Wangsu DDoS Mitigation Service (DMS for short), is based on the globally distributed CDN resources up to 10Tbps mitigation capacity, and offers proprietary mitigation algorithms combined with the big data enabled intelligence. It detects and mitigates various types of DDoS attacks (such as SYN Flood, ACK Flood, UDP Flood, HTTP Flood, etc.) in real time, and ensures website availability under volumetric DDoS attacks.
Forms a network of cloud security enabled by big data analytics against web application attacks. Based on the self-learning protection engine, WAF can detect and counter zero-day attacks timely to protect websites from sensitive info leakage, data tampering, and web defacement to ensure website security.
Wangsu BotGuard relies on big data analytics and forms a bot management network. BotGuard detects and analyzes real time traffic, distinguishes traffic from legitimate users, benign bots, and malicious bots. It sets management policies according to different types of bot traffic, and protects customer data against unfair competitive advantages. adopting intelligence database, client-side rate limit, client-side fingerprining, bot trap, machine cognition, and etc.
The network security emergency response service is to discover and confirm network security events such as hacking, denial of service attacks, unauthorized network communication, system operation, website page tampering, abnormal traffic attacks, network worm propagation, etc. Respond to disposal to reduce possible risks and losses. The service provides customers with professional technical guidance and resources to improve security, resist attacks and perform security repairs.
Network-based penetration testing service, which is combined with vulnerability scanning tools, penetration testing tools, network protocol analysis tools, etc. to simulate possible attacks on target systems, and further discover systems and applications based on security vulnerability scanning. , web hidden security vulnerabilities, to prevent hackers from infiltrating the client system and stealing sensitive information. At the same time, repair guidance is provided based on the results of the penetration test.
The Network Vulnerability Scanning Service uses a self-developed vulnerability scanner to perform comprehensive security vulnerability scanning on specified target systems. The service relies on a powerful vulnerability database and 100,000+ vulnerability detection scripts to drill down into various security vulnerabilities. All kinds of scanning items are strictly tested by security experts, and timely follow up on the newly exposed security vulnerabilities on the network to ensure the accuracy and timeliness of scanning.