Setting the Context
Corero SmartWall is an always-on, inline DDoS mitigation platform built primarily for service providers, hosting companies, and data center operators. Flowtriq is a per-server DDoS detection and forensics agent. These products overlap in awareness — both detect DDoS attacks — but they differ fundamentally in what they do about it and what data they provide.
SmartWall blocks attack traffic at the network edge before it reaches your infrastructure. Flowtriq monitors traffic on each individual server and provides detection, classification, PCAP evidence, and instant alerting. One is a shield. The other is a sensor array. Both make your security posture stronger, and neither fully replaces the other.
We make Flowtriq. That bias is obvious. We will try to give Corero fair treatment because they have built a genuinely good product for their use case.
What Corero SmartWall Does
SmartWall is designed as an always-on, inline DDoS protection system that inspects every packet crossing the network edge and automatically filters attack traffic in real time. Unlike scrubbing-center models that require traffic diversion during an attack, SmartWall operates continuously — there is no "detect then redirect" delay because it is always in the traffic path, always inspecting.
SmartWall's core strengths:
- Always-on, sub-second mitigation: Because SmartWall is always inline and always inspecting, it can begin filtering attack traffic within sub-second timeframes. There is no detection window followed by a mitigation window — both happen simultaneously and continuously. For service providers whose SLAs require maximum uptime, this always-on model eliminates the latency inherent in detect-and-divert architectures.
- Surgical packet filtering: SmartWall filters at the packet level, not by diverting entire traffic flows to a scrubbing center. This means legitimate traffic from the same source IP ranges as attack traffic can continue to pass through normally, while only the specific attack packets are dropped. This precision is critical for hosting companies where blackholing a target IP would affect all customers on that IP range.
- Service provider focus: SmartWall is purpose-built for the service provider and hosting company use case. Its multi-tenant architecture lets operators protect individual customer prefixes with distinct policies. Reporting can be segmented per customer. This is a meaningful advantage for operators who need to provide DDoS protection as a service to their downstream customers.
- Automatic attack detection and response: SmartWall uses deep packet inspection and heuristic analysis to identify attack patterns automatically. It does not require manual rule creation for each attack type. New attack vectors are identified based on traffic characteristics and filtered without operator intervention in most cases.
- High throughput capacity: SmartWall appliances are available in throughput tiers from 10 Gbps to 100+ Gbps per appliance, with the ability to cluster for higher aggregate capacity. This scales to the needs of mid-to-large service providers.
- Low latency overhead: In normal (non-attack) conditions, SmartWall adds minimal latency to traffic passing through it — typically under 60 microseconds. This is important for latency-sensitive applications like gaming, voice, and financial services.
Corero has carved out a strong position in the service provider market specifically because of the always-on, surgical filtering approach. For hosting companies and ISPs that need to protect customer infrastructure without traffic diversion delays, SmartWall is a well-regarded solution.
Where SmartWall Has Gaps
SmartWall's inline architecture creates specific limitations that are design tradeoffs, not deficiencies:
Network-edge perspective only. SmartWall sees traffic at the point where it enters your network. It does not see traffic from the perspective of individual servers. If an attack targets a specific application running on one of 200 servers behind SmartWall, the appliance sees the traffic characteristics at the edge — but it does not know how that traffic is affecting the specific target server, what the server's baseline traffic looks like, or whether the server is handling the load or struggling.
No per-server baselines or telemetry. SmartWall builds traffic baselines at the network interface and managed-object level, not at the individual server level. A game server running a popular tournament has very different "normal" traffic than the same game server on a quiet Tuesday afternoon. SmartWall does not have that per-server context. It operates on network-level patterns, which means some server-specific anomalies that deviate from the individual server's baseline but look normal at the aggregate network level may go undetected.
No server-side PCAP. SmartWall can capture packets at the appliance, but it cannot capture what the target server actually received after filtering. The difference matters: a PCAP from the appliance shows what SmartWall saw (including the traffic it dropped). A PCAP from the server shows what actually got through to the application. For validating mitigation effectiveness and for forensic analysis of application impact, the server-side PCAP is what your team needs.
Limited alerting integration. SmartWall integrates with Corero's SecureWatch management platform and supports standard enterprise notification mechanisms (SNMP, syslog, email). Native integration with modern incident response tools — Slack, Discord, PagerDuty, OpsGenie — requires custom API integration or middleware. For NOC teams that have standardized on these platforms, this creates operational friction.
Coverage requires inline placement. SmartWall only protects traffic that flows through it. Servers in cloud environments, remote edge locations, or colocation facilities that are not connected through SmartWall appliances have no protection. Each physical network location requires its own SmartWall deployment.
SmartWall is an excellent perimeter defense. But perimeter defenses, by definition, can only tell you about traffic at the perimeter. What happens behind the wall — on each individual server — requires a different kind of visibility.
What Flowtriq Provides
Flowtriq is a lightweight agent that runs on each Linux server, monitoring network traffic directly on the server's network interface. It builds per-second baselines specific to each node, detects anomalies in real time, classifies attacks, captures PCAP evidence, and alerts your team through modern channels. It does not block any traffic.
Flowtriq's key capabilities in the context of this comparison:
- Per-server detection: Each node has its own baseline and detects anomalies specific to that server's normal traffic patterns. A spike that is normal for one server type may be an attack on another. Flowtriq understands this at the individual node level.
- Server-side PCAP: Every incident includes a 60-second PCAP of traffic as seen by the target server — after any upstream mitigation has been applied. This is the ground-truth record of what your server actually experienced.
- 1-2 second detection: Flowtriq monitors continuously and fires alerts within 1-2 seconds of detecting an anomaly. This provides real-time awareness of attacks even when upstream mitigation is handling the bulk of the traffic.
- Automatic attack classification: Each incident is classified (SYN flood, UDP flood, DNS amplification, NTP amplification, ICMP flood, HTTP flood, TCP ACK flood, multi-vector) with a confidence score. No manual packet analysis required.
- Modern alerting: Discord, Slack, PagerDuty, OpsGenie, email, SMS, and webhooks. Native, not through middleware.
- Any-infrastructure deployment: Install on any Linux server — data center, cloud, edge, colocation. No network topology changes. Five-minute install.
What Flowtriq does not do: inline mitigation, packet filtering, traffic scrubbing, or SSL/TLS inspection. These are SmartWall's strengths.
Detection behind the wall
Flowtriq sees what reaches each server after upstream mitigation. Per-node baselines, PCAP forensics, and instant alerts on every node. 7-day free trial.
Start Free Trial →Side-by-Side Data Comparison
Scenario: A hosting company runs 150 customer servers behind Corero SmartWall. One customer's game server is targeted with a 60-second SYN flood at 200,000 PPS, combined with a low-volume UDP garbage flood at 5,000 PPS on an unusual high port. SmartWall detects and mitigates the SYN flood component. The UDP component at 5,000 PPS falls below SmartWall's anomaly threshold (it looks like a minor traffic increase at the network aggregate level).
Corero SmartWall: Detects and mitigates the SYN flood within sub-second timeframes. The SecureWatch dashboard reports a SYN flood attack against the customer's IP prefix, showing packets dropped, mitigation duration, and estimated attack magnitude. The 5,000 PPS UDP flood does not appear as a separate event — it is below the threshold and mixed into normal aggregate traffic. The hosting company's customer-facing report shows successful SYN flood mitigation.
Flowtriq (on the target game server): Detects two anomalies. First: residual SYN traffic — a small percentage of the SYN flood that passed through SmartWall — classified as SYN Flood, confidence 89%, at 3,200 PPS (1.6% of original volume). Second: UDP flood on port 28960 at 5,000 PPS — classified as UDP Flood, confidence 92%. This is above the game server's normal UDP baseline of 800 PPS on that port. Both incidents include per-second PPS time series, source IP analysis, and PCAP. Alerts fire to the hosting company's Slack and the end customer's Discord webhook within 2 seconds.
SmartWall did its job correctly — it mitigated the primary SYN flood. But the hosting company now has two additional data points from Flowtriq: confirmation that SmartWall's mitigation was 98.4% effective (useful for tuning and customer reporting), and detection of a secondary attack vector that SmartWall did not catch because it was below the aggregate threshold. Without per-server detection, the UDP flood goes unnoticed until the customer reports lag or disconnections.
Feature-by-Feature Breakdown
- Primary function: SmartWall is inline mitigation (always-on filtering). Flowtriq is detection and forensics (no filtering).
- Deployment: SmartWall is inline hardware at the network edge. Flowtriq is a software agent on each server.
- Mitigation approach: SmartWall performs surgical packet-level filtering inline. Flowtriq does not mitigate.
- Detection latency: SmartWall detects and mitigates in sub-second timeframes (always-on). Flowtriq detects and alerts in 1-2 seconds.
- Per-server visibility: SmartWall sees traffic per-network-interface/managed-object. Flowtriq sees traffic per-individual-server.
- Traffic baselines: SmartWall baselines at the network level. Flowtriq baselines per-server with per-second granularity.
- PCAP: SmartWall captures at the appliance (pre/post-filtering view). Flowtriq captures at the server (what the server actually received).
- Attack classification: Both classify attacks. SmartWall classifies at the network level. Flowtriq classifies per-server with confidence scoring.
- Multi-tenant: SmartWall supports per-customer policies and reporting (service provider model). Flowtriq supports multi-workspace with per-team access.
- Alerting: SmartWall uses SecureWatch, SNMP, syslog, email. Flowtriq uses Discord, Slack, PagerDuty, OpsGenie, email, SMS, webhooks.
- Coverage scope: SmartWall covers traffic through its inline placement. Flowtriq covers any server with the agent installed, regardless of location.
Pricing Comparison
Corero SmartWall pricing is not publicly listed and is typically sold through channel partners. Industry pricing for SmartWall deployments generally falls in these ranges:
- SmartWall appliance (10 Gbps tier): $80,000 - $150,000
- SmartWall appliance (40-100 Gbps tier): $200,000 - $500,000+
- SecureWatch management platform: included or bundled
- Annual support and subscriptions: 18-22% of appliance cost per year
- Professional services for deployment: $15,000 - $50,000
For service providers and hosting companies protecting large customer bases, this pricing can be distributed across the customer base as a value-added DDoS protection service. The per-customer cost becomes reasonable when amortized across hundreds or thousands of customer services.
Flowtriq pricing is public: $9.99 per node per month, or $7.99 per node per month on annual billing. 7-day free trial. No minimum. No hardware.
- 50 servers: $499.50/month ($4,794/year on annual billing)
- 150 servers: $1,498.50/month ($14,382/year on annual billing)
- 500 servers: $4,995/month ($47,940/year on annual billing)
For hosting companies that already have SmartWall at the edge, adding Flowtriq at $9.99/node on customer servers is an incremental cost that can be passed through as part of a premium monitoring offering — or absorbed as operational tooling that improves incident response quality and reduces customer support load.
Hybrid Deployment: Running Both Together
The optimal architecture for hosting companies and service providers layers SmartWall at the network edge with Flowtriq on the servers behind it. This is not theoretical — it maps directly to how these organizations already think about their protection tiers.
SmartWall handles perimeter mitigation. It continues to inspect every packet at the network edge, filtering volumetric floods, amplification attacks, and protocol-level attacks before they reach customer servers. This is SmartWall's core competency and it does it with sub-second precision.
Flowtriq handles server-level detection and customer-facing evidence. The agent on each server provides:
- Mitigation validation: Confirm that SmartWall is effectively filtering attacks. If residual attack traffic is reaching servers, your NOC knows immediately and can tune SmartWall's policies.
- Below-threshold attack detection: Small attacks that fall below SmartWall's aggregate detection thresholds but are anomalous for specific servers. These are the attacks that cause customer complaints when left undetected.
- Customer-facing evidence: When a customer asks "was my server attacked?" you can provide them with per-second PPS data, attack classification, and a PCAP download. This is dramatically better than "our edge appliance shows it filtered some traffic to your prefix."
- Application-layer visibility: Attacks that look like legitimate traffic at the network edge (HTTP floods, connection exhaustion, slow attacks) but create anomalous patterns on the specific target server.
- Coverage for off-network infrastructure: Cloud instances, CDN origins, remote edge nodes, or partner infrastructure that is not behind your SmartWall deployment.
For hosting companies specifically, the combination of SmartWall + Flowtriq creates a compelling tiered DDoS protection offering: SmartWall provides the always-on mitigation, and Flowtriq provides the per-server visibility and forensics that differentiate your service from competitors who only offer edge-level protection.
When to Use Each
Keep SmartWall (without Flowtriq) when:
- Your primary requirement is inline mitigation and you do not need per-server-level detection data.
- Your customers do not ask for per-server attack reports, PCAP evidence, or per-second traffic analytics.
- All protected infrastructure sits behind SmartWall and you have no servers in cloud, edge, or off-network locations.
- Your NOC is satisfied with the detection granularity provided by SmartWall's network-level reporting.
Add Flowtriq alongside SmartWall when:
- You are a hosting company that wants to offer per-server DDoS visibility as a service feature or competitive differentiator.
- Your customers request PCAP evidence and per-second attack timelines for their servers.
- You need to validate SmartWall's mitigation effectiveness with independent server-side data.
- Application-layer attacks and below-threshold floods are causing customer complaints that SmartWall does not detect.
- You have infrastructure outside your SmartWall footprint (cloud, edge, partner locations).
- Your operations team needs DDoS alerts in Slack, Discord, or PagerDuty without building custom integrations.
Use Flowtriq without SmartWall when:
- You do not have (and do not need) inline mitigation hardware. Your upstream providers or cloud services handle volumetric mitigation, and you need per-server detection and forensics.
- Your infrastructure is distributed across cloud providers, colocation facilities, and edge locations where deploying inline hardware is impractical.
- You need DDoS detection on a budget. Flowtriq at $9.99/node gives you detection, classification, PCAP, and alerting without six-figure hardware investment.
- Your mitigation strategy relies on triggering upstream actions (RTBH, cloud scrubbing, CDN rules) based on detection alerts, and you need the detection layer to trigger those actions.
The Honest Summary
Corero SmartWall is an excellent always-on inline mitigation platform built for service providers and hosting companies. Its sub-second surgical filtering, multi-tenant architecture, and low-latency inline processing make it the right tool for operators who need to protect customer infrastructure at the network edge. If your primary job is keeping flood traffic away from customer servers, SmartWall does that job well.
Flowtriq is a per-server detection and forensics agent that provides the visibility layer SmartWall cannot: individual server baselines, server-perspective PCAP captures, attack classification with confidence scoring, and sub-second alerting to modern platforms. It does not replace SmartWall's mitigation — it complements it with server-level intelligence.
The strongest deployment uses SmartWall at the edge to filter attack traffic and Flowtriq on every server to see what gets through, detect below-threshold attacks, and provide the forensic evidence your team and your customers need. For hosting companies, this combination is a competitive advantage: your customers get both active protection and detailed per-server visibility. For your NOC, it means faster response, better data, and fewer blind spots.
Add per-server detection behind your SmartWall
Give your NOC and your customers the server-level visibility that edge mitigation alone cannot provide. PCAP capture, attack classification, instant alerts. $9.99/node/month.
Start your free trial →