FortiDDoS DDoS 防御产品
The FortiDDoS family of purpose built appliances provide real-time visibility into the networks in addition to detection and prevention of Distributed Denial of Service (DDoS) attacks.
FortiDDoS helps you protect your internet-facing infrastructure from threats and service disruptions by surgically removing network and application-layer DDoS attacks. You can defend your critical on-premise and cloud infrastructure from attacks while relying on FortiDDoS appliances’ sophisticated filtering technologies to allow legitimate traffic to continue to flow. These scalable, high-performance appliances deliver proven DDoS defense, and are completely interoperable with your existing security technologies and network infrastructure.
Features & Benefits
- FortiDDoS provides granular visibility and control of your network. It automatically detects and mitigates attack traffic
- Inline, transparent threat mitigation provides easy to deploy and manage DDoS prevention against targeted attacks, worm outbreaks, DDoS and Botnet attacks, source tracking, and Inbound and Outbound attacks
- Segregation and virtualization of the FortiDDoS appliance allows separate security policies on each segment for multi-tenant environments
- Bandwidth management maintains policies that enable Service Providers to limit each customer or user to their predefined bandwidth
- Purpose-built FortiASIC-TP processors deliver proven, high performance protection
- Header and state anomaly prevention provides “clean pipe” to improve network utilization
- Stealth activity prevention helps finding spoofers and worm outbreaks
- Centralized alerts, role based management and self service portals provide flexible management and integration
Key Capabilities (Read in detail)
- Visibility and behavior analysis
- Threat mitigation
- Source tracking
- Service Protection Policies by segregating customers or networks
- Stealth Activity Prevention
- Threat Containment
- Easy Deployment
Defense Technology (Read in detail)
- Service Protection Profiles
- Geo-Location Protection
- Bogon Filtering, Access Control Lists
- Packet Flood Mitigation / Protocol Verification
- Stateful Packet Inspection, Out-of-State Filtering
- Granular Network, Transport and Application Layer Filtering
- Application Layer Filtering, Get Flood and Resource Flood Filtering
- Algorithmic Filtering
- Heuristic Filtering
DDoS Attack Mitigation Guide
DDoS Attacks, Scenarios, Trends, Mitigation Techniques and Botnets. (Download)
Next Phase of DDoS Defense
Frost and Sullivan Stratecast Executive Brief (Download)
- 上一篇:无线局域网(WLAN) 2017/3/23
- 下一篇:FortiOS 5 Network Security Ope 2017/3/23