DDoS védelmi szolgáltatás DDoS Protection as a Service

During the operation of the protection system, we continuously monitor the amount of internet traffic directed to your public IP address. We compare the traffic data collected against pre-set thresholds.

If our system detects an attack based on these thresholds, the traffic from the IP address likely to be under attack is automatically routed to our filtering system within 5 minutes. T

he filtering system cleans the redirected traffic by blocking the attacking traffic. This ensures that only cleaned traffic arrives, allowing your services to continue operating without disruption during the attack.

The redirection to the filtering system is based on adjustable thresholds. We define these thresholds in cooperation with you, even on a per-address basis.

You can filter bandwidth, the number of connections, and the number of packets per second. Additionally, you can filter the number of TCP, UDP, ICMP, and TCP SYN packets per second and their bandwidth.

If you detect an attack, but the automatic system has not detected it based on the limits, you can manually initiate a redirect to the filtering system.

DDoS-infografika

DDoS protection is primarily used to protect against volumetric attacks. In these attacks, the attacker’s goal is to consume bandwidth or resources of the server under attack.

It cannot or can only handle limited attacks against the application layer (Layer 7).

One of the requirements for this service to work is that your public internet traffic must pass through Rendszerinformatika’s IP network.

The parameters of the service include the bandwidth to be protected and the bandwidth of the attack, which is still being fended off by Rendszerinformatika.

This value is 10 Gbps for 1 Gbps Internet service and 40 Gbps for 10 Gbps Internet service. Above this limit, you can limit or suspend the internet service.

The above process, from attack start to effective defence, will start automatically within 5 minutes. If manual intervention is required for a successful defence, we will take care of this with a response time of 40 minutes.

If the protection system detects that the attack is completed, the redirection to the filtering system (defence) is automatically terminated after 5 minutes.

During the defence, the latency of the affected systems may increase.

An average increase of 15-20 ms is expected for domestic traffic and 5-10 ms for transit traffic.

Scroll down for more details

Business process protection solution

DDoS attacks can compromise not only the availability of websites but also entire corporate networks. Our goal is to help our customers protect themselves from these threats and ensure their business continuity.

Monthly fee service

Building a DDoS protection system, with the purchase of the necessary equipment, can add a heavy burden of tens of millions of dollars to a company’s budget. That’s why Rendszerinformatika has turned the technological advantage available into a monthly fee service. This makes the most advanced protection solutions available to its customers without the need for large investments.

Market-leading technology

To protect ourselves and our customers, we continuously improve our systems. We deploy leading technologies that can detect and block different types of attacks. This keeps our networks and systems up and running at all times.

Scalable performance

Scalable solutions allow you to flexibly increase or decrease performance to meet market needs. This ensures adequate protection against unexpected attacks while delivering optimal utilisation and cost savings.

Rapid expert support

We provide our customers with high-quality and fast expert support to help them solve problems or deal with potential attacks. This allows our customers to continue to run their business smoothly while we protect their backend.

Security Operations Centre

Our Security Operations Centre ensures centralised control and oversight of security incident management. This allows us to respond quickly to challenges and manage potential crises more effectively.

Kapcsolódó termékeink és szolgáltatásaink

Sérülékenység vizsgálat Vulnerability assessment

Vulnerability scan

Continuous monitoring Cost-effective Globaldatabases External and internal testing Security operations

Kapcsolódó cikkeink

Please select the subject of your enquiry from the drop-down list!
Both consents are required before we can contact you about your enquiry!
Notice: Our services are only available to companies
Érdeklődésének tárgyát kérjük válassza ki a lenyitható listából!
Mindkét hozzájárulás szükséges, hogy felvehessük önnel a kapcsolatot a megkeresése kapcsán!
Szolgáltatásaink csak cégek és gazdasági társaságok számára elérhetőek
WAN_meraki-tuzfal_isometric

Teljeskörű telephelyi védelem!

Töltse ki a mezőket és kérjen ajánlatot lorem ipsumra!

Havidíjas ajánlatunk csak cégek számára elérhető!
IT-sec_serulekenyseg-vizsgalat_730x750

Rendszeres külső sérülékenységvizsgálat

cégeknek már havi
14,9 EUR
/IP cím -től (+ÁFA)
Töltse ki a mezőket és kérjen ajánlatot sérülékenységvizsgálatra.
Havidíjas ajánlatunk csak cégek számára elérhető!