AAD has 9+ scrubbing centers with Tbit/s-level defense capabilities. With scrubbing centers distributed around the world, your layout is always protected while meeting geo-specific requirements.
Real-time monitoring of network conditions and immediate diversion of attack traffic keeps a tight lid on security risks so you can run your business without worry.
Automatic attack detection and defense policy matching provide real-time protection to yield up to 99.9% of service availability.
Award-winning teams provide around-the-clock support to keep your services up and running.
Website access is slow or blocked due to DDoS and CC attacks, resulting in the loss of users and low sales volumes.
AAD blocks HTTP traffic that does not comply with specified protocol specifications, unauthorized HTTP content, and HTTP traffic that fails to pass the DPI engine.
AAD protects web, mobile applications, and API interfaces from common threats such as OWASP Top 10.
Static content is cached to cloud nodes. Automatically accesses the nearest cache greatly improve the website access speeds.
DDoS attacks affect the gaming experience, causing loss of revenue and disinterest in the game from unforgiving gamers who expect top performance because milliseconds often decide victory and defeat.
Attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols can be detected in advance by filtering malformed packets and application-layer traffic.
Big Data threat analysis, baseline traffic statistics, and exception identification are used to prevent zero-day attacks.
Instantaneous response to attacks and user identity authentication are used to further tell normal from attack traffic for precise defense.
Provides high-bandwidth, precise traffic cleansing capabilities to effectively defend against various DDoS attacks.
Filters malformed packets and cleans attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods.
Identifies and blocks SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks to help ensure your web-based services remain secure and stable.
Adopts industry-leading detection and protection technologies to detect and protect protocols such as HTTP, HTTPS, and TCP.
Blocks HTTP traffic that does not comply with specified protocol specifications, unauthorized HTTP content, and HTTP traffic that fails to pass the DPI engine.
Filters malformed packets and application-layer traffic to prevent such attacks as SYN floods that exploit vulnerabilities in TCP or IP protocols.
Diverts from the original server, and provides intelligent acceleration, and zero-day attack defense capabilities.
The domain name that is requested is resolved and returned to the IP address of the high-defense node, preventing attacks on the original server.
Supports static content cached to the cloud nodes. Automatically accesses the nearest cache greatly improve the website access speeds.
Uses Big Data threat analysis, baseline traffic statistics, and exception identification to prevent zero-day attacks.