DDoS Protection
Automated Distributed Denial of Service Attack Mitigation
Automated Threat Detection and Mitigation
Distributed Denial of Service (DDoS) attacks are becoming a major risk to service availability of mission critical, internet-based applications.
DDoS protection blocks threats before they reach you and your firewall protecting your business against revenue loss without the need for expensive hardware, software, or specialists.
DDoS protection ensures that your business can effectively manage cyber extortion threats, and that your network and services are available 24 hours a day, seven days a week, 365 days a year.
Explore DDoS protection featuresWhy choose Colt DDoS protection?
-
Network-based
The solution is implemented directly in the network – no rerouting, tunnelling or specific IP requirements.
-
Automated
Protection is triggered within seconds, as soon as DDoS attack is detected, without the necessity for human intervention, rerouting or tunnelling.
-
Flexible
Customers can define their clean traffic bandwidth and tailor the solution to their mission critical traffic. We support both IPv4 and IPv6 infrastructure.
-
Resilient
Your solution is deployed across the Colt IP backbone at strategic locations, ensuring the highest possible availability.
-
Fixed Cost
You pay a fixed monthly fee based on your clean traffic bandwidth only, regardless of the number or size of attacks.
-
Emergency Protection
For non-DDoS protection customers, we are able to protect you on an emergency basis (within a few hours).
Questions? We're here to help.
Speak with one of specialists today. We’re here to offer advice, provide further information and to answer any queries you may have.
DDoS Protection explained
-
Cyber extortion, also known as ransomware attacks, are crimes where your data and systems are held hostage until demands for payment are met. Triple extortion is the latest tactic to be used, and comprises 3 individual types of attack:
1. Data theft – sensitive business data is extracted with the threat of distributing and publishing it online
2. File encryption – valuable files and systems are encrypted preventing business access to critical data
3. DDoS attack – day-to-day operations are disrupted by overwhelming websites, servers or other critical infrastructure with traffic -
The key to effective mitigation is the ability to identify and block attack traffic while allowing non-attack traffic to flow through to its intended destination.
We provide a full suite of countermeasures that remove attack traffic while enabling the flow of legitimate traffic – providing mitigation from a wide range of attack profiles, from high-volume flood attacks designed to exhaust bandwidth capacity to the most complex volumetric, TCP-state exhaustion and application-layer DDoS attacks.
Our protection methods include identifying and black-listing malicious hosts, IP location-based mitigation, protocol anomaly-based filtering, malformed packet removal and rate limiting (to gracefully manage non-malicious demand spikes).
Mitigations can be automated or left to be manually triggered by the customer.
-
Yes. Our real-time mitigation dashboard is a single screen that shows users exactly what is generating a DDoS alert and what effect the countermeasures are having on the attack.
If requested, it also provides the ability to modify countermeasures and delivers full packet capture and decodes to get a detailed view of both normal and attack packet streams. This information is stored for future reference and management reporting.
-
With Colt DDoS protection, you get an entire team of IT-security specialists to help protect your business.
Our Security Operations Centre (SOC) experts can analyse and diagnose any security concern. We work 24/7 so can mitigate live security issues as they develop in real-time and work fast to protect you.
-
Even if you don’t have a DDoS mitigation service from Colt we can still provide emergency protection, while under attack or when attack is imminent. Emergency protection does not require any installation and can be activated within hours, for any Colt IP Access customer.
Our Customers
Need more information?
Speak with one of specialists today. We’re here to offer advice, provide further information and to answer any queries you may have.