DDoS Protection

Automated Distributed Denial of Service Attack Mitigation

Automated Threat Detection and Mitigation

Distributed Denial of Service (DDoS) attacks are becoming a major risk to service availability of mission critical, internet-based applications.

DDoS protection blocks threats before they reach you and your firewall protecting your business against revenue loss without the need for expensive hardware, software, or specialists.

DDoS protection ensures that your business can effectively manage cyber extortion threats, and that your network and services are available 24 hours a day, seven days a week, 365 days a year.

Explore DDoS protection features

By using Colt for both Internet access and cyber security services, we have enabled stability in our online trading system while significantly reducing TCO.

Mr. Takahiro Yamazaki & Ms. Tomomi Takahashi Systems Engineering, Infrastructure Team, au Kabucom Securities Co

Why choose Colt DDoS protection?

  • Network-based

    The solution is implemented directly in the network – no rerouting, tunnelling or specific IP requirements.

  • Automated

    Protection is triggered within seconds, as soon as DDoS attack is detected, without the necessity for human intervention, rerouting or tunnelling.

  • Flexible

    Customers can define their clean traffic bandwidth and tailor the solution to their mission critical traffic. We support both IPv4 and IPv6 infrastructure.

  • Resilient

    Your solution is deployed across the Colt IP backbone at strategic locations, ensuring the highest possible availability.

  • Fixed Cost

    You pay a fixed monthly fee based on your clean traffic bandwidth only, regardless of the number or size of attacks.

  • Emergency Protection

    For non-DDoS protection customers, we are able to protect you on an emergency basis (within a few hours).

Questions? We're here to help.

Speak with one of specialists today. We’re here to offer advice, provide further information and to answer any queries you may have.

DDoS Protection explained

  • Cyber extortion, also known as ransomware attacks, are crimes where your data and systems are held hostage until demands for payment are met. Triple extortion is the latest tactic to be used, and comprises 3 individual types of attack:

    1. Data theft – sensitive business data is extracted with the threat of distributing and publishing it online
    2. File encryption – valuable files and systems are encrypted preventing business access to critical data
    3. DDoS attack – day-to-day operations are disrupted by overwhelming websites, servers or other critical infrastructure with traffic

  • The key to effective mitigation is the ability to identify and block attack traffic while allowing non-attack traffic to flow through to its intended destination.

    We provide a full suite of countermeasures that remove attack traffic while enabling the flow of legitimate traffic – all without interrupting the network – whether it’s a high-volume flood attacks designed to exhaust bandwidth capacity, stealth application-layer attacks or attacks hidden in SSL.

    Our protection methods include identifying and black-listing malicious hosts, IP location-based mitigation, protocol anomaly-based filtering, malformed packet removal and rate limiting (to gracefully manage non-malicious demand spikes).

    Mitigations can be automated or left to be manually triggered by the customer.

  • Yes. Our real-time mitigation dashboard is a single screen that shows users exactly what is generating a DDoS alert and what effect the countermeasures are having on the attack.

    If requested, it also provides the ability to modify countermeasures and delivers full packet capture and decodes to get a detailed view of both normal and attack packet streams. This information is stored for future reference and management reporting.

  • With Colt DDoS protection, you get an entire team of IT-security specialists to help protect your business.

    Our Security Operations Centre (SOC) experts can analyse and diagnose any security concern. We work 24/7 so can mitigate live security issues as they develop in real-time and work fast to protect you.

  • Even if you don’t have a DDoS mitigation service from Colt we can still provide emergency protection, while under attack or when attack is imminent. Emergency protection does not require any installation and can be activated within hours, for any Colt IP Access customer.

Need more information?

Speak with one of specialists today. We’re here to offer advice, provide further information and to answer any queries you may have.