We use cookies to improve our site and your experience. By using this website, you accept our privacy terms.

Benefits

Data-driven Network Protection

Distributed defense architecture, which divide attacks into individual types and address them independently. Processing TBs of data on a daily basis, massive data and attack and defense samples; cloud-to-cloud association analysis, network-wide strategy synchronization.

Bot Identification and Management

Built-in threat assessment model to automatically identify attacks. Constantly updating defense rules combined with machine learning. Dynamic intelligence library to accurately manage bot traffic.

Quick Access

One-click access to rapidly initiate the bot management service.

Panoramic Scene Protection

Bot from both Web and APP intelligently identified and managed based on all kinds of terminal crawler characteristics learning.

Features

  • Intelligent Bot Recognition

    Intelligent recognition distinguishes normal requests from bot requests without disrupting user access, which ensures the security of the enterprise business and does not affect the user experience.

    • Dynamic intelligence library: including threat intelligence library and legitimate bot whitelist library, effectively improving the efficiency of bot recognition.
    • Detailed access control: multi-dimensional access frequency control, blacklist management, repeated violation punishment.
    • Client behavior verification: based on the unique identification of the client, identify the behavior characteristics of the client, and effectively addressing the issue accidental termination or misidentification based on IP granularity.
    • Honeypot trap: through honeypot traps, induce bot access to identify malicious bot traffic.
    • Attack and defense data feedback: network-wide threat intelligence, attack and defense data feedback strategy optimization
    • App request token authentication: define business request authentication token, and verify the validity of the request by endpoint
    • App operation environment detection: intelligently identify the abnormal environment characteristics such as simulator and high-risk system, and block the request initiated by this client
  • Bot Management

    Legitimate bot and malicious bot traffic management measures to prevent malicious bot traffic from occupying significant server bandwidth and computing resources, and reduce enterprise operating costs.

    • Real-time monitoring alerts: real-time monitoring of bot traffic, with online visual alerts, email alerts and SMS alerts.
    • Self-service bot management: users manage bot policies according to actual business requirements, and a custom bot processing mechanism to better align with business needs.
  • Visualization

    Bot traffic status is presented to the user in a visual report in real time, which is convenient for the user to gain insight into the business security situation and quickly adjust their defense strategies.

Scenarios

  • E-commers & Retail
  • Fintech
  • Transport & Mobility
  • Media and News

E-commerce retail industry has all types of marketing activities such as seckilling, and discounts. Perpetrators crawl through a large number of promotional resources with bot tools, reselling items for profit, affecting the normal operation of businesses.

  • Accurately identify real user requests and malicious traffic to prevent promotion resources from being preempted and member accounts from being stolen.
  • Due to the access behavior characteristics of e-commerce business, different bot traffic management strategies can be customized for better performance.

Once the core interfaces (login, registration, SMS, etc.) of financial industry applications are abused by hackers, further malicious acts are often carried out.

  • Through traffic analysis and behavior recognition model, prevent malicious registration, malicious login, event cheating, etc.
  • Effectively detect and intercept bot traffic and prevent abnormal crawler access.

The transportation industry suffers from malicious ticket ordering and orchestrating seat occupation, which affects the purchases from normal users; at the same time, concurrent ticket ordering requests also affects the business server.

  • Distributed platform blocks malicious bot traffic and reduces the load on the source server.
  • Prevent scalpers from ordering tickets, occupying seats maliciously and crawling ticket information.

Malicious crawls the core content of websites and copy them to other websites, which will greatly affect the ranking of the website in search engines, and lead to the decline of visitors and advertising revenue.

  • Effectively identify the latest bot features to prevent core content from being collected by competitors.
  • To prevent member information from being stolen.

Customer Cases

  • 宝尊
  • 国航
  • 迪卡侬
  • 我爱我家