DDoS Protection for Business Critical Systems

Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.

Flowmon DDoS Defender. Are you ready to go offline?

Flowmon DDoS Defender Screenshot

product-img_Defender.png

Unavailability of a critical customer application or a crash of the internal system as consequence of a DDoS attack can cause financial loss, reputation damage or security risks. Are you ready for DDoS?

Flowmon DDoS Defender is a scalable anti-DDoS solution. It leverages statistics from routers or dedicated network probes with an advanced network traffic analysis for real-time detection of volumetric attacks led against HTTP/HTTPS applications and systems. It provides the state of the art detection of DDoS, deep understanding of attack characteristics and a full-range of methods for successful attack mitigation.

With Flowmon DDoS Defender businesses benefit from:

Advanced defenses. Use different methods of redirection (PBR, BGP, RTBH, Flowspec) and advanced script triggers. Weaken DDoS attacks by using BGP Flowspec, which directly applies filter or redirection policies.

  • Advanced mitigation capabilities. Utilize different methods of traffic diversion (PBR, BGP, RTBH, Flowspec) and advanced script triggering. Mitigate DDoS by using BGP Flowspec which quickly distributes filtering or traffic redirection policies.
  • Artificial intelligence. The Defender observes and learns the traffic characteristics while requiring minimum intervention from the user. Define segments, rules, utilize dynamic baselining and intelligent adaptive thresholds to protect your services.
  • Automatic detection. Fast detection of DDoS is the key for mitigation. DDoS defender identifies the attack within a single minute, immediately alarms the respective administrator (e-mail, syslog, SNMP, SMS) and dramatically reduces time to carry out remedial action.
  • Quick time-to-value. In a matter of minutes you will have up and running an active anti-DDos protection. Without any infrastructure or topology changes or any additional investments in the network
  • Comprehensive reporting and immediate alerting. Utilize dynamic baselining of traffic volumes and characteristics, independent configurations for different customers, services, network segments ond other features.
  • Universal deployment. Robust and versatile architecture allows the protection of any environment with the collection of flow statistics. It is capable of protecting even 100G networks. The Defender can be also easily deployed with Scrubbing centres or with a specialized out-of-band mitigation solution to eliminate an attack

DDoS Protection for Internet Service Providers

Protection of high-speed networks and an effective mitigation of DDoS attacks is one of the key challenges for internet service providers and backbone operators today. Flowmon DDoS Defender is capable of protecting even 100G networks and it is fully prepared for multi-tenant environments. Therefore it is an ideal solution for ISPs to provide their customers with DDoS protection as a service (MSSP).
Flowmon for ISPs DDoS Protection of high-speed networks

https://www.flowmon.com/getmedia/86e4c785-b4f3-429a-98c0-6b59066d7147/photo-img_03.aspx?width=345&height=222

 

Datasheet

Pdf_icon.png

Awards

 

icon iso 9001 icons iso 27001 RH Winners Logo 
 Cisco partner deloitte VMware alliance
We are happy to advise you and look forward to hearing from you!

NEOX - Location

Our partners

IT Security made in Germany TeleTrusT Quality Seal


Contact Details

NEOX NETWORKS GmbH
Otto-Hahn Strasse 8
63225 Langen / Frankfurt am Main
Tel: +49 6103 37 215 910
Fax: +49 6103 37 215 919
Email: info@neox-networks.com
Web: http://www.neox-networks.com
Your route to us >>