Rule-based Policy
The typical firewall today, uses session tables to manage DoS/DDoS attacks, which can become saturated by the attack’s flood, bringing the firewall down. TG8, on the other hand, uses an innovative rules-based policy to manage DoS/DDoS attacks (none-volumetric), making the TG8 DPI Firewall immune to these nefarious attacks.