It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

RADAR™ Reviews & Product Details

Profile Status

This profile is currently managed by RADAR™ but has limited features.

Are you part of the RADAR™ team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used RADAR™ before?

Answer a few questions to help the RADAR™ community

RADAR™ Reviews (2)

Reviews

RADAR™ Reviews (2)

4.3
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Shefali K.
SK
Senior Operations Analyst
Small-Business (50 or fewer emp.)
"Efficient solution to DDoS attacks."
What do you like best about RADAR™?

1. Reduces DDoS risk from 48% to 2% ongoing, real-time, 24/7.

2. Works with any DDoS Mitigation posture to eliminate DDoS vulnerabilities.

3. Ensures that existing DDoS Mitigation is correctly configured with the underlying network to eliminate open attack surface exposure.

4. Easy to add a device that doesn't need any integration and can autonomously start working with DDoS Mitigation.

5. Robust reporting that gives a holistic view of DDoS Vulnerabilities across the locations/data centers and shows week-by-week improvement in risk mitigation

6. Work round the clock 24/7 and covers the entire network surface. Review collected by and hosted on G2.com.

What do you dislike about RADAR™?

1.DDoS Radar does not offer an API.

2. Implementation Cost is on the higher side.

3. Might need to work on the customer support channel so that one can reach out to the Review collected by and hosted on G2.com.

JK
Client Operations
Small-Business (50 or fewer emp.)
"Groundbreaking tech that offers Proactive Mitigation Intelligence to eliminate DDoS vulns."
What do you like best about RADAR™?

The GUI is nice and easy to use. Very intuitive. Review collected by and hosted on G2.com.

What do you dislike about RADAR™?

Implementation across all areas of the network takes a little research on your part. Review collected by and hosted on G2.com.

There are not enough reviews of RADAR™ for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Scrut Automation Logo
Scrut Automation
4.9
(1,299)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
2
HAProxy Logo
HAProxy
4.7
(826)
HAProxy is an open-source software load balancer and reverse proxy for TCP, QUIC, and HTTP-based applications. It provides high availability, load balancing, and best-in-class SSL processing. HAProxy One is an application delivery and security platform that combines the HAProxy core with enterprise-grade security layers, management and orchestration, cloud-native integration, and more. Platform components: HAProxy Enterprise: a flexible data plane layer for TCP, UDP, QUIC, and HTTP-based applications that provides high-performance load balancing, high availability, an API/AI gateway, container networking, SSL processing, DDoS protection, bot detection and mitigation, global rate limiting, and a web application firewall (WAF). HAProxy Fusion: a scalable control plane that provides full-lifecycle management, observability, and automation of multi-cluster, multi-cloud, and multi-team HAProxy Enterprise deployments, with infrastructure integration for AWS, Kubernetes, Consul, and Prometheus. HAProxy Edge: a globally distributed application delivery network that provides fully managed application delivery and security services, a secure partition between external traffic and origin networks, and threat intelligence enhanced by machine learning that powers the security layers in HAProxy Fusion and HAProxy Enterprise. Learn more at HAProxy.com.
3
Wiz Logo
Wiz
4.7
(772)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
4
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(594)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
5
Tenable Nessus Logo
Tenable Nessus
4.5
(301)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
6
vPenTest Logo
vPenTest
4.6
(229)
vPenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge, methodologies, techniques, and commonly used tools of multiple consultants into a single platform that consistently exceeds expectations of a penetration test. By developing our proprietary framework that continuously grows based on our research & development, we’re able to modernize the way penetration tests are conducted.
7
Recorded Future Logo
Recorded Future
4.6
(220)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
8
Picus Security Logo
Picus Security
4.8
(218)
Picus Security is the pioneer of Breach and Attack Simulation (BAS) and Adversarial Exposure Validation (AEV). The Picus Security Validation Platform unifies exposure assessment, security control validation, and exposure validation to help organizations continuously measure and reduce real cyber risk.
9
DataDome Logo
DataDome
4.8
(209)
Real-Time Bot Protection The #1 bot protection solution for e-commerce and classified ads businesses - Deploys in minutes on any web infrastructure - Unmatched bot detection speed and accuracy - Dedicated threat research and SOC teams
10
Intruder Logo
Intruder
4.8
(206)
Intruder is a proactive security monitoring platform for internet-facing systems.
Show More
People Icons

Start a Discussion about RADAR™

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
RADAR™