Service composition

  • Connecting to the service
  • Technical support
  • Access to the service personal account
  • Reporting (on request)

Goals and values

  • Protection against a variety of DDoS attacks across L3/4 and L7 of the OSI model, including attacks on:
    • - network infrastructure
    • - protocol stack
    • - applications
  • Ability to filter resources published with or without FQDN (external IP addresses / external subnets only).
  • Minimal changes in the Customer's infrastructure to ensure protection (no sensors / equipment on the Customer's side)
  • Unlimited traffic filtering bandwidth
  • Possibility of HTTPS filtering without decryption (without encryption certificate transfer) and with decryption (if the Customer provides the encryption certificate).
  • Ability to manually manage IP white and black lists
  • Response time (start of filtering) to a DDoS attack – no more than one minute
  • Provision of clear and understandable reporting on the service efficiency
  • Ranking of detected attacks and scans by criticality level
  • Guaranteed level of protected services availability
  • Flexible charging system

Algorithm for connection

1

Filling out the application

2

Coordination of requirements

3

Enabling protection

Try it out

Let’s talk about how to improve the security and efficiency of your IT and cyber security systems