Back to Blog

Understanding the Two Architectures

Akamai Prolexic and Flowtriq approach DDoS protection from opposite ends of the network path. Prolexic operates at the routing level — it reroutes your traffic through Akamai's global scrubbing centers using BGP announcements, cleans the traffic, and delivers only legitimate packets to your infrastructure. Flowtriq operates at the server level — it monitors traffic arriving at each server's network interface, detects anomalies, classifies attacks, and provides forensic data and real-time alerts.

This distinction is architectural, not qualitative. A traffic scrubber and a detection agent solve different problems. Prolexic's job is to absorb and filter. Flowtriq's job is to observe and report. Comparing them as competitors misses the point — they are complementary layers in a defense-in-depth strategy.

That said, there are meaningful differences in what data each product provides, what infrastructure each protects, and what each costs. Those differences matter when you are deciding how to allocate your security budget.

Akamai Prolexic: What It Is and What It Does Well

Prolexic is Akamai's dedicated DDoS mitigation platform, operating 36 scrubbing centers worldwide with over 20 Tbps of dedicated scrubbing capacity. It has been in operation since 2003 (originally as an independent company before Akamai acquired it in 2013) and protects some of the largest banks, government agencies, and enterprises on the internet.

The core architecture works like this: when an attack is detected (or in always-on mode), your IP prefixes are announced via BGP through Akamai's network. All traffic destined for your IP ranges is routed through the nearest Prolexic scrubbing center. Akamai's systems inspect the traffic, apply mitigation rules — including behavioral analysis, rate limiting, protocol validation, and custom filtering rules — and forward clean traffic to your origin through GRE tunnels or direct interconnects.

Prolexic's strengths are substantial:

  • Massive scrubbing capacity: 20+ Tbps of dedicated DDoS scrubbing bandwidth across 36 global locations. This is purpose-built scrubbing infrastructure, not shared CDN capacity.
  • Protocol agnostic: Because Prolexic operates at the IP/BGP level, it protects all protocols — HTTP, HTTPS, UDP, TCP, DNS, gaming, VoIP, and anything else running on your IP prefixes. This is a significant advantage over reverse-proxy solutions that only handle HTTP.
  • SOCC support: Akamai's Security Operations Command Center provides 24/7 managed mitigation with human analysts who can tune rules during active attacks. This hands-on support is rare in the industry.
  • Sub-second detection: Prolexic's always-on mode detects and begins mitigating attacks within seconds, with zero-second diversion since traffic is already flowing through scrubbing infrastructure.
  • Hybrid defense with App & API Protector: For organizations using Akamai's CDN, Prolexic integrates with their L7 application security products for full-stack protection.
  • SLA guarantees: Uptime and mitigation SLAs with financial backing, important for enterprises with availability requirements tied to revenue or regulatory compliance.

Prolexic is the product that defined the commercial DDoS scrubbing market. Its engineering depth, operational maturity, and scrubbing capacity are genuinely world-class. This comparison is not about questioning that — it is about understanding what happens after the scrubbing is done.

What Prolexic Does Not Provide

Prolexic is built to scrub traffic, not to provide granular per-server detection data. This is an engineering trade-off, not a deficiency — but it creates gaps that matter for certain operational needs.

No Per-Server Visibility

Prolexic operates on IP prefixes, typically /24 or larger. Its monitoring and reporting are at the prefix level, not the individual server level. If you have 40 servers behind a /24, Prolexic sees the aggregate traffic across the entire prefix. It does not tell you which specific server is being targeted, what traffic each individual server is receiving, or how an attack is distributed across your infrastructure. For a 40-server deployment, knowing "your /24 is under attack" is very different from knowing "server 17 in rack 4 is taking 380,000 PPS on port 27015."

No PCAP Forensics

Prolexic does not provide downloadable PCAP files of attack traffic. Their post-attack reports include aggregate statistics — attack vectors detected, peak bandwidth, duration, mitigation actions taken — but not raw packet captures. For incident response teams that need to analyze exact packet contents, extract payload signatures, identify specific amplification vectors, or provide packet-level evidence to law enforcement or upstream providers, the lack of PCAP data is a meaningful gap.

Limited Real-Time Alerting Channels

Prolexic's alerting is primarily through their portal and email notifications, supplemented by SOCC phone calls during major events. It does not natively integrate with modern operational communication tools like Discord, Slack, PagerDuty, or OpsGenie. For operations teams that live in Slack or use PagerDuty as their incident management backbone, the alerting integration gap requires custom middleware or manual bridging.

Does Not Cover Post-Scrub Leakage

No scrubbing center achieves 100% filtration on every attack type. Sophisticated application-layer attacks, low-and-slow attacks, or novel attack vectors may partially pass through the scrubbing pipeline and reach your origin servers. Prolexic's job ends when it forwards "clean" traffic. It does not monitor what your servers actually experience on the receiving end.

What Flowtriq Provides

Flowtriq fills the gaps that exist after the scrubbing is done. It runs on each server as a lightweight agent, monitoring the traffic that actually arrives at the network interface — whether that traffic was scrubbed by Prolexic, arrived directly, or came through any other network path.

  • Per-server detection: Each server reports independently. A Flowtriq deployment across 40 servers gives you 40 independent detection points, each monitoring its own traffic patterns, baselines, and anomalies. You know exactly which server is being targeted and how much traffic each one is receiving.
  • Attack classification with confidence scoring: SYN flood, UDP flood, DNS amplification, NTP amplification, ICMP flood, HTTP flood, TCP ACK flood, and multi-vector combinations — classified automatically with a confidence percentage.
  • PCAP capture: The first 60 seconds of every detected attack are captured as a downloadable PCAP file. This is the forensic data that Prolexic's post-attack reports lack.
  • Per-second time series: Peak PPS and Mbps metrics with per-second granularity for the full duration of every incident. Not 5-minute averages, not aggregate estimates — second-by-second data.
  • Source IP analysis: Top source IPs, source AS numbers, source country distribution, and source diversity scoring for every incident.
  • Multi-channel alerting: Discord, Slack, email, SMS, PagerDuty, OpsGenie, and custom webhooks — all with sub-5-second alert latency from detection to delivery.

Per-server detection for every node in your fleet

Flowtriq gives you the server-level visibility that scrubbing centers cannot provide. Attack classification, PCAP forensics, and instant alerts. 7-day free trial.

Start Free Trial →

Side-by-Side: Same Attack, Different Data

Scenario: a 240-second multi-vector attack combining a 650 Gbps UDP flood with a slower 45,000 RPS HTTP POST flood targeting a specific API endpoint on one of your 30 servers.

Akamai Prolexic: The volumetric UDP flood is detected and mitigated within seconds at the scrubbing center. The post-attack report shows: attack duration 240 seconds, peak bandwidth 650 Gbps, primary vector UDP flood with secondary HTTP flood component, mitigation actions applied. The report does not identify which of your 30 servers was the HTTP flood target, does not include per-server traffic metrics, and does not include a PCAP download. The HTTP POST flood may have partially passed through the scrubbing pipeline because it used valid HTTP semantics and low request rates from distributed sources.

Flowtriq: Server 14 fires an alert at second 2. Incident record shows: multi-vector attack (confidence 94%), residual UDP at 12,400 PPS (post-scrub leakage) plus HTTP flood at 1,230 requests/second, duration 240 seconds, 2,891 unique source IPs across 67 ASNs, target ports 443 (HTTP) and 53 (residual UDP), peak combined PPS 18,200 at 09:41:12 UTC. 60-second PCAP available. Other 29 servers show normal baselines. Alerts sent to Slack and PagerDuty at second 3, including the specific server hostname, attack type, and severity.

Notice what happened: Prolexic handled the volumetric component brilliantly — absorbing 650 Gbps of UDP flood that would have destroyed any server. But the HTTP POST flood partially passed through, and without server-level monitoring, the team would not have known which server was targeted or captured the forensic data needed to build application-layer filtering rules. Flowtriq provided the server-level detail that Prolexic's architecture cannot.

Pricing Comparison

This is where the comparison gets stark. Prolexic is an enterprise product with enterprise pricing. Flowtriq is a per-node product with straightforward pricing.

Akamai Prolexic pricing:

  • Custom pricing based on protected IP prefixes, clean traffic bandwidth, and contract terms
  • Industry estimates range from $10,000 to $50,000+ per month depending on deployment size, bandwidth commitments, and included SOCC hours
  • Annual contracts are standard, with multi-year discounts available
  • Additional costs may apply for always-on mode (vs. on-demand), additional scrubbing centers, and premium SOCC engagement tiers

Flowtriq pricing:

  • $9.99/node/month on monthly billing
  • $7.99/node/month on annual billing ($95.88/node/year)
  • A 30-node deployment: $299.70/month (monthly) or $239.70/month (annual)
  • 7-day free trial on all plans

These products are not in the same pricing category, and that is because they are not solving the same problem. Prolexic's cost reflects massive infrastructure — 36 scrubbing centers, 20+ Tbps capacity, 24/7 SOCC staffing, BGP peering at hundreds of locations. That infrastructure has real operational costs. Flowtriq's cost reflects a lightweight software agent that runs on hardware you already own.

The practical question for Prolexic customers is not "should I replace Prolexic with Flowtriq?" — you should not, because Flowtriq does not scrub traffic. The question is "what does it cost to add server-level detection to my existing Prolexic deployment?" And the answer is typically less than 3% of what you are already paying Akamai.

Hybrid Deployment: Running Prolexic + Flowtriq

For enterprises running Prolexic, adding Flowtriq creates a two-layer detection architecture:

Layer 1 — Prolexic (upstream scrubbing):

  • Absorbs volumetric attacks at the BGP routing level before they reach your network
  • Applies protocol validation and behavioral filtering at the scrubbing center
  • SOCC provides managed mitigation with human expertise during complex attacks
  • Protects all protocols across entire IP prefixes

Layer 2 — Flowtriq (server-level detection):

  • Detects any attack traffic that passes through the scrubbing pipeline — no scrubber is 100% effective on all attack types
  • Provides per-server granularity that prefix-level monitoring cannot
  • Captures PCAP forensics for every detected incident
  • Sends real-time alerts through operational channels (Slack, Discord, PagerDuty)
  • Monitors traffic from any source — not just traffic that passed through Prolexic
  • Serves as an independent verification layer: you can confirm Prolexic is working by observing clean traffic baselines at the server level

This second point is often overlooked. When you pay $15,000/month for scrubbing, you want independent verification that it is working. Flowtriq gives you that verification — if your servers show clean baselines during an attack that Prolexic is reporting, you know the scrubbing is effective. If your servers show residual attack traffic, you have the data to demonstrate it to Akamai's SOCC and request tuning.

Think of it this way: Prolexic is your upstream water treatment plant. Flowtriq is the water quality sensor at every faucet. The plant does the heavy filtration, but you still want to know what is actually coming out of each tap — especially if you are paying $15,000/month for the plant.

When to Use Each Product

Akamai Prolexic is the right choice when:

  • You face volumetric attacks that exceed your datacenter's uplink capacity. If a 500 Gbps flood can saturate your upstream links, you need scrubbing infrastructure before your network border — no server-level agent can help with that.
  • You need protocol-agnostic protection for entire IP prefixes, including non-HTTP services.
  • Your organization requires managed mitigation with 24/7 SOCC support and SLA guarantees.
  • Regulatory or contractual obligations mandate enterprise-grade DDoS protection from a recognized provider.
  • You have the budget for enterprise security infrastructure ($10,000+/month).

Flowtriq alone is sufficient when:

  • Your infrastructure has adequate upstream capacity or ISP-level null-routing for volumetric attacks, and your primary need is detection visibility rather than upstream scrubbing.
  • You need per-server traffic monitoring, attack classification, and PCAP forensics.
  • Your budget does not accommodate enterprise scrubbing services but you need professional detection and alerting.
  • You run a heterogeneous infrastructure across multiple providers and need a single detection platform that works everywhere.
  • Your operations team needs real-time alerts through Slack, Discord, PagerDuty, or other modern channels.

Use both when:

  • You need the mitigation capacity of a scrubbing center plus the detection granularity of a server-level agent.
  • You want independent verification that your scrubbing service is actually working.
  • Your incident response process requires PCAP-level forensic data that Prolexic does not provide.
  • You need to detect application-layer attacks or post-scrub leakage that the scrubbing center may miss.
  • Your operations team needs sub-5-second alerts through channels that integrate with your existing incident management workflow.

The Honest Assessment

Prolexic is an exceptional product. If you are an enterprise that needs multi-terabit scrubbing capacity with managed support, it is one of the best options available. Flowtriq does not compete with Prolexic for that use case and never will — absorbing 20 Tbps of attack traffic requires physical infrastructure that a software agent cannot replicate.

What Flowtriq does is fill the visibility gap that exists between the scrubbing center and your servers. Prolexic tells you that an attack happened and that it was mitigated. Flowtriq tells you what your servers actually experienced — which one was targeted, how much residual traffic got through, what the attack looked like at the packet level, and whether your infrastructure is actually clean.

For organizations already paying enterprise prices for Prolexic, adding Flowtriq is a marginal cost increase that significantly improves operational visibility. For organizations that cannot justify Prolexic's pricing, Flowtriq provides professional-grade detection and alerting at a fraction of the cost, with the understanding that server-level detection and upstream scrubbing are different things.

Neither product is a substitute for the other. Both do their job well. The question is whether you are satisfied with visibility only at the network edge, or whether you also need to see what is happening at each server.

Add server-level detection to your scrubbing deployment

Flowtriq gives Prolexic customers per-server visibility, PCAP forensics, and real-time multi-channel alerting. $9.99/node/month with a 7-day free trial.

Start your free 7-day trial →
Back to Blog

Related Articles