Market Landscape
The DDoS Protection
Landscape in 2026
Three categories of tools. Three different approaches. Most teams only have one — Flowtriq bridges detection and mitigation in a single platform.
Three Market Segments
Different tools solve different problems
The DDoS market has three distinct layers. Most organizations deploy one. The best-protected deploy all three.
Absorb & Filter
Route traffic through a global proxy network that absorbs volumetric floods before they reach your origin. Measured in Tbps capacity.
Strengths
- Absorb multi-Tbps volumetric floods
- Global anycast — attack diffused across PoPs
- Always-on, zero infrastructure to manage
Gaps
- Blind to traffic that never touches the proxy
- Limited forensics — no raw PCAP
- No visibility into what hits your origin directly
- Expensive at scale ($3K–$40K+/mo)
Inspect & Block
On-premise appliances at the network edge that inspect traffic at line rate using ASICs and FPGAs. Measured in Mpps throughput.
Strengths
- Wire-speed inspection — no added latency
- Deep packet inspection for protocol anomalies
- Full control over mitigation policies
Gaps
- Capacity ceiling — can't absorb volumetric floods
- 6–7 figure CAPEX + maintenance contracts
- Alert fatigue from raw flow data, limited classification
- No cloud visibility — blind to hybrid infra
Detect, Classify & Mitigate
Agent-based platforms that detect attacks per-server, classify attack types, auto-deploy BGP mitigation rules, trigger cloud scrubbing, and capture forensic evidence. Measured in detection-to-mitigation latency.
Strengths
- Sees what actually hits your servers — even behind proxies
- Rich forensics: PCAP capture, attack classification, source profiling
- Auto-mitigation via BGP FlowSpec, RTBH, and cloud scrubbing
- Lightweight — no DNS/routing changes, deploys in minutes
- 4-level escalation: rate-limit → FlowSpec → RTBH → cloud scrub
Gaps
- Doesn't absorb volumetric floods inline (triggers upstream scrubbing instead)
- Requires BGP adapter or cloud provider API for network-level mitigation
Side-by-Side Comparison
Feature matrix across categories
No single tool does everything. See where each category excels — and where it needs help.
| Capability | Cloud Scrubbers | HW Appliances | Flowtriq |
|---|---|---|---|
| Detection | |||
| Volumetric flood absorption | ✓ Tbps | ~ limited | ✗ |
| Detection latency | 5–60s | 1–10s | ≤ 1 second |
| Per-server visibility | ✗ | partial | ✓ every node |
| Protocol-level classification | basic | ✓ DPI | ✓ 8 families |
| Confidence scoring | ✗ | ✗ | ✓ 0–100% |
| IP spoofing detection | ✗ | some | ✓ TTL analysis |
| Dynamic baselines (auto-tune) | some | some | ✓ per node |
| Response & Mitigation | |||
| Inline traffic filtering | ✓ | ✓ | via BGP/cloud |
| Auto-mitigation rules | WAF rules | ✓ ACLs | ✓ 22 action types |
| iptables / nftables rules | ✗ | ✗ | ✓ auto |
| Cloudflare WAF integration | ✓ native | ✗ | ✓ API |
| BGP FlowSpec / RTBH | ✓ | ✓ | ✓ auto-escalation |
| Cloud scrubbing trigger | ✓ native | ✗ | ✓ CF, OVH, Hetzner |
| Forensics & Visibility | |||
| PCAP capture | ✗ | expensive add-on | ✓ included |
| Pre-attack packet buffer | ✗ | ✗ | ✓ 1000-pkt ring |
| Source IP profiling | sampled | ✓ | ✓ full |
| Threat intel enrichment | some | ✓ ATLAS | ✓ IOC + feeds |
| Historical analytics | limited | limited | ✓ dashboard |
| Alerting & Integration | |||
| Multi-channel alerts | email + SNMP | ✓ 7+ channels | |
| Discord / Slack rich embeds | ✗ | ✗ | ✓ |
| PagerDuty / OpsGenie | basic | SNMP trap | ✓ native |
| Escalation policies | ✗ | ✗ | ✓ |
| Public status pages | ✗ | ✗ | ✓ |
| Operations | |||
| Deploy time | hours–days | weeks | 5 minutes |
| DNS/routing changes required | yes | yes | ✗ none |
| Works behind existing CDN/proxy | conflicts | separate | ✓ |
| Typical cost | $3K–$40K+/mo | $50K–$500K+ CAPEX | $9.99/node/mo |
Where Flowtriq Fits
Detection and mitigation in a single platform
Cloud scrubbers absorb floods. Hardware appliances filter at the edge. But neither gives you per-server detection, automatic escalation, or forensic evidence. Flowtriq does all three.
Flowtriq detects attacks per-server in under 1 second, then automatically deploys mitigation — from local rate-limiting all the way up to cloud scrubbing — based on escalation policies you define.
- Install a lightweight agent on each server in 5 minutes
- 1-second detection with 8-family classification and IOC matching
- Auto-deploy BGP FlowSpec rate-limits and RTBH blackholes via ExaBGP or GoBGP
- Trigger cloud scrubbing (Cloudflare Magic Transit, OVH VAC, Hetzner)
- 4-level escalation: local → FlowSpec → RTBH → cloud scrub
- Capture full PCAP evidence — including 1,000-packet pre-attack buffer
- Route alerts to Discord, Slack, PagerDuty, or any webhook
Common Questions
We already have DDoS protection
Great — Flowtriq makes it better. Here's how it works with what you already have.
pip install ftagent — no DNS changes, no BGP updates, no proxy configuration. It runs alongside your existing stack and reports to the Flowtriq dashboard. Deploy in 5 minutes, works immediately behind any CDN, load balancer, or appliance.Get Started
Add detection and mitigation to your stack in 5 minutes
Flowtriq works standalone or alongside Cloudflare, AWS Shield, Arbor, and other tools. Deploy the agent, configure your BGP adapters or cloud scrubbing, and get full detect-to-mitigate coverage — no DNS changes, no rip-and-replace.