PRODUCTS & SOLUTIONS
Securing your infrastructure
DDoS Protection
Have you been the victim of a DDoS attack or are you being blackmailed with a potential attack? Do not hesitate to contact us immediately. We will assist you in averting this danger for you and your company.
WHAT IS A DDOS ATTACK?
A DDoS attack is an attack on a network
from hijacked computers worldwide with the objective of overloading a server. The data on the server, for instance your internet website or your online shop, thus become inaccessible. A DDoS attack is primarily used for a political protest as well as to damage
a competing company.
It is no longer any wonder that more and more of the registered attacks affect online sellers
and in that way jeopardise their existence.
CAN WE PROTECT YOU AGAINST SUCH ATTACKS?
Yes! This is because our backbone, with a capacity far in excess of 16.000Gbps, offers protection against all imaginable attack scenarios. We can offer you three different products that protect you against DDoS attacks. They are flexibly combinable with other products. Since such crimes occur more frequently in our time we are making an active contribution to putting an end to criminal activities of this kind and consequently they are becoming less attractive.
TOGETHER WE WILL FIND THE BEST SOLUTION FOR YOU.
Together with our partners, we offer you a comprehensive service package – tailored to your needs,
when it comes to network solutions, IT infrastructure
or server hosting.
TOGETHER WE WILL FIND THE BEST SOLUTION FOR YOU.
WHY DDOS PROTECTION FROM CORE-BACKBONE?
Our network has a capacity of over 16 Tbps. We have more than ten years of professional experience in warding off DDoS attacks. Simply combine our DDoS protection with one of your existing services from us. In that way it is not necessary, as it is with other providers, to configure a GRE tunnel.
The protection bandwidth is freely scalable
from 10G to 10.000G.
Features
- Static filter rules
- Dynamic filter rules based on FlowSpec forward per BGP multihop sessions
- Dynamic filter rules based on FlowSpec configured via the client’s website interface
- Automatic attack recognition for flooding attacks on the basis of volume, ICMP, packet rates and additional criteria
- Optional extension by NetScout Arbor Sightline to get even more insights about the attack and to do a detailed traffic analysis
- No deterioration of latencies