What We Do: Cybersecurity

Managed DDoS Protection

Q1 2018 DDoS Report


DDoS attacks are becoming more common and any business with internet is a target.

SDN’s Managed DDoS Protection service monitors, reports and offers optional mitigation for Distributed Denial of Service attacks that can disrupt critical business services such as internet, email and websites.
 

What is a DDoS attack?

The goal of this type of cyberattack is to overwhelm the resources available to a network, application or service so that legtimate users are denied access. 
 

How does a DDoS attack work?

To carry out an attack, hackers recruit virus-infected computers to act as zombies. They then maliciously distribute robotic armies, or botnets, to attack your network’s digital resources such as computers and servers. That's what you see happening in the attack map at the bottom of this page. When your assets are overwhelmed, the attack cuts off legitimate users, denying them access to your business and its services.

How a DDoS Attack works

How to stop the attacks?

SDN offers multiple levels of protection as an additional service to our internet subscribers. In each package, our Managed DDoS Protection identifies the malicious traffic and has the ability to stop the bots through mitigation or deploying countermeasures on your internet pipe. Customers can receive alerts, 24x7 support and scheduled reports depending on the level of service.

 


 

Our quarterly Cyber Threat Landscape Reports are a collection of data from our Managed DDoS Protection and Managed Firewall services. They show businesses the cyber threat landscape and the malicious forces working against them.

Use the button below to get the latest intelligence report sent to you and future reports as they're released.

Get The Report   

 


 

Digital Attack Map

The map below is a snapshot in time of DDoS attacks happening throughout the world. The tool is a collaboration between Google Ideas and Arbor Networks. Click on the map to see a live version of reports of anonymous attack traffic, outages and historic trends.

Digital Attack Map

Resources

Recent Blogs