DDoS Attack Mitigation Appliances
Download FortiDDoS Datasheet
Further information
Request price
Browse catalog of our products
DDoS Attack Mitigation Appliances
Download FortiDDoS Datasheet
Further information
Request price
The FortiDDoS family of purpose-built appliances provide real-time visibility into the networks in addition to detection and prevention of Distributed Denial of Service (DDoS) attacks. FortiDDoS helps you protect your internet-facing infrastructure from threats and service disruptions by surgically removing network and application-layer DDoS attacks. You can defend your critical on-premise and cloud infrastructure from attacks while relying on sophisticated filtering technologies to allow legitimate traffic to continue to flow. These scalable, high-performance appliances deliver proven DDoS defense, and are completely interoperable with your existing security technologies and network infrastructure.
Product name | Total Network Interfaces | Total Storage Capacity | Throughput |
---|---|---|---|
FortiDDoS-2000B | 2 LAN Interfaces (Copper/RJ-45), 16 WAN interfaces (2 non-working) (SFP/SFP+), 4 WAN Interfaces (LC) with optical bypass | 1x 480GB SSD | 24.0 Gbps |
FortiDDoS-1000B | 2 LAN Interfaces (Copper/RJ-45), 16 WAN Interfaces (SFP/SFP+) | 1x 480GB SSD | 12.0 Gbps |
FortiDDoS-800B | 8 LAN Interfaces (Copper/SFP), 8 WAN Interfaces (Copper/SFP) | 480GB SSD | 8.0 Gbps |
FortiDDoS-400B | 4 LAN Interfaces (Copper/SFP), 8 WAN Interfaces (copper/SFP) | 480GB SSD | 4.0 Gbps |
FortiDDoS-200B | 4 LAN Interfaces (Copper/SFP), 4 WAN Interfaces (Copper/SFP) | 480GB SSD | 2.0 Gbps |
Only Fortinet uses a 100% ASIC approach to its DDoS products without the overhead and risks of a CPU or CPU/ASIC hybrid system. The FortiASIC-TP2 transaction processors provide both detection and mitigation of DDoS attacks. The FortiASIC-TP2 processor handles all Layer 3, 4 and 7 traffic types, speeding detection and mitigation performance resulting in the lowest latency in the industry.
FortiDDoS uses a 100% heuristic/behavior-based method to identify threats compared to competitors that rely primarily on signature-based matching. Instead of using pre-defined signatures to identify attack patterns, FortiDDoS builds a baseline of normal activity and then monitors traffic against it. Should an attack begin, FortiDDoS sees this as an anomaly and then immediately takes action to mitigate it. You’re protected from known attacks and from the unknown “zero-day” attacks as FortiDDoS doesn’t need to wait for a signature file to be updated.
Distributed Denial of Service (DDoS) attacks continue to remain the top threat to IT security and have evolved in almost every way to do what they do best: shut down your vital online services. Never has a problem been so dynamic and broad-based without being tied to one particular technology. There is almost an unlimited array of tools that Hacktivists and Cyberterrorists can use to prevent access to your network. Sophisticated DDoS attacks target Layer 7 application services where they are much smaller in size making it nearly impossible for traditional ISP-based mitigation methods to detect them.
To combat these attacks, you need a solution that is equally dynamic and broad-based. Fortinet’s FortiDDoS Attack Mitigation appliances use behavior-based attack detection methods and 100% ASIC-based processors to deliver the most advanced and fastest DDoS attack mitigation on the market today
100% Behavioral-based Detection | FortiDDoS doesn’t rely on signature files that need to be updated with the latest threats so you’re protected from both known and unknown “zero-day” attacks. |
100% Hardware-based DDoS Protection | The FortiASIC-TP2 transaction processor provides bi-directional detection and mitigation of Layer 3, 4 and 7 DDoS attacks for industry-leading performance. |
Continuous Attack Evaluation | Minimizes the risk of “false positive” detection by reevaluating the attack to ensure that “good” traffic isn’t disrupted. |
Congestion Resistant | With up to 24 Gbps of full duplex thoughput, FortiDDoS won’t easily be overwhelmed by high-volume DDoS attacks. |
Automated Learning Process | With minimal configuration, FortiDDoS will automatically build normal traffic and resources behavior profiles saving you time and IT management resources. |
Multiple Attack Protection | By understanding behaviors FortiDDoS can detect any DDoS attack from basic Bulk Volumetric to sophisticated Layer 7 SSL-based attacks without the need to decrypt traffic. |
Comprehensive Reporting Capabilities | Real-time and historic reports provide granular visibility for network and protocol layers. |