|Wire-speed real-time inspection provided by a family of highly tuned software appliances.
|Ensures DDoS attacks are detected prior to impacting your network.
|34+ Data sensor groups including layer 7 application level sensors plus an advanced configuration tool, which provides even greater control & customized signature creation capability.
|The Industry leading large number of sensors plus customization ability provide the capability to detect the most sophisticated attack form.
|Default generic thresholds developed from our knowledge & experience, plus dynamic threshold optimization providing automatic optimization of sensor thresholds based on current threat levels and historical data archived from our world-wide deployment of HARPP DDoS Mitigator sensors (IP Reputation Network).
|Starts protecting your business immediately – minimizing your cost of implementation & ownership.
|Ultra-fast and advanced anomaly engine supports both heuristic and non-heuristic
algorithms which use data sensor averages and source determination of anomalous traffic.
|Provides complete protection against evolving, as well as network and application layer attacks.
|Unique proportioning ability based upon historical data, averages (yearly, seasonal, monthly, weekly, daily etc) aids accuracy.
|Reduces administrator overhead and time consuming false alarms.
|Geographical traffic classification provides both Country based and IP block based filtering abilities.
|Provides the ability for an organization to reduce the risk of attack by blocking potential attack sources.
|IP reputation database queries 5 level exception lists (white and black lists) from greater than 2,000 sensor nodes located in large, medium and small user networks.
|Improves identification accuracy by recognizing potential threats prior to an attack. .
|Integral DOS Intrusion Prevention System pattern signatures & Deep Packet Inspection Firewall with Layer 7 packet inspection, Stateful Packet Inspection, bandwidth management and full IPV6 support provide protection from all attack types including those seeking to exploit application and system vulnerabilities.
|Total protection ensures business confidence no matter the size of the organization.