Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

High precision, automated, scalable, and intelligent DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1Gbps to over 1Tbps. The solution minimizes downtime with multi-vector DDoS mitigation, leveraging FPGA-based acceleration and various clustering techniques to provide protection at scale. Auto policy escalation, intelligent zero-day mitigation, and streamlined SecOps elevates efficacy while lowering TCO.

Description

DDoS (Distributed Denial of Service) attacks continuously evolve and utilize various technological methods, necessitating a robust and adaptable security framework for effective defense. To effectively counter these threats, FortiDDoS offers advanced protection against both recognized and zero-day attacks while maintaining impressively low latency. Its deployment and management are user-friendly, equipped with extensive reporting and analytical capabilities. The solution features a security processor (SPU)-based architecture that provides comprehensive protection across layers 3, 4, and 7, along with application-aware traffic management. FortiDDoS can monitor an extensive range of parameters simultaneously, employing behavior-based protection to eliminate reliance on signature files. It defends against all forms of DDoS attacks, including bulk volumetric, layer 7 application, and SSL/HTTPS assaults, while ensuring minimal false positives through ongoing threat assessment. Additionally, it includes specialized tools for protecting DNS services. As a critical element of our Application Security framework, FortiDDoS stands out in its ability to adapt to the constantly changing landscape of cyber threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend Threat Control
Archer
BackBox
CyberArk Machine Identity Security
Cynerio
ExtremeCloud IQ
Fidelis Endpoint
Flowmon
Gigamon
Google Cloud Platform
IBM Cloud
Kentik
NEC EXPRESSCLUSTER
Nexusguard
SAP Access Control
SafeConnect NAC
ThreatARMOR
Trellix Data Encryption
Trend Micro Endpoint Encryption
k0rdent

Integrations

A10 Defend Threat Control
Archer
BackBox
CyberArk Machine Identity Security
Cynerio
ExtremeCloud IQ
Fidelis Endpoint
Flowmon
Gigamon
Google Cloud Platform
IBM Cloud
Kentik
NEC EXPRESSCLUSTER
Nexusguard
SAP Access Control
SafeConnect NAC
ThreatARMOR
Trellix Data Encryption
Trend Micro Endpoint Encryption
k0rdent

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

A10 Networks

Founded

2004

Country

United States

Website

www.a10networks.com/products/a10-defend-mitigator/

Vendor Details

Company Name

Fortinet

Founded

2000

Country

Unite States

Website

www.fortinet.com/products/ddos/fortiddos

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Alternatives

Kona Site Defender Reviews

Kona Site Defender

Akamai Technologies
AWS Shield Reviews

AWS Shield

Amazon
DDos Protector Reviews

DDos Protector

Check Point Software Technologies
FortiDeceptor Reviews

FortiDeceptor

Fortinet