{"id":77953,"date":"2025-12-01T08:32:26","date_gmt":"2025-12-01T00:32:26","guid":{"rendered":"https:\/\/www.wingwill.com.tw\/?p=3314"},"modified":"2025-12-01T08:32:26","modified_gmt":"2025-12-01T00:32:26","slug":"ddos-wafl7-threat-protection","status":"publish","type":"products","link":"https:\/\/www.wingwill.com.tw\/ja\/products\/ddos-wafl7-threat-protection\/","title":{"rendered":"DDoS &#038; WAF(L7) Threat Protection"},"content":{"rendered":"<h3 class=\"wp-block-heading\">Service Overview<\/h3>\n\n\n\n<p>As application and cloud technology develop in recent years, more and more businesses have switched to cloud platforms for their services and suffer from attacks more frequently. Early DDoS attacks focused on L3 and L4 layers. However, in recent years, there has been more focus on L7 attacks. On top of that, businesses should also pay attention to attack actions that deploy multiple DDoS methods at the same time.<\/p>\n\n\n\n<p>Analysis on previous attacks shows that some were by hackers who launched an UDP flood in the first 10 minutes, then an HTTP flood, and finally an ICMP flood. A mix of flood attacks increases the complexity and not simply the volume of the attack. This makes cybersecurity more difficult because now businesses have to analyze and respond to attacks of different protocols and resources.<\/p>\n\n\n\n<p>Many businesses take a traffic scrubbing service from an ISP provider when under a DDoS attack because it is convenient. However, such a service will hurt your user experience or even create service abnormality when your bandwidth is not high enough.<\/p>\n\n\n\n<p>Akamai Web Application Protector is a new generation DDoS\/WAF protection solution. It can easily protect against terabyte-level DDoS attacks on the L3\/L4 layers with its CDN platform. It can also analyze attacks on L7 layer and defend them. In addition, it integrates with cybersecurity threat information globally to realize regional joint defense. You will never have to worry about potential DDoS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Features<\/h3>\n\n\n\n<p><strong>\u25cf Fast Deployment<\/strong><br>A wizard helps you deploy security configuration for Akamai Web Application Protector and start protecting your applications in just a few steps.<\/p>\n\n\n\n<p><strong>\u25cf Accurate Detection<\/strong><br>Akamai Web Application Protector identifies threats accurately through analysis on models of attacks that helps updating Akamai\u2019s detection logic. You do not have to manage cybersecurity policies.<\/p>\n\n\n\n<p><strong>\u25cf Automatic API Checks<\/strong><br>Akamai Web Application Protector checks JSON and XML automatically.<\/p>\n\n\n\n<p><strong>\u25cf DDoS Protection<\/strong><br>Akamai Web Application Protector protects your applications against DDoS attacks. It can stop attacks at the Network Layer (L3) automatically at Akamai Edge Servers. It can also respond to attacks at the Application Layer (L7) within seconds so that your application will not be overloaded.<\/p>\n\n\n\n<p><strong>\u25cf Automatic Update<\/strong><br>Akamai continuously and transparently updates its Web Application Protector by monitoring attacks that target large online companies.<\/p>\n\n\n\n<p><strong>\u25cf Improve Performance<\/strong><br>Thanks to Akamai Content Delivery Network, the performance improvement features such as advanced load balancing can improve the performance of your website even when attacks occur.<\/p>\n\n\n\n<p><strong>\u25cf Value-Added Integration<\/strong><br>Akamai WAP offers the following modules to increase protection in different aspects:<\/p>\n\n\n\n<p><strong>\u25cf FastDNS<\/strong><br>It is capable of recovering from the largest DDoS attacks. It is built on a globally distributed Anycast network. You may use it for your main or backup DNS service to replace or strengthen your existing DNS infrastructure.<\/p>\n\n\n\n<p><strong>\u25cf Site Shield<\/strong><br>Site Shield provides an additional layer of defense by cloaking websites and applications from the public Internet. This will help prevent attackers from directly targeting the application origin by forcing traffic to go through the Akamai Intelligent Platform.<\/p>\n\n\n\n<p>\u25cf<strong> Bot Manager<\/strong><br>It offers your business a fiexible framework to better manage the large number of crawlers that visit your website. It recongnizes crawlers that visits your website for the first time and different types of crawlers. In addition, it implements an appropriate management strategy for specific crawlers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Steps of Implementatio<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Step 1: Apply for Akamai Resources<\/strong><\/li><\/ul>\n\n\n\n<p>You need to provide the following information to apply for Akamai resources:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Current peak volume value and average traffic volume on your website<\/li><li>Contact person, including first name, last name, an email and a phone number.<\/li><li>The FQDN and IP of your website to be optimized, e.g. dsa.wingwill.com.tw<\/li><\/ul>\n\n\n\n<p><br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Step 2: Apply for Website Credential, Set Up Platform, and Publish<\/strong><\/li><\/ul>\n\n\n\n<p>You will need to provide your website credential to finish your application.&nbsp; Then, we will set up and publish your setting to Akamai\u2019s network.&nbsp; You will need to add a new FQDN and IP, e.g. orig-dsa.wingwill.com.tw, for Akamai Edge Server inquiries.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Step 3: Change DNS Pointing to Your Site and Direct Traffic to CDN Platform<\/strong><\/li><\/ul>\n\n\n\n<p>We will replace your DNS A records with CNAME pointing to an Akamai Edge Server FQDN, e.g. wingwill.com.tw.edgekey.net<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Step 4: Analyze Traffic Volume &amp; Security Events and Adjust<\/strong><\/li><\/ul>\n\n\n\n<p>Akamai provides comprehensive analysis reports on your traffic volume and cybersecurity events.&nbsp; Akamai\u2019s Security Center reporting and analysis tools get your business notified and gather important data such as critical time points, affected scope, and attack methods for you so you can react to security incidents immediately. &nbsp; These build-in reports help your business understand user inquiry behavior, traffic status and site content optimization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Is This for My Business?<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>&nbsp;I want to acquire DDoS and WAF protection with the least changes to my system<\/li><li>I want to simplify IT operation management and lower the cost of purchasing &amp; maintaining cybersecurity equipment<\/li><li>I want a cybersecurity solution that can scale with my business growth<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Service Architecture<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Akamai WAP stops threats &amp; attacks at the edge node closest to your end user<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2020\/07\/%E6%B1%BA%E6%88%B0%E5%A2%83%E5%A4%96%EF%BC%8CAkamai-WAP-%E5%B0%87%E5%A8%81%E8%84%85%E8%88%87%E6%94%BB%E6%93%8A%E9%98%BB%E6%93%8B%E5%9C%A8%E6%9C%80%E9%9D%A0%E8%BF%91%E7%94%A8%E6%88%B6%E7%AB%AF%E7%9A%84Edge%E7%AF%80%E9%BB%9E-1024x576.png\" alt=\"\" class=\"wp-image-2432\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Akamai WAP consists of 4 core features<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2020\/07\/Akamai-WAP%E5%85%B7%E5%82%99%E5%9B%9B%E5%A4%A7%E6%A0%B8%E5%BF%83%E5%8A%9F%E8%83%BD-1024x473.png\" alt=\"\" class=\"wp-image-2434\"\/><\/figure>\n\n\n\n<p>Network Firewall<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Bypass\/White List<\/li><li>Block IP Address List&nbsp;<\/li><li>Block GEO Location List<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>DoS Protection<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Layer 3\/Layer 4 Protections<\/li><li>Rate Limiting<\/li><li>Slow POST Protection<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li>Web Application Firewall<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>SQL Injection (SQLi)<\/li><li>Cross-Site Scripting (XSS)<\/li><li>Local File Inclusion (LFI)<\/li><li>Remote File Inclusion (RFI)<\/li><li>Command Injection (CMDi)<\/li><li>Denial of Service Attack (DoS)<\/li><\/ul>\n\n\n\n<p>     4.  Custome Rules<\/p>\n\n\n\n<p>\u5716\u7247(Akamai FastDNS offers a fast, reliable, and safe DNS service)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>High Availability<\/strong><\/li><\/ul>\n\n\n\n<p>Akamai FastDNS makes use of the Akamai Intelligent Platform and offers advanced DNS availability through several DNS servers at several entry points around the globe.&nbsp; FastDNS promises 100% uptime in SLA, so that you can always be sure that your customer and employees can connect to your website and application servers.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Fast Response<\/strong><\/li><\/ul>\n\n\n\n<p>You can improve your DNS response ability by using an advanced DNS server when the network situation requires it.&nbsp; The globally distributed Anycast network can quickly analyze FastDNS from your users around the world.&nbsp; In addition, Zone Apex Mapping feature on Akamai reduces DNS lookup times and increases the performance of your web application even further.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Resistance to DDoS Attacks<\/strong><\/li><\/ul>\n\n\n\n<p>For those DDoS attacks that target DNS infrastructure and try to disrupt your web and application servers, FastDNS offers a highly scalable DNS platform that has enough capacity to resist the largest DDoS attacks while responding to authorized user requests at the same time.&nbsp; Even under an attack, you will be able to offer users a solid user experience.<\/p>","protected":false},"excerpt":{"rendered":"<p>Service Overview As application and cloud technology develop in recent years, more and more businesses have sw [&hellip;]<\/p>","protected":false},"author":7,"featured_media":740,"menu_order":97,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"sector":[],"solutions":[],"brand":[],"class_list":["post-77953","products","type-products","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.5 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DDoS &amp; WAF Threat Protection<\/title>\n<meta name=\"description\" content=\"As application and cloud technology develop in recent years, more and more businesses have switched to cloud platforms for their services and suffer from attacks more frequently.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wingwill.com.tw\/ja\/products\/ddos-wafl7-threat-protection\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS &amp; WAF(L7) Threat Protection - WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34\" \/>\n<meta property=\"og:description\" content=\"As application and cloud technology develop in recent years, more and more businesses have switched to cloud platforms for their services and suffer from attacks more frequently.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wingwill.com.tw\/ja\/products\/ddos-wafl7-threat-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WingWillCo.ltd\/\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1900\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/\"},\"author\":{\"name\":\"Chen Enfys\",\"@id\":\"https:\/\/www.wingwill.com.tw\/#\/schema\/person\/b9809ad749ffc04c733fa34746bc1440\"},\"headline\":\"DDoS &#038; WAF(L7) Threat Protection\",\"datePublished\":\"2025-12-01T00:32:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/\"},\"wordCount\":1086,\"publisher\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg\",\"keywords\":[\"Akamai\",\"DDoS\",\"DNS\"],\"articleSection\":[\"Solutions\",\"Security Cloud\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/\",\"url\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/\",\"name\":\"DDoS &amp; WAF Threat Protection\",\"isPartOf\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg\",\"datePublished\":\"2025-12-01T00:32:26+00:00\",\"description\":\"As application and cloud technology develop in recent years, more and more businesses have switched to cloud platforms for their services and suffer from attacks more frequently.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage\",\"url\":\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg\",\"contentUrl\":\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg\",\"width\":1900,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\/\/www.wingwill.com.tw\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u89e3\u6c7a\u65b9\u6848\",\"item\":\"https:\/\/www.wingwill.com.tw\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DDoS &#038; WAF(L7) Threat Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wingwill.com.tw\/#website\",\"url\":\"https:\/\/www.wingwill.com.tw\/\",\"name\":\"WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34\",\"description\":\"Cloud Solution Provider\uff5c\u7fbd\u6607\u570b\u969b\u70ba\u96f6\u58f9\u79d1\u6280\u767e\u5206\u4e4b\u767e\u6295\u8cc7\u7684\u96f2\u7aef\u670d\u52d9\u4f9b\u61c9\u5546\uff0c\u4ee5\u5c08\u696d\u6280\u8853\u8207\u7d93\u9a57\u6df1\u8015\u96f2\u7aef\u5e02\u5834\uff0c\u70baGoogle Cloud\u3001Akamai\u3001\u5fae\u8edf\u3001AWS \u7b49\u5404\u570b\u969b\u5927\u5ee0\u4e4b\u5408\u4f5c\u5925\u4f34\uff0c\u63d0\u4f9b\u61c9\u7528\u670d\u52d9\u50b3\u905e\u3001\u96f2\u5730\u6df7\u5408\u57fa\u790e\u8a2d\u8a08\u3001\u96f2\u7aef\u5b89\u5168\u7ba1\u7406\u3001\u5927\u6578\u64da\u5206\u6790\u7b49\u56db\u5927\u670d\u52d9\uff0c\u5354\u52a9\u4f01\u696d\u52a0\u901f\u6578\u4f4d\u8f49\u578b\uff0c\u63d0\u4f9b\u6700\u4f73\u7684\u96f2\u7aef\u9632\u8b77\u89e3\u6c7a\u65b9\u6848\u3002\",\"publisher\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/#organization\"},\"alternateName\":\"WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wingwill.com.tw\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wingwill.com.tw\/#organization\",\"name\":\"WingWill \u7fbd\u6607\u570b\u969b\",\"alternateName\":\"WingWill \u7fbd\u6607\u570b\u969b\",\"url\":\"https:\/\/www.wingwill.com.tw\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.wingwill.com.tw\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2025\/11\/logo.png\",\"contentUrl\":\"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2025\/11\/logo.png\",\"width\":955,\"height\":955,\"caption\":\"WingWill \u7fbd\u6607\u570b\u969b\"},\"image\":{\"@id\":\"https:\/\/www.wingwill.com.tw\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WingWillCo.ltd\/\"],\"email\":\"service@wingwill.com.tw\",\"telephone\":\"02 2656 5630\",\"legalName\":\"\u7fbd\u6607\u570b\u969b\u80a1\u4efd\u6709\u9650\u516c\u53f8\",\"taxID\":\"52811521\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wingwill.com.tw\/#\/schema\/person\/b9809ad749ffc04c733fa34746bc1440\",\"name\":\"Chen Enfys\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.wingwill.com.tw\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8dd4805ae5a55e6c0ceb3adb825b9cb840c911f0540b0ebf28091093aa70fb88?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8dd4805ae5a55e6c0ceb3adb825b9cb840c911f0540b0ebf28091093aa70fb88?s=96&d=mm&r=g\",\"caption\":\"Chen Enfys\"},\"url\":\"https:\/\/www.wingwill.com.tw\/ja\/author\/enfys-chenzerone-com-tw\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DDoS &amp; WAF Threat Protection","description":"As application and cloud technology develop in recent years, more and more businesses have switched to cloud platforms for their services and suffer from attacks more frequently.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wingwill.com.tw\/ja\/products\/ddos-wafl7-threat-protection\/","og_locale":"ja_JP","og_type":"article","og_title":"DDoS & WAF(L7) Threat Protection - WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34","og_description":"As application and cloud technology develop in recent years, more and more businesses have switched to cloud platforms for their services and suffer from attacks more frequently.","og_url":"https:\/\/www.wingwill.com.tw\/ja\/products\/ddos-wafl7-threat-protection\/","og_site_name":"WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34","article_publisher":"https:\/\/www.facebook.com\/WingWillCo.ltd\/","og_image":[{"width":1900,"height":1080,"url":"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#article","isPartOf":{"@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/"},"author":{"name":"Chen Enfys","@id":"https:\/\/www.wingwill.com.tw\/#\/schema\/person\/b9809ad749ffc04c733fa34746bc1440"},"headline":"DDoS &#038; WAF(L7) Threat Protection","datePublished":"2025-12-01T00:32:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/"},"wordCount":1086,"publisher":{"@id":"https:\/\/www.wingwill.com.tw\/#organization"},"image":{"@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg","keywords":["Akamai","DDoS","DNS"],"articleSection":["Solutions","Security Cloud"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/","url":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/","name":"DDoS &amp; WAF Threat Protection","isPartOf":{"@id":"https:\/\/www.wingwill.com.tw\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg","datePublished":"2025-12-01T00:32:26+00:00","description":"As application and cloud technology develop in recent years, more and more businesses have switched to cloud platforms for their services and suffer from attacks more frequently.","breadcrumb":{"@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#primaryimage","url":"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg","contentUrl":"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2019\/12\/ww-KV_4-2-1_DDoS\u8207WAFL7\u5a01\u8105\u9632\u8b77_1900x1080px-3.jpg","width":1900,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.wingwill.com.tw\/products\/ddos-wafl7-threat-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/www.wingwill.com.tw\/"},{"@type":"ListItem","position":2,"name":"\u89e3\u6c7a\u65b9\u6848","item":"https:\/\/www.wingwill.com.tw\/products\/"},{"@type":"ListItem","position":3,"name":"DDoS &#038; WAF(L7) Threat Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.wingwill.com.tw\/#website","url":"https:\/\/www.wingwill.com.tw\/","name":"WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34","description":"Cloud Solution Provider\uff5c\u7fbd\u6607\u570b\u969b\u70ba\u96f6\u58f9\u79d1\u6280\u767e\u5206\u4e4b\u767e\u6295\u8cc7\u7684\u96f2\u7aef\u670d\u52d9\u4f9b\u61c9\u5546\uff0c\u4ee5\u5c08\u696d\u6280\u8853\u8207\u7d93\u9a57\u6df1\u8015\u96f2\u7aef\u5e02\u5834\uff0c\u70baGoogle Cloud\u3001Akamai\u3001\u5fae\u8edf\u3001AWS \u7b49\u5404\u570b\u969b\u5927\u5ee0\u4e4b\u5408\u4f5c\u5925\u4f34\uff0c\u63d0\u4f9b\u61c9\u7528\u670d\u52d9\u50b3\u905e\u3001\u96f2\u5730\u6df7\u5408\u57fa\u790e\u8a2d\u8a08\u3001\u96f2\u7aef\u5b89\u5168\u7ba1\u7406\u3001\u5927\u6578\u64da\u5206\u6790\u7b49\u56db\u5927\u670d\u52d9\uff0c\u5354\u52a9\u4f01\u696d\u52a0\u901f\u6578\u4f4d\u8f49\u578b\uff0c\u63d0\u4f9b\u6700\u4f73\u7684\u96f2\u7aef\u9632\u8b77\u89e3\u6c7a\u65b9\u6848\u3002","publisher":{"@id":"https:\/\/www.wingwill.com.tw\/#organization"},"alternateName":"WingWill \u7fbd\u6607\u570b\u969b - \u5168\u65b9\u4f4d\u96f2\u7aef\u3001\u8cc7\u5b89\u670d\u52d9\uff0c\u6578\u4f4d\u8f49\u578b\u597d\u5925\u4f34","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wingwill.com.tw\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.wingwill.com.tw\/#organization","name":"WingWill \u7fbd\u6607\u570b\u969b","alternateName":"WingWill \u7fbd\u6607\u570b\u969b","url":"https:\/\/www.wingwill.com.tw\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.wingwill.com.tw\/#\/schema\/logo\/image\/","url":"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2025\/11\/logo.png","contentUrl":"https:\/\/www.wingwill.com.tw\/wp-content\/uploads\/2025\/11\/logo.png","width":955,"height":955,"caption":"WingWill \u7fbd\u6607\u570b\u969b"},"image":{"@id":"https:\/\/www.wingwill.com.tw\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WingWillCo.ltd\/"],"email":"service@wingwill.com.tw","telephone":"02 2656 5630","legalName":"\u7fbd\u6607\u570b\u969b\u80a1\u4efd\u6709\u9650\u516c\u53f8","taxID":"52811521"},{"@type":"Person","@id":"https:\/\/www.wingwill.com.tw\/#\/schema\/person\/b9809ad749ffc04c733fa34746bc1440","name":"Chen Enfys","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.wingwill.com.tw\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8dd4805ae5a55e6c0ceb3adb825b9cb840c911f0540b0ebf28091093aa70fb88?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8dd4805ae5a55e6c0ceb3adb825b9cb840c911f0540b0ebf28091093aa70fb88?s=96&d=mm&r=g","caption":"Chen Enfys"},"url":"https:\/\/www.wingwill.com.tw\/ja\/author\/enfys-chenzerone-com-tw\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/products\/77953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/products"}],"about":[{"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/types\/products"}],"author":[{"embeddable":true,"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/comments?post=77953"}],"version-history":[{"count":0,"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/products\/77953\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/media\/740"}],"wp:attachment":[{"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/media?parent=77953"}],"wp:term":[{"taxonomy":"sector","embeddable":true,"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/sector?post=77953"},{"taxonomy":"solutions","embeddable":true,"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/solutions?post=77953"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.wingwill.com.tw\/ja\/wp-json\/wp\/v2\/brand?post=77953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}