Benefits
The benefits of DDoS Defense
Improved Security Posture
By having countermeasures in place, like DDoS Defense, you minimize the impacts of attacks and expedite recovery, if necessary. You can thereby reduce risks to your operations.
Protection against volumetric DDoS
DDoS Defense works within our IP backbone network to filter out malicious traffic, and as a global service provider that sees large amounts of traffic as well as mitigates malicious activities on a daily basis, we are well-positioned to help guard against network attacks.
Managed Services
Having the right managed services provided is everything. We have a proven history of successful DDoS mitigation since 2003. We leverage the same expertise to protect our customers that we use to protect ourselves. You can rest easy knowing that your network is being monitored 24x7 by some of the most informed cybersecurity professionals in the industry.
Cost Effective
Our multi-tiered pricing model offers cost-effective protection to fit your organization's budget requirements.
Visibility
DDoS Defense provides easy access to alert and mitigation summaries, anomaly reports, traffic information, email trap alerts, and consolidated security information. Through the DDoS Portal, conveniently accessible via the BusinessDirect® website, you can maintain IP addresses for mitigation or make adjustments to authorized contacts.
Security that grows with your business
Our DDoS Defense offers are not bandwidth restrictive, so as you as your business expands, completes acquisitions, or adopts new business initiatives, DDoS Defense can easily continue to protect your business.
Features and options
Features |
Details |
---|---|
On-Demand and Automatic Mitigation | We perform detailed traffic analysis and can identify anomalies in near real time. After detection, the malicious traffic can be sent to scrubbing facilities via our backbone and block them. If at any point you believe you're under attack, you can contact us to launch a mitigation]. We also offers an optional Platform-Initiated Mitigation (PIM) feature to detect traffic anomalies faster using an automated, machine-based trigger to activate mitigation. |
24/7 Monitoring by our Threat Management Team | Our Threat Management Team monitors your targeted data flows and validates or escalates alarms for mitigation as appropriate. |
Protection across carriers | DDoS Defense capabilities are available to customers on non internet circuits within the U.S. so you can protect all of your traffic. |
Web portal access | Through the web portal, you can easily access alert and mitigation summaries, anomaly reports, traffic information, email trap alerts, and consolidated security information. Conveniently located through the BusinessDirect® website, you can also maintain IP addresses for mitigation or make adjustments to authorized contacts. |
Unlimited and Unmetered Mitigations | There is no limit on the number of mitigations a customer can have or no limit on the bandwidth size of an attack |
Multi-tiered Pricing | Our multi-tiered pricing model offers cost-effective protections to fit your organization's budget requirements. |
Flexible Mitigation Activation | Manual and pre-authorized mitigation trigger options let you choose how to trigger the mitigation process. With the manual trigger, we get authorization from your designated contact before we initiate mitigation. If you choose pre-authorized mitigation, we start mitigation as soon as we investigate an alert and confirm it as a DDoS attack. This option can reduce response times to attacks |
Related products
Network-based firewall
Firewall service designed to offer highly secure connections for our transport customers, adding another layer of defense to their data.
Premises-based firewall
Fully managed solution designed to help defend against unauthorized connections to your LANs.