Anti DDoS

First Scenario - Your server receive legitimate traffic

The end-user is a legitimate user of your application or website and clean traffic is received by your server from this user's PC. This is the regular traffic mode, in which, your server is not exposed to any risk. Your service is sending and receiving information via the internet without being interrupted by any terminal or stopped by any attack.

Second Scenario - Your server receive DDoS attacks

The end-user is a legitimate user of your application or website and clean traffic is received by your server from this user's PC, but this time, another kind of traffic is also present - Malicious Traffic - which targets your server. This is the anti-ddos mitigation mode, in which, your server is protected by our scrubbing farm and firewalls from the bad traffic, which is detected and cleared before reaching your server and harm your application or website.

Frequently Asked Questions

  • What is the maximum traffic capacity ?

Our systems can handle a lot of traffic capacity, current margins are over 950 Gbps and growing.

  • What type of attacks does it stop ?

It stops all types of DoS/DDoS attacks and even if one attack may get though, our system will automatically detect new patterns and update the filter rules.

  • Will my response time increase while DDoSed ?

No. Our filter is physically located in our Romanian datacenter, so there's no extra routes or hops.

  • Can I re-sell your DDoS Protection ?

Yes you can! It can be done via a GRE/VPN Tunnel or by setting up a BGP Session and route all traffic over that BGP.

  • How is this service charged ? Per IP or per Service ?

The Anti-DDoS solution is charged once per customer. All services ordered by a customer who has this system active, will benefit from it.

  • Does it require any technical work from my side ?

If you are our customer and have rented servers or colocation services, then no. All setup work is done by our tech teams.

  • Can I order this service outside of your datacenter ?

Yes you can. This can be done via a virtual tunnel or via a physical fiber between our datacenters and then we'll setup a BGP session.

  • Does it cover even the Layer 7 ?

It covers all layers and can protect any application. If you have a non-standard application, please contact us and we'll adjust our filters.

Under Attack?

Obtain a custom quote!