AAD has 9+ scrubbing centers globally with Tbit/s-level defense capabilities. Services are always protected while meeting geo-specific requirements.
Real-time monitoring of network conditions and immediate diversion of attack traffic keep a tight lid on security risks so you can run your business without worry.
Automatic attack detection and defense policy matching provide real-time protection yielding up to 99.9% of service availability.
Award-winning teams provide around-the-clock support to keep your services up and running.
Website access is slow or blocked due to DDoS and CC attacks, resulting in the loss of users and low sales volumes.
AAD blocks HTTP traffic that does not comply with specified protocol specifications or fails to pass the DPI engine, and unauthorized HTTP content.
AAD protects web and mobile applications, and APIs from common threats such as OWASP Top 10.
Static content is cached to edge nodes. Automatically accessing the nearest cache greatly improves website access speeds.
DDoS attacks affect the gaming experience, causing loss of revenue and disinterest in the game from unforgiving gamers who expect top performance because milliseconds often decide victory and defeat.
Attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols can be detected in advance by filtering malformed packets and application layer traffic.
Big data threat analysis, baseline traffic statistics, and exception identification are used to prevent zero-day attacks.
Instantaneous response to attacks and user identity authentication are used to further identify normal from attack traffic for precise defense.
Provides high-bandwidth and precise traffic scrubbing capabilities to effectively defend against various DDoS attacks.
Adopts industry-vetted technologies to detect and protect protocols such as HTTP, HTTPS, and TCP.
Diversion from the origin server, intelligent acceleration, and zero-day attack defense
Precise traffic protection
Filters malformed packets and scrubs attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods.
WAF/CC attack prevention
Identifies and blocks SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks to ensure your web-based services remain secure and stable.
Web security defense
Blocks HTTP traffic that does not comply with specified protocol specifications or fails to pass the DPI engine, and unauthorized HTTP content.
Deep packet inspection
Filters malformed packets and application layer traffic to prevent such attacks as SYN floods that exploit vulnerabilities in TCP or IP protocols.
Diversion from the origin server
The domain name that is requested is resolved and returned to the IP address of the high-defense node, preventing attacks on the origin server.
Uses Big Data threat analysis, baseline traffic statistics, and exception identification to prevent zero-day attacks.
Supports static content cached to the edge nodes. Automatically accessing the nearest cache greatly improves the website access speeds.