SHARE
Facebook X Pinterest WhatsApp

Neustar SiteProtect NG: DDoS Protection Overview and Analysis

  See our complete list of top DDoS vendors. Company Description For over 20 years, Neustar has offered performance monitoring, managed DNS and distributed denial of service (DDoS) defense solutions. Originally part of Lockheed Martin, it divested in 1999 and is now privately held. Product Description Neustar SiteProtect NG offers both on-premises and cloud options. […]

Written By
thumbnail Drew Robb
Drew Robb
Apr 3, 2018
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

 

See our complete list of top DDoS vendors.

Company Description

For over 20 years, Neustar has offered performance monitoring, managed DNS and distributed denial of service (DDoS) defense solutions. Originally part of Lockheed Martin, it divested in 1999 and is now privately held.

Product Description

Neustar SiteProtect NG offers both on-premises and cloud options. With 4 Tbps of capacity (increasing to 10 Tbps over the next few months), its cloud-based DDoS protection service scrubs malicious traffic to defuse large and complex attacks. It can put countermeasures in place to limit exposure, protect a site’s uptime and preserve a brand’s reputation. Neustar provides automated mitigation across multiple attack vectors. It recently launched an integrated Web application firewall (WAF) solution that works in tandem with its cloud DDoS mitigation.

“Research shows cybercriminals have adapted their attack strategies and are now executing more targeted strikes on a brand’s entire network by taunting defenses and probing network vulnerabilities,” said Nicolai Bezsonoff, vice president and general manager, Neustar Security Solutions.

Markets and Use Cases

Financial services, technology, large ecommerce, retail, utilities, gaming

Metrics

Neustar is currently capable of absorbing and defending attacks of greater than 4 Tbps. By year’s end it will grow that number to 8 Tbps, and 10 Tbps by Q1 of 2019. Its average time to mitigate is under 90 seconds.

Intelligence

Neustar’s security operations center (SOC) utilizes a combination of threat analytics based on its DNS footprint (10 percent of authoritative DNS passes through Neustar), plus external threat feeds. It also monitors hacker forums/IRCs, social media and other intelligence sources to maintain awareness of developing threats. Its SOC makes use of real-time packet capture and deep packet inspection to spot anomalous trends and craft very granular mitigations to drop only the undesirable traffic.

Delivery

Cloud-based with on-premises hardware options that can also provide hybrid DDoS protection and a web application firewall in its always-on (always routed or always proxied) configurations.

Agents

No agents used.

Pricing

Neustar offers pricing based on the level of risk rather than the traditional pay-per attack.

thumbnail Drew Robb

Originally from Scotland, Drew Robb has been a writer for more than 25 years. He lives in Florida and specializes in IT, engineering, and business. As well as eWeek and TechRepublic, he writes for a wide range of magazines including Gas Turbine World, SDxCentral, and HR Magazine. He is the author of Server Disk Management in a Windows Environment (Auerbach Publications).

Recommended for you...

Proxy vs VPN: Which One Do You Really Need?
Matt Gonzales
Sep 24, 2025
5 AWS Security Tools Every Team Should Know
Matt Gonzales
Sep 24, 2025
The 6 Best Email Security Software & Solutions (Compared and Reviewed)
Matt Gonzales
Sep 24, 2025
5 Best Free VPNs You Can Trust (And the Premium Trials Worth Trying)
Matt Gonzales
Sep 4, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.