Market Landscape
The DDoS Protection
Landscape in 2026
Three categories of tools. Three different approaches. Most teams only have one. Flowtriq bridges detection and mitigation in a single platform.
Three Market Segments
Different tools solve different problems
The DDoS market has three distinct layers. Most organizations deploy one. The best-protected deploy all three.
Absorb & Filter
Route traffic through a global proxy network that absorbs volumetric floods before they reach your origin. Measured in Tbps capacity.
Strengths
- Absorb multi-Tbps volumetric floods
- Global anycast: attack diffused across PoPs
- Always-on, zero infrastructure to manage
Gaps
- Blind to traffic that never touches the proxy
- Limited forensics, no raw PCAP
- No visibility into what hits your origin directly
- Expensive at scale ($3K–$40K+/mo)
Inspect & Block
On-premise appliances at the network edge that inspect traffic at line rate using ASICs and FPGAs. Measured in Mpps throughput.
Strengths
- Wire-speed inspection with no added latency
- Deep packet inspection for protocol anomalies
- Full control over mitigation policies
Gaps
- Capacity ceiling: can't absorb volumetric floods
- 6–7 figure CAPEX + maintenance contracts
- Alert fatigue from raw flow data, limited classification
- No cloud visibility, blind to hybrid infra
Detect, Classify & Mitigate
Agent-based platforms that detect attacks per-server, classify attack types, auto-deploy BGP mitigation rules, trigger cloud scrubbing, and capture forensic evidence. Measured in detection-to-mitigation latency.
Strengths
- Sees what actually hits your servers, even behind proxies
- Rich forensics: PCAP capture, attack classification, source profiling
- Auto-mitigation via BGP FlowSpec, RTBH, and cloud scrubbing
- Lightweight: no DNS/routing changes, deploys in minutes
- 4-level escalation: rate-limit → FlowSpec → RTBH → cloud scrub
Gaps
- Doesn't absorb volumetric floods inline (triggers upstream scrubbing instead)
- Requires BGP adapter or cloud provider API for network-level mitigation
Side-by-Side Comparison
Feature matrix across categories
No single tool does everything. See where each category excels, and where it needs help.
| Capability | Cloud Scrubbers | HW Appliances | Flowtriq |
|---|---|---|---|
| Detection | |||
| Volumetric flood absorption | ✓ Tbps | ~ limited | ✗ |
| Detection latency | 5–60s | 1–10s | ≤ 1 second |
| Per-server visibility | ✗ | partial | ✓ every node |
| Protocol-level classification | basic | ✓ DPI | ✓ 8 families |
| Confidence scoring | ✗ | ✗ | ✓ 0–100% |
| IP spoofing detection | ✗ | some | ✓ TTL analysis |
| Dynamic baselines (auto-tune) | some | some | ✓ per node |
| Response & Mitigation | |||
| Inline traffic filtering | ✓ | ✓ | via BGP/cloud |
| Auto-mitigation rules | WAF rules | ✓ ACLs | ✓ 22 action types |
| iptables / nftables rules | ✗ | ✗ | ✓ auto |
| Cloudflare WAF integration | ✓ native | ✗ | ✓ API |
| BGP FlowSpec / RTBH | ✓ | ✓ | ✓ auto-escalation |
| Cloud scrubbing trigger | ✓ native | ✗ | ✓ CF, OVH, Hetzner |
| Forensics & Visibility | |||
| PCAP capture | ✗ | expensive add-on | ✓ included |
| Pre-attack packet buffer | ✗ | ✗ | ✓ 1000-pkt ring |
| Source IP profiling | sampled | ✓ | ✓ full |
| Threat intel enrichment | some | ✓ ATLAS | ✓ IOC + feeds |
| Historical analytics | limited | limited | ✓ dashboard |
| Alerting & Integration | |||
| Multi-channel alerts | email + SNMP | ✓ 7+ channels | |
| Discord / Slack rich embeds | ✗ | ✗ | ✓ |
| PagerDuty / OpsGenie | basic | SNMP trap | ✓ native |
| Escalation policies | ✗ | ✗ | ✓ |
| Public status pages | ✗ | ✗ | ✓ |
| Operations | |||
| Deploy time | hours–days | weeks | 5 minutes |
| DNS/routing changes required | yes | yes | ✗ none |
| Works behind existing CDN/proxy | conflicts | separate | ✓ |
| Typical cost | $3K–$40K+/mo | $50K–$500K+ CAPEX | $9.99/node/mo |
Where Flowtriq Fits
Detection and mitigation in a single platform
Cloud scrubbers absorb floods. Hardware appliances filter at the edge. But neither gives you per-server detection, automatic escalation, or forensic evidence. Flowtriq does all three.
Flowtriq detects attacks per-server in under 1 second, then automatically deploys mitigation, from local rate-limiting all the way up to cloud scrubbing, based on escalation policies you define.
- Install a lightweight agent on each server in 5 minutes
- 1-second detection with 8-family classification and IOC matching
- Auto-deploy BGP FlowSpec rate-limits and RTBH blackholes via ExaBGP or GoBGP
- Trigger cloud scrubbing (Cloudflare Magic Transit, OVH VAC, Hetzner)
- 4-level escalation: local → FlowSpec → RTBH → cloud scrub
- Capture full PCAP evidence, including 1,000-packet pre-attack buffer
- Route alerts to Discord, Slack, PagerDuty, or any webhook
Common Questions
We already have DDoS protection
Great. Flowtriq makes it better. Here's how it works with what you already have.
pip install ftagent. No DNS changes, no BGP updates, no proxy configuration. It runs alongside your existing stack and reports to the Flowtriq dashboard. Deploy in 5 minutes, works immediately behind any CDN, load balancer, or appliance.Get Started
Add detection and mitigation to your stack in 5 minutes
Flowtriq works standalone or alongside Cloudflare, AWS Shield, Arbor, and other tools. Deploy the agent, configure your BGP adapters or cloud scrubbing, and get full detect-to-mitigate coverage. No DNS changes, no rip-and-replace.