DDoS Protection

FortiDDoS automatically defends against known and zero-day distributed-denial-of-service attacks

FortiDDoS is an inline, purpose-built solution that protects organizations against disruptions caused by attacks that flood a target with packets and exhaust resources, causing the network, applications, or services to be unavailable to legitimate traffic. Without user intervention, FortiDDoS automatically detects and stops multiple simultaneous attacks of any size before services fail.

Features and Benefits

FULLY AUTONOMOUS MITIGATION

During attacks, no user intervention is required. Also, no additional subscriptions are required

EXPANSIVE MONITORING

230,000 parameters are simultaneously monitored to stop zero-day attacks

100% PACKET INSPECTION

All mitigations take place in less than one second. No sampling

HIGH SMALL-PACKET INSPECTION

77 Mpps small-packet inspection ensures detection and network performance

ADVANCED LAYERS 4 AND 7 MITIGATION

TCP flag, DNS, NTP, DTLS, QUIC direct/reflected attacks are mitigated from the first packet

UNMATCHED UDP REFLECTION MITIGATION

More than 10,000 possible UDP Reflection ports are monitored

Use Cases

INFRASTRUCTURE PROTECTION

FortiDDoS minimizes impact and maintains business continuity.

BOTNET DEFENSE

FortiDDoS blocks malicious bot activity without blocking bots, using 100% inspected small-packet rate detection capabilities.

AUTONOMOUS DDOS PROTECTION

FortiDDoS is the only completely autonomous DDoS mitigation system that requires no user or vendor NOC intervention during attacks.

Training & Certifications

FortiDDoS Course

FortiDDoS

In this 1-day class, candidates will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service (DDoS) attacks while preserving service and network performance.

Want a Free Product Demo?

In this FortiDDoS demo you’ll be able to explore the system dashboard, intuitive GUI, global settings, and protection profiles to see for yourself how comprehensive, yet easy it is to set up thresholds address/service definitions, and access control lists. You’ll also be able to view the detailed reporting and graphing tools ranging from the Executive Dashboard to detailed drill-down reports on dropped packets.

Speak to us within 3 rings.