60+ traffic models, defense against 100+ types of DDoS attacks, and second-level attack response.
In-line deployment to defend against volumetric attacks and applications.
Association with anti-DDoS devices of upstream carriers or ISPs to defend against flood attacks.