Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

DDoS (Distributed Denial of Service) attacks continuously evolve and utilize various technological methods, necessitating a robust and adaptable security framework for effective defense. To effectively counter these threats, FortiDDoS offers advanced protection against both recognized and zero-day attacks while maintaining impressively low latency. Its deployment and management are user-friendly, equipped with extensive reporting and analytical capabilities. The solution features a security processor (SPU)-based architecture that provides comprehensive protection across layers 3, 4, and 7, along with application-aware traffic management. FortiDDoS can monitor an extensive range of parameters simultaneously, employing behavior-based protection to eliminate reliance on signature files. It defends against all forms of DDoS attacks, including bulk volumetric, layer 7 application, and SSL/HTTPS assaults, while ensuring minimal false positives through ongoing threat assessment. Additionally, it includes specialized tools for protecting DNS services. As a critical element of our Application Security framework, FortiDDoS stands out in its ability to adapt to the constantly changing landscape of cyber threats.

Description

Safeguard your applications and APIs from the most advanced and extensive threats by utilizing a web application firewall alongside edge-based DDoS protection. Kona Site Defender offers robust application security positioned at the network's edge, making it more challenging for attackers to reach your applications. With an astonishing 178 billion WAF rule triggers processed daily, Akamai provides unparalleled insights into attack patterns, ensuring the delivery of tailored and precise WAF protections that adapt to emerging threats. Its versatile security measures are designed to protect your entire application landscape while accommodating dynamic business needs, such as API security and cloud transitions, all while significantly reducing management efforts. Furthermore, Kona Site Defender features an innovative anomaly detection engine that guarantees exceptional accuracy right from the start. It is essential to have application security solutions that are adaptable to meet your specific requirements and the diverse organizations you serve, ensuring a comprehensive defense strategy.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Axonius
BackBox
Cynerio
Datacard Secura
Entrust Certificate Hub
Gigamon
IBM QRadar SIEM
Nexusguard
OpenText Enterprise Security Manager
Optiv Managed XDR
Splunk Enterprise
ThreatARMOR

Integrations

Axonius
BackBox
Cynerio
Datacard Secura
Entrust Certificate Hub
Gigamon
IBM QRadar SIEM
Nexusguard
OpenText Enterprise Security Manager
Optiv Managed XDR
Splunk Enterprise
ThreatARMOR

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Fortinet

Founded

2000

Country

Unite States

Website

www.fortinet.com/products/ddos/fortiddos

Vendor Details

Company Name

Akamai Technologies

Founded

1998

Country

United States

Website

www.akamai.com/us/en/products/security/kona-site-defender.jsp

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Alternatives

Alternatives

Kona Site Defender Reviews

Kona Site Defender

Akamai Technologies
DDos Protector Reviews

DDos Protector

Check Point Software Technologies
WebOrion Protector Reviews

WebOrion Protector

cloudsineAI
WEDOS Protection Reviews

WEDOS Protection

WEDOS Group SA
K2 Security Platform Reviews

K2 Security Platform

K2 Cyber Security