FDD-900B Fortinet DDoS Attack Mitigation Appliances FortiDDoS-900B

FOB Reference Price:Get Latest Price
  • >=1 Pieces
    US $1.00
Report Suspicious Activity
Overview
Quick Details
Products Status:
Stock
Type:
Wired
VPN Support:
Yes
Throughput:
18 Gbps
Simultaneous Sessions:
/
Certification:
CE RoHS FCC
Brand Name:
Fortinet
Model Number:
FDD-900B
Place of Origin:
United States
Simultaneous Connections:
3 Mil
Session Setup/Teardown:
300 K/Sec
Advanced DNS Mitigation:
No
Storage:
1x 480 GB SSD
Form Factor:
2U Appliance
Latency (μs) Maximum/Typical:
<50/<10
Height x Width x Length (inches):
3.5 x 17.24 x 22.05
Weigh:
36.0 lbs (16.2 kg
Supply Ability
Supply Ability:
200 Piece/Pieces per Month
Packaging & Delivery
Packaging Details
Original packing
Port
Guangzhou
Product Description

 

Overview:

The Ever-changing DDoS Attack

Distributed Denial of Service (DDoS) attacks continue to remain the top threat to IT security and have evolved in almost every way to do what they do best: shut down your vital online services. Never has a problem been so dynamic and broad-based without being tied to one particular technology. There is almost an unlimited array of tools that Hacktivists and Cyberterrorists can use to prevent access to your network. Sophisticated DDoS attacks target Layer 7 application services where they are much smaller in size making it nearly impossible for traditional ISP-based mitigation methods to detect them.

To combat these attacks, you need a solution that is equally dynamic and broadbased. Fortinet’s FortiDDoS Attack Mitigation appliances use behavior-based attack detection methods and 100% ASIC-based processors to deliver the most advanced and fastest DDoS attack mitigation on the market today.

A Different and Better Approach to DDoS Attack Mitigation

Only Fortinet uses a 100% ASIC approach to its DDoS products without the overhead and risks of a CPU or CPU/ASIC hybrid system. The FortiASIC-TP2 transaction processors provide both detection and mitigation of DDoS attacks. The FortiASIC-TP2 processor handles all Layer 3, 4 and 7 traffic types, speeding detection and mitigation performance resulting in the lowest latency in the industry.

FortiDDoS uses a 100% heuristic/behavior-based method to identify threats compared to competitors that rely primarily on signature-based matching. Instead of using pre-defined signatures to identify attack patterns, FortiDDoS builds a baseline of normal activity and then monitors traffic against it. Should an attack begin, FortiDDoS sees this as an anomaly and then immediately takes action to mitigate it. You’re protected from known attacks and from the unknown “zero-day” attacks as FortiDDoS doesn’t need to wait for a signature file to be updated.

Advanced DDoS Protection for Enterprise Datacenters

  • 100% hardware-based Layer 3, 4 and 7 DDoS protection provides fast identification and mitigation of attacks.
  • Behavior-based DDoS protection reacts to any threat without the need for signature files.
  • Up to 24 Gbps full-duplex throughput with bidirectional attack mitigation.
  • Combines IP reputation scoring, Geo-location ACLs, and slow attack mitigation for complete Layer 3, 4, and 7 DDoS attack protection in a single appliance.
  • Industry leading ultra-low latency of less than 50 microseconds.
  • Continuous threat evaluation minimizes risk of “false positive” detections.
  • Advanced connectivity with up to 16x 10G SFP+ Fiber interfaces with built-in bypass capabilities.
  • Easy to deploy and manage with intuitive GUI and comprehensive reporting and analysis tools.

Distributed Denial of Service (DDoS) attacks continue to remain a top threat to IT security and have evolved in almost every way to do what they do best: shut down your vital online services. Never has a problem been so dynamic and broad-based without being tied to one particular technology.

A Different and Better Approach to DDoS Attack Mitigation

Only Fortinet uses a 100% SPU approach to its DDoS products without the performance compromises of a CPU or CPU/ASIC hybrid system. The SPU-TP2 transaction processors inspect 100% of both inbound and outbound Layer 3, 4 and 7 traffic, resulting in the fastest detection and mitigation, and the lowest latency in the industry.

 

FortiDDoS uses a 100% heuristic/behavior-based method to identify threats, compared to competitors that rely primarily on signaturebased matching. Instead of requiring predefined signatures to identify attack patterns, FortiDDoS uses its massively-parallel computing architecture to build an adaptive baseline of normal activity from hundreds-of-thousands of parameters and then monitors traffic against that baseline. Should an attack begin, FortiDDoS sees this as abnormal and immediately takes action to mitigate it.

Highlights

100% hardware-based Layer 3, 4 and 7 DDoS attack identification and mitigation

100% Behavior-based DDoS detection

Advanced DNS DDoS mitigation on most models

Hybrid On-premise/Cloud mitigation available

Continuous threat evaluation to minimize false positive detections

Single-pass architecture simultaneously monitors hundreds of thousands of parameters

 

Flexible Defense Mechanisms

FortiDDoS protects against every DDoS attack including Bulk Volumetric, Layer 7 Application, DNS, and SSL/HTTPS attacks. From the oldest trick in the book to the latest in advanced application layer attacks, FortiDDoS has you covered.

Hybrid On-premise/Cloud DDoS Mitigation

While FortiDDoS can mitigate any DDoS attack to the limit of the incoming bandwidth, large attacks can overwhelm incoming link(s). FortiDDoS partners with Verisign OpenHybrid™ DDoS Protection Service to provide hybrid CPE/cloud DDoS mitigation when attacks threaten to congest upstream resources. FortiDDoS on-premise appliances in enterprise data centers can also collaborate directly with high capacity FortiDDoS models in the service provider network using our cloud-signaling technology.

 

FORTIDDOS FEATURES

SPECIFICATIONS

 

Company Information

Guangzhou SuenYuet Technology Ltd.(hereinafter referred to as "Suentek Network") is committed to the users with advanced information technology, application, innovation driven work and life by science and technology, promote digital world process. Therefore, companies strive to build itself into the vast number of users with the preferred supplier to provide the most comprehensive IT services.

The main business includes business process outsourcing, IT planning,system integration, hardware infrastructure services, maintenance,hardware installation, distribution and retail, for the market, to provide a full range of IT services for customers in the industry, enterprise customers, small and medium-sized enterprises and individual consumers.

 

Our services

1.Trusted by 5000+Worldwide Buyers

2.Huge Inventory in Stock

3.Up to 1 Year Warranty

4.Flexible Payment & Shipment

5.100% Money Bank Guarantee

6.Good quality and after-sale service

 

Contacts

Company Name: Guangzhou Suenyuet Technology Limited

Address:  Rm1702, Block 7, Canada Garden, No.8 Maple leaf Rd.,Tianhe District, Guangzhou, Guangdong, China

Mail:Huangm@ suentek.com

 

Website:www.suentek.com    www.suentek.en.alibaba.com

 
Packaging & Shipping

 

1.Original packing;

2.Delivery Time: Within 3 days after your payment confirmed; Subject to final confirmation.

3.Shipping Way:DHL, Fedex, UPS or other ways you like.