Protection against UDP flood attacks. Non-legitimate traffic to your IPs is analysed and cleaned up instantly thanks to network behaviour anomaly detection and application session analysis.
Monitoring
A complete platform for monitoring your traffic. An intuitive display shows you incoming, blocked, and legitimate traffic flows in real-time (updated every 5 seconds).
Support
Our team of security experts will guide you through the deployment process. You will then have access to four hours of security systems engineering services to configure your set-up and ensure your solution is constantly tailored to your needs.
Protection against all DDoS attacks (UDP/TCP/ICMP). Non-legitimate traffic to your IPs is analysed and cleaned up instantly thanks to network behaviour anomaly detection and application session analysis.
Monitoring
A complete platform for monitoring your traffic. An intuitive display shows you incoming, blocked, and legitimate traffic flows in real-time (updated every 5 seconds).
Alerting
Proactive alerts sent to five contacts of your choice by email or text message in the event of an attack or trigger. Detailed information available on the attack (type, source, IP and port targeted, etc.)
Support
Our team of security experts will guide you through the deployment process. You will then have access to eight hours of security systems engineering services to configure your set-up and ensure your solution is constantly tailored to your needs.