We use cookies to make your experience better. By continuing to browse the site, you agree to this.
OK
Log in
Ask

Protection of individual
IP addresses and services

If you run your services on one host, but do not control the entire network, we can offer an easy-to-install cloud security solution

How it works

Protection in Always-On mode

We provide an IP address from out network and set up a scheme to return filtered traffic to your resources using leased lines or VPNs. The reverse proxy mode can be configured to protect websites. After that, you can announce the services and configure their protection using the web portal

DNS Server Protection

If you use the IP address we provided as the DNS server address, we act as a secure proxy server and prevent illegal DNS requests from reaching your server, while simultaneously masking it from attacks at the network layer directly. In addition, we are able to cache DNS requests which relieves the load and improves the availability of your service

Protection of specific protocols

In the Always-On mode, we conduct a continuous granular analysis of traffic packets for compliance with the standard behavior profile. The learning takes a period of a few minutes to a few days, after which we can guarantee a minimum number of false positives

Our advantages

  • World class global SOC
    24/7 support for our solutions
  • Integrated approach
    Synchronous protection against DDoS attacks for infrastructure and individual IP addresses or web-applications
  • Advanced Technologies
    Efficient adaptation of filtering rules during an attack
Enterprise
For resources taking into account requirements and SLA requirements
Custom
Business
Optimal SLA for sites with high traffic
199 EUR/month
The basic unit of billing is a resource, which is an IP address or subnet and an SLA level
Tariffs
Reliability and performance
2 fault-tolerant filtration centers in each geographical area
Each filtering center is integrated into several Tier-1 ISPs to ensure network availability
Up to 80 GB* per second per client under attack in TCP connection establishment mode
Up to 5 TB/s reflected volume attack power
Consult an expert
To find the optimal solution
Contact sales
Ask an Expert
Under attack