Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Service

Hall 9 / Booth Number 9-311

indevis DDoS Protect

Video

south_east

Categories

Denial of service protection

Key Facts

  • Managed Security Service
  • Protects Web-Apps, Websites, DNS-Servers, IT-Infrastructures

Product Description

DDoS attacks can result in the company website being unavailable and important files and programs being inaccessible. This can have serious consequences for companies. By protecting against DDoS attacks, such attacks can be averted and you can save your company from work stoppages, loss of revenue and loss of image.

Botnets are used to initiate DDoS attacks on websites or web-based applications by sending a large number of incomplete or incorrect requests or protocol elements. With distributed denial of service attacks, hackers overload the network infrastructure with large amounts of data so that services are impaired in their functionality and are only available to a limited extent or not at all. With indevis DDoS Protect you can protect yourself from service interruptions caused by DDoS attacks.

Advantages of the indevis DDoS Protect service:

  • Multi-layered protection system with alerting function
  • Data processing through German infrastructure and policy based routing
  • Transparent, permanent filtering of traffic as well as 24/7 monitoring and attack analysis
  • Updating and revision of filter rules according to threat situation
  • Reporting on attacks with definable escalation and notification levels
... read more

Watch our product video

external video thumbnail
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.