Prolexic Overview

Prolexic, now part of Akamai Technologies, is a globally recognized, cloud-based DDoS protection service. It is engineered to stop the largest and most complex DDoS attacks, mitigating risk and securing network traffic against not only DDoS but also associated threats like ransomware. The service reroutes traffic through its scrubbing centers, where malicious packets are identified and filtered out, allowing legitimate traffic to flow unimpeded to the customer's network, thus ensuring business continuity.
Prolexic is targeted at large enterprises, government agencies, and financial institutions that are high-profile targets for devastating DDoS attacks. It is ideal for organizations with critical online services that cannot afford any downtime and require a dedicated, always-on defense backed by a Security Operations Center (SOC).
As a pioneer in the DDoS mitigation space, Prolexic offers enterprise-grade protection with a proven history of defending against the most severe attacks. Its integration with Akamai's platform enhances its capabilities, making it a premier choice for organizations where network availability is non-negotiable.
Prolexic Details
Prolexic Platforms supported
Cloud, SaaS, Web-Based
Desktop Chromebook
Desktop Linux
Desktop Mac
Desktop Windows
Mobile Android
Mobile iPad
Mobile iPhone
On-Premise Linux
On-Premise Windows
Prolexic Support options
Prolexic Training options
Prolexic Typical customers
Freelancers
Small Businesses
Small to Mid size businesses
Mid size businesses
Mid to Large size enterprises
Large enterprises
Very Large enterprises
Prolexic Features
Most valued Prolexic features by users
Top Prolexic Alternatives & Competitors

DataDome is a specialized, real-time bot protection solution offered as a fully managed SaaS platform. It is engineered to defend websites, mobile apps, and APIs from automated threats like credential stuffing, inventory... Read More

AppTrana, by Indusface, is a comprehensive application security suite designed to provide continuous protection for web and mobile applications. It combines the power of automated vulnerability scanning with the critical... Read More