SCDN
SCDN
By integrating edge Cloud WAF, edge cloud anti-DDoS, and the global edge whole site acceleration edge network, it realizes one-stop edge security acceleration capability and effectively defends against web attacks, vulnerability exploitation, system intrusion, content tampering, backdoor exploitation, CC and DDoS attack threats for website/APP/API business in gaming, e-commerce, finance, healthcare, portal, achieving fast, secure and stable access effect for business.

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages
More Convenient One-Click Security And Compliance Construction

More Convenient One-Click Security And Compliance Construction

Based on a cloud-native secure edge network, the plug-in injects security capabilities based on multi-engine (“AI + semantics + intelligent rules”) vulnerability protection, DDoS attack protection, Bot management, sensitive data leakage prevention, effectively solving various application security problems such as vulnerability attacks, sensitive data leakage and business continuity attacks, and completing resolution access in one click to meet compliance requirements such as testing and evaluation of classified protection of cybersecurity.
More Reliable Failover In Seconds

More Reliable Failover In Seconds

Based on the global heterogeneous resource scheduling technique, Baishan edge security acceleration realizes distributed multi-active disaster tolerance and switch to available security edge nodes in seconds in case of a node failure to realize impact-free user access.
More Stable And Always On-Line

More Stable And Always On-Line

Based on intelligent origin backup of MSHA, priority response, content analysis, and other techniques, it automatically backs up the latest content of the origin to realize MSHA without origin modification and automatically starts the mirror disaster recovery system when the origin fails to keep the business always available.
Faster Proximity Access

Faster Proximity Access

The globally distributed security edge nodes can achieve proximity access and proximity cleaning for users, enabling users to experience fast and secure millisecond-level access.
More Economical On-Demand Activation

More Economical On-Demand Activation

Enable on-demand services according to business needs, providing clients with a more economical and flexible service model with optional protection capabilities.
More Controllable Visible Security Posture

More Controllable Visible Security Posture

Provide a comprehensive and various 2D/3D rotatable visualization of cyberspace security large screen, enabling visual tracking of the real threats and protection situation, pinpointing threats, and quickly tracing the attack source.
Product Feature
undefined undefined

Vulnerability Intrusion Protection

Comprehensive coverage of OWASP common attacks, effectively protecting against SQL injection, cross-site scripting, remote command injection, Webshell upload, vulnerability scanning, and other common Web attacks, and real-time updating 0day vulnerability and rule database.
undefined undefined

Cross-Protocol DDoS Defense

It fully supports HTTP, HTTPS, TCP, UDP, and other protocols to effectively defends against ICMP Flood, SYN Flood, SYN-ACK Flood, ACK Flood, FIN-RST Flood, TCP fragmentation attack, TCP port exhaustion attack, UDP Flood, UDP fragmentation attack and other types of attacks to protect business continuity.
undefined undefined

CC Attack Protection

Based on the application layer CC attack intelligent identification algorithm defense engine, combined with the kernel firewall, IP reputation library, device fingerprint library, behavioral verification code, etc., to block CC attacks in seconds. The custom protection models based on business characteristics are supported to customize proprietary protection policies for different business scenarios and control user access accurately and flexibly.
undefined undefined

Bot Attack Protection

Built-in hundreds of known Bot intelligence databases, relying on big data analysis technology, combined with threat intelligence to identify real people and Bot behaviors, effectively defending against Bot attacks.
undefined undefined

API Security

Detect API risks (such as sensitive data leakage, internal interface exposure, etc.), implement orchestration, authentication, and traffic restriction management are implemented for APIs to protect API from being exploited for privilege escalation in its life cycle.
undefined undefined

Intelligent Origin Backup

Intelligent origin backup automatically synchronizes the content of the origin to maintain public services when the origin fails or being tampered with.
undefined undefined

IPv6 Compliance Rebuilding

Self-adaptive IPv6 dual stack helps customers achieve fast compliance.
undefined undefined

Sensitive Data Leakage Prevention

Sensitive data is masked to prevent data leakage.
Application Scenarios

One-Stop Application Security Protection

Secure Application Acceleration

One-Stop Application Security Protection

Secure Application Acceleration

Through SaaS-based services, it provides one-stop application security protection for website/APP/API businesses in the fields of government and enterprises, gaming, e-commerce, finance, healthcare, portals, etc. to guarantee business stability, continuity, and security, and effectively defend against Web attacks, vulnerability exploitation, content tampering, backdoor exploitation, and CC and DDoS attack threats.

undefined

While safeguarding application security, it provides customers with high-quality security acceleration services through global secure edge nodes and intelligent scheduling to guarantee fast business response and enhance user experience and satisfaction.

undefined
Customer Case