
Arbor Threat Mitigation System
DDoS protection software
Web security software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if Arbor Threat Mitigation System and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Energy and utilities
- Banking and insurance
- Transportation and logistics
What is Arbor Threat Mitigation System
Arbor Threat Mitigation System (TMS) is an on-premises DDoS mitigation appliance/software used to detect and mitigate volumetric and protocol-based denial-of-service attacks. It is typically deployed by internet service providers, hosting providers, and large enterprises that need in-network “scrubbing” and traffic engineering during attacks. The product integrates with upstream routing (for example, via BGP) to divert suspicious traffic for inspection and filtering, and it commonly operates alongside network visibility/analytics components in the same vendor ecosystem.
Purpose-built DDoS scrubbing
The product is designed specifically for high-volume DDoS mitigation rather than general web application security. It supports in-line or diverted-traffic mitigation workflows that are common in carrier and large-enterprise networks. This makes it suitable for scenarios where organizations need to keep mitigation within their own infrastructure rather than relying only on an external service.
Network routing integration options
Arbor TMS is commonly used with routing-based diversion approaches (such as BGP) to steer attack traffic to a mitigation device. This fits operational models used by service providers and large networks that already manage complex routing policies. It can reduce dependency on application-layer changes because mitigation occurs at the network edge or scrubbing point.
Fits ISP and large enterprise ops
The product aligns with operational requirements seen in ISPs and large enterprises, including centralized mitigation points and integration with network monitoring workflows. It is often deployed as part of a broader DDoS detection-and-mitigation stack, enabling separation of detection/visibility and mitigation functions. This architecture can help teams scale mitigation capacity independently from analytics tooling.
Less focused on WAF features
Although it can contribute to web security by mitigating denial-of-service traffic, it is not primarily a web application firewall or application security platform. Organizations needing bot management, API protection, or application-layer rule management may require additional products. Buyers should validate coverage for Layer 7 attack types and web-specific controls against their requirements.
Operational complexity and tuning
Routing-based diversion and in-network scrubbing typically require coordination across network engineering, security operations, and change management. Misconfiguration can affect traffic flows, especially during mitigation events. Ongoing tuning and runbooks are usually necessary to maintain effective mitigation while minimizing false positives.
On-prem capacity planning required
As an on-premises mitigation system, it requires sizing, procurement, and lifecycle management to match expected attack volumes and growth. Scaling may involve adding appliances or upgrading capacity rather than elastically scaling on demand. Organizations without data-center footprint or with highly distributed traffic may find a cloud-delivered approach operationally simpler.
Seller details
NETSCOUT Systems, Inc.
Westford, Massachusetts, USA
1984
Public
https://www.netscout.com/
https://x.com/NETSCOUT
https://www.linkedin.com/company/netscout/