DDoS Protection Managed Service


DDoS Protection Managed Service for Enterprise and SMEs



Protect



> Defend critical applications, network, websites and web applications.

> Business services and online based revenue streams (e-commerce).

> Protection your brand and reputation.

> Mitigate high-volume and complex DDoS Attacks.


> Protect Internet-facing infrastructure, services against all known types of DDoS attacks.

> Seamless inter-operability between on-premise devices, cloud platforms.

> Mitigate against the largest DDoS attacks launched in the world (the high packet per-second DDoS floods that bring down sites and the 'low and slow' Layer 7 DDoS attacks on HTTP and HTTPS (SSL/SSH encrypted) traffic.







DDoS Monitoring – Detection - Mitigation Service

 


Features



> Available as an always-on or on-demand service

> 24x7 managed services supported global SOCs (security operation centre teams)


> Data processed through dedicated Tier1 global data centres.


> Bandwidth processing capacity of 2+ Tbps

 

> IP Masking - acts as a secure proxy, masking the actual IPs of the origin server to prevent direct-to-IP DDoS attacks.
 

> Proactive monitoring of your traffic from global security operations centers.
 

> Global intelligence driven security approach.
 

> DDoS traffic cleaning.
 

> Protect your assets in public cloud services like Amazon AWS.
 

> DNS and BGP redirect
 

> Multiple Datacentre locations ready to automatically failover and provide your service continuity.
> Web application firewall protection against attacks, including cross-site scripting (XSS), buffer overflow exploits, and SQL injection.
 

> Identifies potential DDoS events in their early stages is critical to mitigating them before they can impact organisations. This ensures rapid detection of any abnormal activity.
 

> Cloaking feature that hides your customers origin from the public Internet.
 

> Maintain website availability and performance during DDoS attacks.
 

> Traffic Profiling: In order to better help identify the early stages of an attack, the service spends time profiling what your ‘normal’ traffic patterns and behaviour look like, in order to set a bench mark.
 

> When an attack is detected (usually by detected preliminary attack patterns) only the cleaned traffic is allowed through to customer. 

> Traffic is filtered at various different layers of the OSI stack.
 

> Traffic re-routed only when a full attack is detected, to minimise disruption.
 

> Continued use of Internet service whilst under attack.





Identifying unknown threats

Service providers use every combination of intrusion detection technologies, human expertise and global intelligence in order to identity and stay one step ahead of attacks that are launched daily 24/7.

Attacks are always evolving, lessons learned from mitigating them feed into on-going research and development to help identify new threat signatures.





DDoS Advisory

  • Help prepare your businesses’ people, polices and processes in the event of a DDoS Attack.
  • Review your DDoS incident response plan. Identify and fix issues discovered through gap analysis exercises.
  • Assess your infrastructure to identify and protect high-risk areas.
  • Advice on emerging threats and likelihood of coming under attack to assist your selection of the right defences.



DDoS Forensics & Attack Analysis Service

 

Research teams, digital forensics and post-event analysis, provides a shared a global view of security threats, vulnerabilities and trends. By identifying the sources and associated attributes of individual attacks, along with best practices to identify and mitigate security threats and vulnerabilities, the DDoS service helps organisations make more informed, proactive decisions.



DDoS Protection - On Premise Solution

The need for a comprehensive DDoS Protection Managed Service

DDoS attacks have increased dramatically in size and complexity, the task of protecting our Internet-scale services has pushed the limits of on-premise off-the-shelf DDoS detection and mitigation technology. Today, it takes more than bandwidth and tech to block attacks - you need a combination of everything, including experienced and dedicated services.

Don’t rely on automated firewalls and intrusion detection appliances to protect you from DDoS attacks – you need a dedicated team of experts who can pro-actively react in real-time.

You need cloud-based security to protect your on-premise and cloud-based applications from attack, data theft, and fraud so you can avoid expensive breach investigation and legal costs, downtime and damaged brand / reputation.

Mitigate the risk of becoming over run by attacks with a DDoS protection managed service.