Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't use them myself, but I only choose colocation providers that have a good handle on their own protections. A quick search, though, shows lots of reviews and options:

https://www.techradar.com/news/best-ddos-protection

https://www.gartner.com/reviews/market/ddos-mitigation-solut...

https://expertinsights.com/insights/top-distributed-denial-o...

No idea about the content of those links, but considering the amount of research I do before selecting a colo provider, it'd be trivial in comparison to research a DDoS protection service.



But you didn't check those sites; they all recommend cloudflare or either very expensive (we all know what it means when there are no prices on the site and sales can call me) solutions, hard to use solutions or solutions you cannot use unless you are a certain type of site (the google one).

So basically the choice is cloudflare if you are not cashed up enough. So nothing to do with lazy; there are no other viable options for most if it's a large attack.


You're right that I didn't check them. I said that.

It's like doing research for colo, like my example. If you have the need, then a couple of hours of research is well worthwhile. I don't have the need, so I'm not going to do it now, but that's how one starts.

The colo example is apt - colo providers that don't have pricing are invariably too expensive, so I skip them, but there are plenty of others to check out that aren't Cloudflare. The one article I skimmed even says whether the providers are pricy or affordable.

Nobody needs Cloudflare. If (most) people were aware of how much Cloudflare breaks visibility across the world, they'd likely avoid Cloudflare, too.


I would avoid cloudflare and i did this research before; there simply aren't any affordable competitors. That is why everyone keeps coming back to them.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: