Currently, I have two firewalls, with one located in Sorocaba, model 90D, and the other in São Paulo, model 30D. They are connected by VPN. I use the firewalls for VPN and final protection for my company, and my equipment is maintained by an internet company called Multiprox.
My company's clients use Fortinet FortiDDoS since it is a very good tool that is easy to use. The tool's GUI is really good. When it comes to the troubleshooting part, the tool functions very smoothly.
By deploying Fortinet appliances strategically, we aimed to secure and manage network traffic efficiently, safeguarding against threats and prioritizing performance for local operations in the Philippines.
Find out what your peers are saying about Fortinet, NETSCOUT, Radware and others in Distributed Denial-of-Service (DDoS) Protection. Updated: February 2025.
Distributed Denial-of-Service Protection solutions defend against massive disruptions by mitigating unwanted traffic, ensuring business continuity. They shield organizations from service outages and downtime that could affect performance and customer satisfaction.Understanding and managing Distributed Denial-of-Service attacks requires sophisticated technology capable of identifying and blocking malicious traffic patterns. These protections enable businesses to maintain access to online...
Currently, I have two firewalls, with one located in Sorocaba, model 90D, and the other in São Paulo, model 30D. They are connected by VPN. I use the firewalls for VPN and final protection for my company, and my equipment is maintained by an internet company called Multiprox.
My company's clients use Fortinet FortiDDoS since it is a very good tool that is easy to use. The tool's GUI is really good. When it comes to the troubleshooting part, the tool functions very smoothly.
By deploying Fortinet appliances strategically, we aimed to secure and manage network traffic efficiently, safeguarding against threats and prioritizing performance for local operations in the Philippines.
We use the solution to protect our network from attacks.
Our primary use case of this solution is for security purposes.
We use it to protect our users and their data.