Eliminate network resource vulnerabilities and protect yourself from financial and reputational risks

    The most powerful DDoS attack in history occurred in March 2018 on the GitHub web service. According to the site’s owners, hackers tried to disable the service by crashing an attack of 1.35 Tbps. As a result, GitHub servers crashed for approximately 10 minutes.

    How to recognize a DDoS attack

    Inaccessibility of internal resources from the Internet
    Unexpectedly low network performance.
    Unavailability of one or more web services.
    A sharp increase in the number of spam emails received.
    Long-term denial of access to a network or other Internet services.

    In 2018 the number of DDoS attacks increased by 95%

    Types of DDoS attacks and their consequences

    Network congestion with spurious traffic - so-called flood
    A great number of zombie requests are sent to the attacked web source, which leads to a complete clog of the entire channel width or of the input router. Such an attack blocks the transmission of legitimate network traffic.
    Attacks through the protocol vulnerabilities
    Attacks exploit the limitations and vulnerabilities of various network protocols, causing a non-response server error.
    Overflowing of the operating system or applications
    The attack is aimed directly at the system itself. The attacker's goal is to force the program to exceed the limit of consumed compute capacity. As a result, the service is fully accessible, but doesn’t perform.

    Most vulnerable industries

    Why DDoS attacks are dangerous

    specific services are attacked.
    aim at system overload and a complete denial of service.
    attacks can disable the service for several hours or days.

    We guarantee integrated protection from DDoS attacks for your services

    Website protection from DDoS

    Proxying of the incoming traffic using the Stormwall filtering system. It is possible to connect protection at the L7 level of the OSI model and block the HTTP flood.

    IP protection from DDoS

    Filtering of all the types of malicious traffic through a GRE proxy tunnel or physically on the site. This service will allow you to block TCP and UDP packet flood.

    WAF protection

    Protection of web resources (personal accounts, payment systems, workflow, etc.) at the application level of the OSI model. Prevent hacker attacks, personal data collection, injection, and cross-site scripting (XSS). Fixation and blocking of the bruteforce attacks.

    You will also be interested in

      Network infrastructure backup
      Ensure fault tolerance and uninterrupted communication in the network infrastructure
      Additional DC services
      Get support from our experienced engineers to manage, monitor and configure your IT equipment in the data centers
    All services