Protect your organisation from DDoS attacks
The aim of a denial of service attack (DDoS) is to disrupt or delay a service, system or network so that it is unresponsive and unavailable to end-users. This goal can be achieved by cyber attackers by exhausting the resources of the target, such as consuming its bandwidth, disk space or memory. A distributed denial-of-service attack is a specific type of DoS attack that targets multiple devices or an entire network and is sometimes achieved by using a botnet of unsecured internet-connected or Internet-of-things (IoT) devices such as smart meters or baby monitors.
The types of DDoS attacks are broad from HTTP floods that aim to overwhelm a target server with HTTP requests to deny actual users access, to a SYN flood attack which aims to consume all a server’s resources by repeatedly sending initial connection request (SYN) packets. Our analytics platform and digital forensics solutions can help you to rapidly identify and prevent a DDoS attack, helping you to minimise the disruption to your organisation and the financial impact of a service DDoS attack. We often find that DDoS attacks are also used to obscure other types of attack. Our platform also helps our customers to look back and review an incident so that any remedial action or steps to prevent future cyber-attacks can be put in place.
The frequency of DDoS attacks has increased more than 2.5 times over the last 3 years
Global estimates of the total number of DDoS attacks are anticipated to double to 14.5 million by 2022
The number of IoT devices that are estimated to exist by 2020 is 20.4 billion
32 percent of serious DDoS attacks coincided with a network intrusion
The cost of a DDoS attack averages between £15,000 – £30,000 per hour
400GBPS FlowProbe: Network Traffic Monitoring
Monitor real time traffic information and network performance whilst using anomaly detection to maintain cyber security with our ultra high performance 4x 100GbE network traffic monitor.
100GBPS CERNE: INTRUSION DETECTION
100 Gbps IDS engine and alert driven packet recorder that enables 24/7 real-time network threats monitoring and access control.
400GBPS TRITON: CYBER WARFARE SIMULATION
Prove and enhance your cyber security posture with our Cyber Warfare Simulation tool and our world class SLA and advanced on-site/ off-site support.
TDAC: Digital Forensics
Unlocks network visibility and threat identification
DETECTING AND MITIGATING AN APPLICATION LAYER HTTP FLOOD DDOS ATTACK
Cybercriminals are increasingly using application layer Distributed Denial of Service (DDoS) to attack their victims.
BREAKING DOWN DDOS UDP FLOOD ATTACKS
A UDP flood is a type of volume based DDoS (Distributed Denial of Service) attack