DDoS protection

Comprehensive cloud-based service for protecting websites, applications, and the entire IT-infrastructure against DDos attacks.

Professional protection against DDoS attacks

The solution ensures business continuity and resource availability. It prevents disruptions caused by malicious traffic, while at the same time allowing good traffic to pass through, keeping resources, applications, and services available to users. With DDoS protection, even in the event of a serious attack, the traffic does not come in directly, but is first cleared.
Anti-DDoS from Cloud4Y easily integrates with your infrastructure hosted in our IaaS cloud. Neither data transfer nor additional set-up, software installation or equipment purchase is required. Cleaning options are tailored specifically to your facility's requirements.

Service
DDoS protection
Cost
from $70,75

The service is based on DDoS Guard. The price is specified without initial payments for installation and setup.

 

How it works? 

Cloud4Y has a geo-distributed traffic filtering network, which has direct connections to the networks of TIER-1 level operators, allowing you to reliably and quickly check the incoming traffic flow. The filtering nodes are in the following locations:

  • Amsterdam, the Netherlands

  • Frankfurt, Germany,

  • Moscow, Russia,

  • Tokyo, Japan,

  • Washington, USA

The existing topology allows receiving and local filtering of large volumes of traffic without creating excessive load on the core operators and without losing network connectivity during attacks.


 how-traffic-flows-during-at.gif

Types of DDos protection

Anti-DDoS Basic - Protection at the Network Protocol Level

Cloud4Y protection modules filter traffic, delivering only legitimate requests, preventing channel traffic congestion. In the event of an attack, you are provided with a dedicated IP address/cluster of IP addresses from the protected subnet, and the provider accepts and filters all traffic coming to the dedicated IP. Using equipment from world leaders in DDoS protection and monitoring, you will receive legitimate traffic already filtered out. 

The protection system operates in the mode of permanent traffic filtering, which allows you to effectively block all the known kinds of DDoS-attacks from the first anomaly packet or flow.

DDoS Protection at the Application Protocol Level

All connections to your applications go through a filtering complex. The Web Application Firewall (WAF) analyzes and cleans up application layer traffic for HTTP/HTTPS, DNS, SIP, etc., taking into account the specifics of a particular application.

The technology we use is a reliable solution as a firewall for web applications, which ensures fast, reliable and secure delivery of critical web applications. The solution meets PCI DSS security requirements by reducing web application threats and vulnerabilities, preventing theft and manipulation of important corporate data, and protecting customer information. The solution also reduces the risk of your enterprise IT infrastructure being used to attack other companies.


Why trust Cloud4Y
14 years in cloud computing
Since 2009 the company successfully operates on Russian and international cloud services markets.
Reliable infrastructure
4 TIER III data centers, Enterprise level hardware and software: HP, Cisco, Juniper, NetApp, VMware, Veeam, Microsoft, etc.
SLA 99.982%
Optical ring, MetroCluster and redundancy mechanisms guarantee fault tolerance of services up to SLA 99.99%.
Transparent Billing Options
Hourly billing and pay-as-you-go allow you to pay only for the resources consumed.
Geo-Distributed Backup
Automatic backup (14 restore points) in a separate remote data center.
Flexible scalability
You can add and reduce the amount of resources without need to contact technical support service.
24/7 technical support
If any technical issue occurs, our team of support experts is available round-the-clock, response time is 10 minutes.
Partner Program
Earn up to 35% of your annual contract. White Label is available.


Prices

Cost of DDoS filtering services

 
Guard Start
Guard 10
Guard 20
Guard 50
Guard 300
Guard Unlimited
DDoS attack load
1 Gb/sec     
1 Gb/sec     
3 Gb/sec     
10 Gb/sec
10 Gb/sec
unlimited
Traffic load after cleaning
3 Mbit     
10 Mbit
20 Mbit
50 Mbit
300 Mbit
unlimited
SLA
95%
97%
97%
99%
99%
99%
Response time to request for technical support
30 minutes
30 minutes
30 minutes
30 minutes     
30 minutes     
15 minutes
Payment for traffic above what is included*
0 $
0 $
0 $
0 $
0 $
0 $
Monthly payment, $
82,08
210,07
272,68
410,4
637,73
1265,44

* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge. 
Advantage: large detection base, lower false positives and support by high-level specialists.

The cost of WAF services

 
WAF 3
WAF 10
WAF 20
WAF 50
WAF 300
WAF Unlimited
DDoS attack load
1 Gb/sec
1 Gb/sec     
3 Gb/sec     
10 Gb/sec
10 Gb/sec
unlimited
Traffic load after cleaning
3 Mbit 
10 Mbit 
20 Mbit 
50 Mbit 
300 Mbit 
unlimited
SLA
99%
99,5%
99,5%
99,5%
99,5%
99,5%
Response time to request for technical support
30 minutes     
30 minutes
30 minutes
30 minutes     
30 minutes     
15 minutes
Payment for traffic above what is included*
0 $
0 $
0 $
0 $
0 $
0 $
Monthly payment, $
79,3
203,12
258,76
370,06
550,92
968,28

* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge.

One-time payments


Service
Cost
Installation and setup
62,6 $
Connection during a DDoS attack
104,34 $       


FAQ

Frequently asked questions (FAQ)

1. What is DDoS?
DDoS (Distributed Denial of Service) is a hacker attack from multiple distributed points on the Internet on a computer system in order to disable it. In other words, it is the creation of conditions such that legitimate users will not be able to access system resources (servers) or this access will be significantly hindered.

2. Why do hackers launch attacks?
DDoS attacks on an online shop or corporate portal are often organised at the behest of competitors in order to disable them and consequently reduce sales or reputation. However, there are also unintentional attacks - for example, if your site is visited by a huge number of users simultaneously, far more than your site can handle. " Weak" hosting in this case can not withstand and "falls". If this happens, you need to switch to higher bandwidth rates or change your hosting provider.

3. How to protect resources from DDoS?
The right solution is to choose a hosting provider with effective protection system against DDoS-attacks.

4. Will a basic firewall help protect against DDoS attacks?
It won't. The goal of today's DDoS attacks is to execute the network channel of the targeted service. It's a brute force technique whereby hundreds or even thousands of infected devices, forming a so-called "botnet", send parasitic traffic to the target service. As a result, legitimate users cannot access the attacked service because the entire network bandwidth is busy and there is no free bandwidth available. Firewalls have no role here, as they are not involved in the process, and it no longer matters if they filter out the parasite traffic or not.

The task of anti-DDoS-hoster: having redundant network channels with a wide bandwidth of tens Gbps, with geographically distributed access to the Internet, as well as having redundant hardware routers/firewalls, to receive all traffic on its own hardware, filter it on specialized analyzers and deliver to the client service only legitimate traffic.

Find more answers to your questions  in our knowledge base. If you do not find an answer, ask our manager using online-chat or send an inquiry using the ticket system.

Send a request
Let our managers know if you are interested in a solution or a service. They will contacts you within 2 hours.
You also can request a free trial access here
Scroll up!