network background popup

Data Center Defender (DCD)

Cloud based DDoS protection for network infrastructure

solution

Concerned that your network infrastructure could be a target of malicious traffic?

This is one of the worst scenarios to be in, depending on what type of business you have, a hacker can flood your network with 100’s of Gb/sec of traffic targeting any IPs that are part of your network infrastructure.

Without adequate and tested protection in place your whole data center, websites, applications or corporate network access will cease to function, and you will be at the mercy of your network provider to solve the problem.

We all know how quick network providers are to snap into action and solve problems in a timely fashion!

The misconception

Network engineers employed by corporations or hosting operations are under the impression that their ISP or upstream provider will take care of a large network flood of nuisance traffic that’s overwhelming their link to the Internet.

Without a prearranged agreement in place with your network provider you may be out of luck. Then there are the network providers who claim to be able to handle a DDoS flood of traffic but have little or no experience handling such large volumes of traffic in a timely fashion, especially when the target is rotating on different IPs inside your network.

Reality check

ISP's, hosting providers and network providers will not allow an attack on your network to negatively impact other customers. The immediate solution for them is to null-route or black-hole your IP space, you lose but your provider saves their other customers.

Not sure if your network can handle a DDoS attack on your infrastructure ?

Then you should test it……… Try our DDoS attack platform. Learn more here.

Why Use DOSarrest’s Data Center Defender Platform ?

  • Protect any amount of IP space in any global location
  • Volumetric traffic anomalies are continuously monitored every few seconds
  • AI generated rulesets- analyzes traffic, packet by packet for sophisticated anomalies in near real-time (10Sec) and blocks the malicious traffic
  • Immediate intelligent mitigation, no traffic learning period required
  • Asymmetric routing for ultimate performance
  • Define thresholds on a single IP address or as large as a /16 network
  • Traffic analysis – See what’s passing through any interface inside your network real-time using our customer portal
  • Reporting - Interactive graphical displays for historical and real-time stats with “one click” filters
  • Multiple configuration options, Always-on, on-demand and auto fail-back
  • Multiple connectivity options, GRE tunnels, exchange points or direct connect
  • Stateless operation allows for asynchronous traffic analysis and mitigation
  • Employs 3rd party reputation-based databases to block known malicious IPs & domains
  • Supports permanent blacklists and/or whitelists
  • All traffic types are analyzed including MPLs traffic, great for NSP’s

There are 3 options available to configure the DCD platform:

BGP Based Trigger

In this type of configuration, customers configure a BGP session with DOSarrest, over which they can announce their netblocks anytime. This will cause all visitors to that netblock to come into the DOSarrest network, where the attack traffic will be scrubbed, and clean traffic tunneled/routed back to the customer network.

Control method: Customer controlled

Modes of Operation: “Always on” or “hotstandby”

Connectivity Options: GRE, IPsec, direct connect, MPLS/VPLS, Equinix Cloud Exchange, Cloud WAN.

Flow Based Trigger

For customers who do not have BGP capabilities and/or would like to have automated mitigation in place and are able to export Network Flows (Netflow/Jflow/Sflow) to the DCD platform. The DCD platform will analyze incoming flows, and automatically modify routing for effected netblocks and immediately mitigate the attack once it starts to come into the DOSarrest network. Once the attack is over, routing is restored back to normal.

Control method: Automatic

Modes of Operation: “Always on” or “hotstandby”

Connectivity Options: GRE, IPsec, direct connect, MPLS/VPLS, Equinix Cloud Exchange, Cloud WAN.

Secure Stack

For customers who are not able to do option 1 or 2, and have a server or stack that needs DDoS protection. Typical customers of this service are organizations who are co-locating their servers, or using a public cloud (eg. AWS or Rackspace).

Users of this service are allocated a Secured DOSarrest IP/IP’s, which they configure on their servers. A tunnel is created from the DOSarrest network to the server(s), over which the Secured IP(s) is routed.

Control method: Customer controlled

Modes of Operation: “Always on” or “hotstandby”

Connectivity Options: GRE or IPsec.

Reporting and Analytics:

By far the most in depth and comprehensive analytics available today !!

Not only see any attack in real-time, you can also see in depth traffic analytics anywhere to anywhere inside or traversing to the Internet even when your traffic isn’t flowing through DOSarrest

The DCD platform is supported 24/7/365 by our SOC and can be a fully managed service.