Distributed Denial of Service (DDoS) Protection

Product Description

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

Phinix by Hoopo offers the latest and most advanced deployment of DDoS detection and mitigation capabilities to scrutinize customer network traffic in real time to identify anomalies and quarantine attack packets. Only malicious traffic is blocked—legitimate traffic continues to flow through to serve legitimate users.

Distributed Denial of Service,هجمات حجب الخدمة الموزعة, حجب الخدمة

Product Features

·         DDoS protection against L3&4 (volumetric) attacks and L7 (application) attacks

·         Traffic monitoring, analysis and reporting via online portal

·         24x7 customer support and pro-active incident handling

·         Multiple deployment options (on-premises, and cloud based)

·         Performance based SLA

·         National Cybersecurity Authority (NCA) compliance.

·         Up to 4Tb bandwidth protection on local cloud and up to 11Tb on global cloud

Product Benefits

·         Reduce operational costs

·         Protection against volumetric attacks in-cloud to maintain your business continuity.

·         Blocks only malicious attack traffic without interrupting legitimate traffic to your network.

·         Performance Based SLA.

·         Proactive monitoring and protection to your network against DDOS attacks (available on 24x7)

Frequently asked questions

·         What is a DDoS attack?

Distributed Denial of Services (DDoS) attacks target corporate web sites, hosted applications or Network infrastructure by consuming all available bandwidth and disrupting access for legitimate customers and partners.

·         What are the type of DDOS Attacks?

Spoofed – Sending packets with a forged source address.

Malformed – Sending packets with abnormal bits or flags set.

Floods – Sending high rates of legitimately formed packets.

Null – Sending packets with no content or illegitimate protocol.

Fragmented – Sending packet fragments that will never be completed.

Protocol – Sending packet with illegitimate protocols.

Rate Limited – Sending packets that exceed defined flow rate thresholds.

·         What is ATLAS intelligence feed?

ATLAS is the world’s most comprehensive Internet monitoring and security intelligence system.


Subscription Method

·         Chooses a package; an offer is made to the customer, then the service is activated.

Have Query ?

Accept File Type: jpg,jpeg,png