• DDoS Attack Protection and Mitigation

    DefensePro Customer Story
    Liquidity Services explains how Radware's DefensePro decreases exposure to a number of different attack vectors and reduces current appliance footprint in the data center.

    What Does DefensePro Do?

    Cyber criminals don't keep regular hours. Instead, they work around the clock to find and exploit holes in your network. You need comprehensive enterprise network security designed to meet today's ever changing security challenges.

    Enter Radware's DefensePro ― a real-time, behavioral based attack mitigation device that protects your infrastructure against network and application downtime, application vulnerability exploitation, malware spread, network anomalies, information theft and other emerging cyber-attacks.

    DefensePro provides world-class security including distributed denial of service (DDoS) attack mitigation and SSL-based protection to fully protect applications and networks against known and emerging network security threats such denial of service attacks, DDoS attacks, Internet pipe saturation, attacks on login pages, attacks behind CDNs, and SSL-based flood attacks with:

    Dedicated Hardware That Protects Without Impacting Legitimate Traffic

    DefensePro uses a dedicated hardware platform based on Radware's OnDemand Switch supporting network throughputs up to 160Gbps. It embeds two unique and dedicated hardware components: a DoS Mitigation Engine (DME) to prevent high volume denial of service attacks and DDoS attacks, flood attacks, without impacting legitimate traffic, and a StringMatch Engine (SME) to accelerate signature detection

    Centralized Attack Management, Monitoring and Reporting

    APSolute Vision offers a centralized attack management, monitoring and reporting solution across multiple DefensePro devices and locations. It provides the user real-time identification, prioritization and response to policy breaches, cyber-attacks and insider threats

    Complete Set of Security Modules

    Intrusion Prevention System (IPS), Network Behavioral Analysis (NBA), anti-DDoS/Denial-of-Service (DoS) Protection, Reputation Engine and SSL Attack Protection. It employs multiple detection & mitigation modules including adaptive behavioral analysis and challenge response technologies in addition to signature detection.

    The Accuracy of Inline, the Scalability of Out of Path

    DefensePro devices can be deployed inline or out-of-path (OOP) in a scrubbing center to provide the highest mitigation accuracy within the shortest time.

    Read more about DefensePro's deployment models.

    What Makes DefensePro Better at Mitigating DDoS Attacks?

    Based on standard signature detection technology to prevent the known application vulnerabilities, DefensePro consists of patent protected behavioral based real-time signatures technology that detects and mitigates emerging network attacks in real time such as zero-minute attacks, DoS/DDoS attacks and application misuse attacks ― all without the need for human intervention and without blocking legitimate user traffic.

    DefensePro is a core part of Radware's next generation Attack Mitigation System (AMS) a set of patented technologies designed for the most advanced internet-borne cyber-attacks. AMS extends the "network" of attack detection and mitigation capabilities beyond the data center for:

    Cloud- hosted business services and applications

    Tools, servers and applications need protection within a virtualized environment

    Mobile work force increasingly depend on remote access to internal business applications and SaaS

    Advanced detection and mitigation techniques need to be ported to tomorrows open network fabrics

    Learn More About DDoS Attack Mitigation

  • We're here to help and ready to talk.

    We'd love the opportunity to speak with you and learn how Radware can help your business. Please complete the form below and a representative will contact you shortly.

    Radware respects your privacy. Personal Information is not used or provided to any third party. Read privacy policy & terms of use for more information.