You are here

FortiDDoS庐 Family of DDoS Attack Mitigation Appliances

The FortiDDoS family of purpose built appliances provide real-time visibility into the networks in addition to detection and prevention of Distributed Denial of Service (DDoS) attacks.

FortiDDoS helps you protect your internet-facing infrastructure from threats and service disruptions by surgically removing network and application-layer DDoS attacks. You can defend your critical on-premise and cloud infrastructure from attacks while relying on FortiDDoS appliances鈥 sophisticated filtering technologies to allow legitimate traffic to continue to flow. These scalable, high-performance appliances deliver proven DDoS defense, and are completely interoperable with your existing security technologies and network infrastructure.


Features & Benefits

  • FortiDDoS provides granular visibility and control of your network. It automatically detects and mitigates attack traffic
  • Inline, transparent threat mitigation provides easy to deploy and manage DDoS prevention against targeted attacks, worm outbreaks, DDoS and Botnet attacks, source tracking, and Inbound and Outbound attacks
  • Segregation and virtualization of the FortiDDoS appliance allows separate security policies on each segment for multi-tenant environments
  • Bandwidth management maintains policies that enable Service Providers to limit each customer or user to their predefined bandwidth
  • Purpose-built FortiASIC-TP processors deliver proven, high performance protection
  • Header and state anomaly prevention provides 鈥渃lean pipe鈥 to improve network utilization
  • Stealth activity prevention helps finding spoofers and worm outbreaks
  • Centralized alerts, role based management and self service portals provide flexible management and integration

Key Capabilities (Read in detail)
  • Visibility and behavior analysis
  • Threat mitigation
  • Source tracking
  • Service Protection Policies by segregating customers or networks
  • Stealth Activity Prevention
  • Threat Containment
  • Easy Deployment

Defense Technology (Read in detail)
  • Service Protection Profiles
  • Geo-Location Protection
  • Bogon Filtering, Access Control Lists
  • Packet Flood Mitigation / Protocol Verification
  • Stateful Packet Inspection, Out-of-State Filtering
  • Granular Network, Transport and Application Layer Filtering
  • Application Layer Filtering, Get Flood and Resource Flood Filtering
  • Algorithmic Filtering
  • Heuristic Filtering

DDoS Attack Mitigation Guide
DDoS Attacks, Scenarios, Trends, Mitigation Techniques and Botnets. (Download)

Next Phase of DDoS Defense
Frost and Sullivan Stratecast Executive Brief (Download)

Products

CALL NOW! 1-866-868-3678


Our customers were looking for an alternate and trustworthy way to protect their networks without the need to have appliances at their site, so a virtualized integrated security service, with its related capital- and operational-expenditure savings, is the right solution for many companies. Fortinet has one of the richest security virtualization offering in the industry, so we knew that, with Fortinet, we were partnering with the pre-eminent technology leader in the field.

Adam Rice
Vice President SSOC
Tata Communications