解决方案   Solutions
    无分类
联系我们   Contact
你的位置:首页 > 解决方案

FortiDDoS DDoS 防御产品

2017-3-23 12:10:34      点击:

The FortiDDoS family of purpose built appliances provide real-time visibility into the networks in addition to detection and prevention of Distributed Denial of Service (DDoS) attacks.

FortiDDoS helps you protect your internet-facing infrastructure from threats and service disruptions by surgically removing network and application-layer DDoS attacks. You can defend your critical on-premise and cloud infrastructure from attacks while relying on FortiDDoS appliances’ sophisticated filtering technologies to allow legitimate traffic to continue to flow. These scalable, high-performance appliances deliver proven DDoS defense, and are completely interoperable with your existing security technologies and network infrastructure.

 

Features & Benefits

  • FortiDDoS provides granular visibility and control of your network. It automatically detects and mitigates attack traffic
  • Inline, transparent threat mitigation provides easy to deploy and manage DDoS prevention against targeted attacks, worm outbreaks, DDoS and Botnet attacks, source tracking, and Inbound and Outbound attacks
  • Segregation and virtualization of the FortiDDoS appliance allows separate security policies on each segment for multi-tenant environments
  • Bandwidth management maintains policies that enable Service Providers to limit each customer or user to their predefined bandwidth
  • Purpose-built FortiASIC-TP processors deliver proven, high performance protection
  • Header and state anomaly prevention provides “clean pipe” to improve network utilization
  • Stealth activity prevention helps finding spoofers and worm outbreaks
  • Centralized alerts, role based management and self service portals provide flexible management and integration


Key Capabilities (Read in detail)

  • Visibility and behavior analysis
  • Threat mitigation
  • Source tracking
  • Service Protection Policies by segregating customers or networks
  • Stealth Activity Prevention
  • Threat Containment
  • Easy Deployment


Defense Technology (Read in detail)

  • Service Protection Profiles
  • Geo-Location Protection
  • Bogon Filtering, Access Control Lists
  • Packet Flood Mitigation / Protocol Verification
  • Stateful Packet Inspection, Out-of-State Filtering
  • Granular Network, Transport and Application Layer Filtering
  • Application Layer Filtering, Get Flood and Resource Flood Filtering
  • Algorithmic Filtering
  • Heuristic Filtering


DDoS Attack Mitigation Guide 
DDoS Attacks, Scenarios, Trends, Mitigation Techniques and Botnets. (Download) 

Next Phase of DDoS Defense 
Frost and Sullivan Stratecast Executive Brief (Download)