Advanced Web Application Firewall (AdWAF)
WAF is a solution that provides protection for web applications against cyber threats and DoS/DDoS application attacks. WAF is a unique and intelligent technology that analyzes traffic and creates a security policy or suggests a change in the security policy. The OWASP Top Ten Dashboard clearly visualizes the level of application protection and offers a good starting point to set the necessary application security levels according to the OWASP methodology and recommendations.
WAF also offers intelligent protection against application DoS and DDoS attacks. Through statistical models and behavioral analysis, it can detect traffic anomalies indicating a DoS attack and filter malicious traffic.
WAF can be integrated with cloud-based services, providing further additional protection including a reputable IP address database, up-to-date threats from newly published vulnerabilities (CVEs), as well as the most advanced automated traffic detection on the market.
Advanced Firewall Manager (AFM)
In addition to the unique functionalities of a data center firewall, AFM also offers protection against network and protocol (DNS, SIP) DoS or DDoS attacks. AFM includes descriptions of more than 140 known DoS vectors and, like WAF, can detect DoS/DDoS attacks through statistical models and behavioral analysis to suppress these attacks.
AFM also enables deep packet inspection (DPI), per-protocol inspection and protocol anomaly detection through integrated IDS/IPS technology. At the same time, it can also be used in the area of solutions for Internet providers enabling the deployment of S/Gi firewalls.
DoS Hybrid Defender (DHD)
DHD is a dedicated product for detecting and protecting against DoS and DDOS attacks. It combines the features of previous solutions in a single package and provides protection against network, protocol and application attacks. DHD includes a simplified configuration and device management interface that is completely subordinate to the purpose for configuring, detecting, monitoring and visualizing DoS attacks.