Product Advantages
-
Great Capability Defend your servers against a wide range of network and transport layer DDoS attacks with globally distributed scrubbing centers that provide Tbit/s protection capacity. Defend your servers against a wide range of network and transport layer DDoS attacks with globally distributed scrubbing centers that provide Tbit/s protection capacity. -
Instantaneous Response Efficiently detect and rapidly respond to DDoS attacks before your services are impacted. Efficiently detect and rapidly respond to DDoS attacks before your services are impacted.
-
High Reliability Enjoy always-on protection, and tune your protection settings based on the detected attacks. Enjoy always-on protection, and tune your protection settings based on the detected attacks. -
24/7 Support Keep your services up and running with the always available and experienced DDoS mitigation staff. Keep your services up and running with the always available and experienced DDoS mitigation staff.
Application Scenarios
Functions
-
360-degree DDoS Protection Defend against a range of DDoS attacks. Enjoy powerful protection and precise traffic scrubbing capability. Defend against a range of DDoS attacks. Enjoy powerful protection and precise traffic scrubbing capability. -
Multiple Protocols Use advanced traffic detection and protection technologies to defend your servers that use HTTP, HTTPS, and TCP against attacks. Use advanced traffic detection and protection technologies to defend your servers that use HTTP, HTTPS, and TCP against attacks.
-
Precise traffic protection Precise traffic protection Detect and scrub attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods, by filtering malformed packets. Detect and scrub attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods, by filtering malformed packets. -
WAF/CC attack prevention WAF/CC attack prevention Identify and block SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks. Keep your web services secure and stable. Identify and block SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks. Keep your web services secure and stable.
-
Web protection Web protection Block the unauthorized HTTP traffic that does not comply with HTTP protocol specifications or fails to pass through the DPI engine. Block the unauthorized HTTP traffic that does not comply with HTTP protocol specifications or fails to pass through the DPI engine. -
Deep packet inspection (DPI) Deep packet inspection (DPI) Detect attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols in advance by filtering malformed packets and application layer traffic. Detect attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols in advance by filtering malformed packets and application layer traffic.
-
Intelligent Protection Hide your servers from zero-day attacks. Hide your servers from zero-day attacks.
-
Hidden server Hidden server Provide you services from special, high-defense IP addresses so your servers can be kept safe and secure. Provide you services from special, high-defense IP addresses so your servers can be kept safe and secure. -
Quick access Quick access Cache static content to edge nodes. The nearest cache node can be accessed, speeding up your access to websites. Cache static content to edge nodes. The nearest cache node can be accessed, speeding up your access to websites. -
Adaptive filtering Adaptive filtering Use big data threat analysis, baseline traffic statistics, and exception identification to protect against zero-day attacks. Use big data threat analysis, baseline traffic statistics, and exception identification to protect against zero-day attacks.