DefensePro

DefensePro X: The Next Level of DDOS Protection

Adaptive Protection From Today’s Most Advanced DDoS Attacks.

What Does DefensePro Do?

DefensePro, part of Radware’s attack mitigation solution, provides automated DDoS protection from fast-moving, high-volume, encrypted or very short-duration threats. It defends against IoT-based, Burst, DNS and TLS/SSL attacks to secure organizations against emerging network multi-vector attacks, ransom DDoS campaigns, IoT botnets, phantom floods, and other types of cyberattacks.

Radware DefensePro X DDoS Mitigation

As attacks get more sophisticated and attackers sharper, the threat landscape continues to evolve with all kinds of advanced DDoS attacks. Radware’s newest DDoS mitigation platforms, DefensePro X and Cyber Controller, give customers advanced protection with the high performance and scale needed to combat the threats of today and tomorrow.

DefensePro Key Capabilities

Behavior-Based Detection for Highest Accuracy

Behavior-Based Detection for Highest Accuracy

Patented behavior-based detection technology enables organizations to accurately detect attacks in real time while minimizing false positives.

Encrypted Web DDoS Protection

Encrypted Web DDoS Protection

Automated real-time signatures for encrypted traffic layers, dynamically adapting to the specific characteristics of the attacks as it morphs, without requiring the encryption keys.

Automated Zero-Day DDoS Attack Protection

Automated Zero-Day DDoS Attack Protection

Attack signatures can be automatically generated to accurately protect from zero-day and unknown attacks. Within 18 seconds, DefensePro can detect, characterize and generate an optimal signature to block unknown attacks.

Flexible Deployment Options

Flexible Deployment Options

Multiple deployment options are available with cloud-based, hardware-based and hybrid solutions to match any customer architecture or use case.

Fully Managed Devices for Peace of Mind

Fully Managed Devices for Peace of Mind

On-premises device management provided by Radware’s Emergency Response Team (ERT) includes security experts that set up, manage and tune the device to keep it synchronized with business processes and policies.

Adaptive and Multi-layered DNS DDoS Attack Protection

Adaptive and Multi-layered DNS DDoS Attack Protection

Real-time detection and mitigation of both known and zero-day DNS DDoS attacks, ensuring that networks and services remain accessible and resilient.

 

Frictionless Security Experience

  • Rich User Experience & Visibility with advanced security operation dashboards that provide unified visibility into attack lifecycle and mitigation analysis for both inline and out-of-path deployments
  • Networks Analytics with comprehensive visibility of traffic statistics during peacetime and attack
  • Simplified Management and Configuration with unified visibility and control for both out-of-path and inline DDoS protection solutions, optimized troubleshooting and enriched search and filter capabilities
  • Multiple Deployment Options offering broad protection and mitigation capacity (6Gbps to 800Gbps), virtual appliances and integrated hybrid solutions with Radware’s Cloud DDoS Protection Service

Frictionless Security Experience

Preemptive Multi-layered DDoS Protection

DefensePro DDoS Protection can leverage the ERT security expertise and real-time threat intelligence services to create a multi-layered protection.
Radware’s ERT extends the automated, real-time protection provided by DefensePro, enabling preemptive blocking of attackers before they target your organization’s network.

Stay One Step Ahead of Threats

Radware’s Threat Intelligence Subscriptions complement application and network security via constant updates of new threats, risks and vulnerabilities. By crowdsourcing, correlating and validating real-life attack data from multiple sources, Radware immunizes your DDoS protection system. It provides real-time intelligence for preemptive protection and enables multi-layered protection against all types of threats.

Radware’s Threat Intelligence Subscriptions

Enhance Radware’s DDoS protection and extend its automated, real-time behavioral threat analysis for preemptive protection.

Radware’s ERT Security Update Subscription (SUS) bolsters protection of network elements, hosts and applications against the latest security vulnerabilities and threats with rapid and continuous updates, as well as emergency updates for immediate response and environment-specific custom signatures.

Radware’s ERT Active Attackers Feed provides preemptive protection against DDoS attacks, scanners, anonymous proxies, IoT botnets and web application attacks by identifying and blocking known IP addresses that were recently involved in attacks in real time. It aggregates and correlates information from multiple sources making its data highly accurate.

  • Radware’s global threat detection and deception infrastructure
  • Cloud security customer network
  • ERT threat research group
  • Leading security vendors as part of the Cyber Threat Alliance

Radware’s Location-Based Mitigation solution helps protect data centers and networks against country-based DDoS attacks. It facilitates compliance with global regulations and meeting operational requirements. Radware’s solution allows for immediate ingress traffic filtering by country, based on geolocation mapping of IP subnets, ensuring dataflow alignment to organizations’ needs.

A network of globally distributed sensors – honeypots - running services that attract bots engaged in malicious activity around the world. Such bots are attempting to compromise, abuse and hack into computers, create new botnets and launch DDoS attacks.

The deception network attracts hundreds of thousands of malicious IPs, generating millions of events daily. The automatic analysis algorithms provide insights and categorization of various types of malicious activity from port scanning and reconnaissance through password Brute Force attempts to DNS reflection attacks.

Radware proprietary and patented algorithms running on the deception network are used to catalog and identify new and emerging threat actors, as well as to analyze malicious behavior designed to hide the attacker such as spoofing and anonymizing. Combining these creates a real time, non-spoofed IP list of malicious actors employing DDoS related behavior.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia