Information security is often divided into three attributes: availability, (data) integrity and confidentiality. We deliver technical solutions that correspond to each of these three aspects.
Unfortunately, Distributed Denial of Service (DDoS) attacks have become a fact of life. More and more organizations have to deal with them, sometimes on a daily basis. To be able to mitigate them successfully, regular network equipment is often not good enough. The use of specialist equipment is therefore indispensable.
TRANSLATION TO DO
Our Anti-DDoS service provides real-time security for your hosting and cloud-based applications against direct and indirect DDoS attacks. As part of Cyso’s managed security services, we provide a DDoS mitigation service that can automatically mitigate attacks based on Intrusion Detection behavior.
Important benefits are:
Naturally, having lots of visitors is good for your business, but the resulting load can also adversely affect the performance and availability of your application. That’s obviously something you want to prevent. We can help you avoid possible overload and failures in your platform by using intelligent load balancing and content delivery solutions specifically tailored to your applications and services.
With a firewall, you can control how contact with your platform and systems can be established. But a regular firewall can’t really see if strange anomalies occur in traffic through the authorized channels. By using Application Firewalls and Intrusion Detection/Prevention Systems, the content of the traffic can be checked in much greater detail. Besides checking and filtering traffic based on IP address and port, you can do so at the protocol and application level.
Using Layer 7 filtering and DPI (Deep Packet Inspection) you can detect and block malicious traffic based on patterns (such as SQL injects, XSS, malware and viruses). You can scan the contents of the data in order to detect whether there may be attempts to exploit potential vulnerabilities in an application or system. We offer various solutions using specialized equipment to make this possible.
To even more clearly create the conditions for correct use of your services and applications, we offer solutions for customized security profiles. You can use your own VDOMs in which you establish rules that correspond to the particulars of your services. With a VDOM, your gain access to your own dedicated, independent virtual security appliance. Each VDOM has its own interfaces, security profiles, routing, administration and many other options. This way, you can have a system that you can configure and customize to your own needs, without having to invest in expensive equipment yourself.
Often, you don’t want your services to be open up to the entire world, but sometimes you do not know from what location your users need access. The use of a Virtual Private Network (VPN) is a widely used solution for this.
You do not have to know where your users are located beforehand, as long as they can identify themselves. If a user does not have the right security credentials, access can already be blocked on the network level. Our specialized equipment includes functionality for configuring and managing different types of VPNs.
To establish more control over one who gets access to your systems and applications, you can add additional controls to establish their identity.
Besides the regular user name and password, you can deploy additional techniques. You can consider using private keys, security tokens, one-time passwords and other methods to provide two-factor authentication. Let us advise you and facilitate the right solution for you.