigation and Application Security Reviews & Product Details

Verified User in Alternative Medicine
UA
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about CenturyLink DDoS Mitigation and Application Security?

It is easy to use! It was great at protecting against attacks. Review collected by and hosted on G2.com.

What do you dislike about CenturyLink DDoS Mitigation and Application Security?

The setup could be more streamlined and customer service could be improved. Review collected by and hosted on G2.com.

What problems is CenturyLink DDoS Mitigation and Application Security solving and how is that benefiting you?

It was great at protecting against DDoS attacks. Review collected by and hosted on G2.com.

CenturyLink DDoS Mitigation and Application Security Overview

What is CenturyLink DDoS Mitigation and Application Security?

Safeguard your network, website and cloud applications while simplifying operations with CenturyLink DDoS Mitigation Services -- network-based, carrier-agnostic service that provides DDoS mitigation with a single point of contact for quickly identifying and mitigating the latest threats. "With CenturyLink® DDoS Mitigation network security services you get layers of defense and visibility through enhanced network routing, rate limiting and filtering, and advanced network-based detection powered by our mitigation scrubbing center solutions. Safeguard your network, website and cloud applications while simplifying operations with our network-based, carrier-agnostic service that provides DDoS mitigation with a single point of contact for quickly identifying and mitigating the latest threats. • Scalable Attack Ingestion Capacity • Multi-Layered Attack Protection • Carrier-Agnostic Protection and Detection • Global Footprint and Network Depth • Proven Attack Traffic Visibility"

CenturyLink DDoS Mitigation and Application Security Details
Languages Supported
English, Spanish
Show LessShow More
Product Description

Safeguard your network, website and cloud applications while simplifying operations with CenturyLink DDoS Mitigation Services -- network-based, carrier-agnostic service that provides DDoS mitigation with a single point of contact for quickly identifying and mitigating the latest threats.


Seller Details
Year Founded
1930
HQ Location
Monroe, LA
Twitter
@lumentechco
8,042 Twitter followers
LinkedIn® Page
www.linkedin.com
49,772 employees on LinkedIn®
Ownership
NYSE:LUMN
Phone
-1951

Scott M.
SM
Overview Provided by:
Senior Manager of Marketing at Lumen

Recent CenturyLink DDoS Mitigation and Application Security Reviews

Verified User
U
Verified UserSmall-Business (50 or fewer emp.)
4.5 out of 5
"It was a great tool to strengthen our bandwidth capabilities."
It is easy to use! It was great at protecting against attacks.
Jonny J.
JJ
Jonny J.Small-Business (50 or fewer emp.)
5.0 out of 5
"Century Link Mitigation and Application Security"
I appreciate that Century Link is helpful in applying my everyday tasks.
Verified User
U
Verified UserEnterprise (> 1000 emp.)
4.5 out of 5
"Awesome DDoS mitigation application"
It's ability to process wide range of customers and end users personal data, which helps to protect the systems from DDoS attacks.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

CenturyLink DDoS Mitigation and Application Security Media

Answer a few questions to help the CenturyLink DDoS Mitigation and Application Security community
Have you used CenturyLink DDoS Mitigation and Application Security before?
Yes

2 out of 3 Total Reviews for CenturyLink DDoS Mitigation and Application Security

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Jonny J.
JJ
Leasing and Marketing Manager
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about CenturyLink DDoS Mitigation and Application Security?

I appreciate that Century Link is helpful in applying my everyday tasks. Review collected by and hosted on G2.com.

What do you dislike about CenturyLink DDoS Mitigation and Application Security?

I dislike that their systems are sometimes filled with bugs and slow. Review collected by and hosted on G2.com.

What problems is CenturyLink DDoS Mitigation and Application Security solving and how is that benefiting you?

They keep our electronics secure from online viruses. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
UI
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about CenturyLink DDoS Mitigation and Application Security?

It's ability to process wide range of customers and end users personal data, which helps to protect the systems from DDoS attacks. Review collected by and hosted on G2.com.

What do you dislike about CenturyLink DDoS Mitigation and Application Security?

Outage of services lead to threats as it is a Software as a service, if the offer on premise solution that will be even goood. Review collected by and hosted on G2.com.

What problems is CenturyLink DDoS Mitigation and Application Security solving and how is that benefiting you?

DDoS threat analysis and mitigate the risk on time with real-time analysis of customer and end user traffic data. Review collected by and hosted on G2.com.

There are not enough reviews of CenturyLink DDoS Mitigation and Application Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
HAProxy Logo
HAProxy
4.6
(382)
HAProxy allows customers to take full advantage of HAProxy, a world renowned load balancer, and software application delivery controller, combined with enterprise-class features, services, and premium support.
3
DataDome Logo
DataDome
4.8
(174)
Real-Time Bot Protection The #1 bot protection solution for e-commerce and classified ads businesses - Deploys in minutes on any web infrastructure - Unmatched bot detection speed and accuracy - Dedicated threat research and SOC teams
4
F5 NGINX Logo
F5 NGINX
4.6
(107)
free, open-source, high-performance HTTP server and reverse proxy
5
Webroot DNS Protection Logo
Webroot DNS Protection
4.4
(86)
Webroot SecureAnywhere DNS Protection offers a quick, straightforward, and highly effective way to secure the DNS protocol connection against compromise. With advanced reporting and 82 URL categories, admins gain greater visibility than ever, reduce risk, and can tailor usage policies to their organization's unique needs.
6
Imperva App Protect Logo
Imperva App Protect
4.1
(80)
Incapsula is a cloud-based security and acceleration service that makes websites safer, faster, and more reliable.
7
Kaspersky DDoS Protection Logo
Kaspersky DDoS Protection
4.3
(34)
Keep your business running smoothly.
8
Radware DefensePro Logo
Radware DefensePro
4.6
(34)
DefensePro provides automated DDoS protection from fast-moving, high-volume, encrypted or very-short-duration threats and is part of Radware’s attack mitigation solution. It defends against IoT-based, Burst, DNS and TLS/SSL attacks to secure organizations against emerging network multivector attacks, ransom DDoS campaigns, IoT botnets, phantom floods, and other types of cyberattacks. DefensePro leverages patented behavior-based detection technology enables organizations to accurately detect attacks in real time while minimizing false positives. Attack signatures can be automatically generated to accurately protect from zero-day and unknown attacks. Product video URL - https://www.youtube.com/watch?v=ykhdjGfQ9L4
9
Reblaze Logo
Reblaze
4.7
(30)
Reblaze integrates seamlessly (including cache & SSL management, analytics, and security) with virtually every CDN provider. Or use its full out-of-the-box CDN solution.
10
Google Cloud Armor Logo
Google Cloud Armor
4.1
(26)
Google Cloud Armor delivers defense at scale against infrastructure and application Distributed Denial of Service (DDoS) attacks using Google's global infrastructure and security systems.
Show More