DDoS Solutions Features 2018-10-08T18:20:07+00:00

DDoS Solutions: Features

FEATURES

Management

  • SNMP, syslog, email alerts
  • Port mirroring
  • RADIUS support
  • Configurable control CPUs

Protocol Attack Protection

  • Invalid packets
  • Anomalous TCP flag combinations
  • Packet size validation (ping of death)
  • POODLE attack

Application Attack Protection

  • Application Layer (L7) Scripting
  • Regular expression filter (TCP/UDP/HTTP)
  • HTTP and DNS request rate limit
  • DNS query check
  • HTTP anomalies

Flood Attack Protection

  • SYN cookies & SYN authentication
  • ACK authentication
  • Spoof detection
  • SSL and DNS authentication
  • HTTP challenge
  •  TCP/UDP/ICMP flood protection
  • Application (DNS/HTTP) flood protection
  • Amplification attack protection

Resource Attack Protection

  • Fragmentation attack
  • Slowloris
  • Slow GET/POST
  • Long form submission
  • SSL renegotiation

Detection/Analysis

  • Manual thresholds
  • Black/white lists
  • IP/port scanning detection
  • Traffic indicator and top talkers
  • Packet debugger tool

BENEFITS

  • HIGH PERFORMANCE PLATFORMS: Throughput capacity ranging from 10 to 155 Gbps ensures that the largest, multi-vector DDoS attacks can be dealt with effectively. SSL security processors are leveraged for detecting and mitigating SSL-based attacks. More complex application-layer attacks are processed by Intel Xeon CPUs, so high-performance system scaling is maintained even for multi-vector attacks.
  • LARGE THREAT INTELLIGENCE CLASS LISTS: Eight individual lists, each containing up to 16 million list entries, can be defined.
  • SIMULTANEOUS PROTECTED OBJECTS: To protect entire networks with many connected users and services, the Thunder TPS is able to simultaneously monitor 64,000 hosts or subnets.
  • FULL CONTROL AND SMART AUTOMATION FOR AGILE PROTECTION: DDoS mitigation solution can easily be inserted into the existing network architecture, so that the network remains prepared for imminent DDoS threats.
  • PROGRAMMATIC POLICY ENGINE: Thunder TPS is able to perform deep packet inspection (DPI) on incoming packets and take defined actions to protect the application.
  • EASY NETWORK INTEGRATION: With multiple options and deployment models, Thunder TPS can be integrated into any network architecture, of any size. Open APIs enable tight integration with many other devices, including SDN controllers and security products.
  • CENTRALIZED MANAGEMENT: For larger deployments, an optional centralized management system ensures routine tasks can be performed at scale, across multiple appliances, regardless of physical location.
[/fusion_builder_column_inner][/fusion_builder_row_inner]

[/fusion_builder_column]

NEXT STEPS

Contact Us For a Presentation

Schedule a live demo and ask specific questions about how ZCorum’s DDoS solutions and how we can save your company time and money.

  Register Now  

grayvericaldivider

Contact Us

Just have some questions? We would love to talk with you.

   Email us

Or give us a call

Like or follow us for free industry resources and for the latest updates in on ZCorum’s A10 Solutions services.