DDoS IP Protection

Protect your IP and infrastructure against DDoS attacks.

Contact Us

Why DDoS Protection?

DDoS attacks are becoming increasingly popular among hackers, which means organizations are at an increased risk of becoming a victim of an attack. If you are not DDoS protected, your organization's revenue may be affected and your brand's reputation can be irreparably damaged in the process.

Our DDoS Protection solution uses globally located detectors and scrubbing centers that recognize and protect you from volumetric- and protocol-based DDoS attacks on your servers.


How does it work?

DDoS Protection Scrubbing
DDoS Protection Throttling

Throttling

Our DDoS Protection solution deliberately regulates the data transfer rate of the traffic. If traffic/data requests are abnormally high, the allowed transfer of data will be limited to prevent server overload as a means of attack, resulting in DDoS mitigation.

DDoS Protection Detecting

Detecting

Traffic comes into the border router of our network, where it is analyzed based on various characteristics, profiles and possible denial of service attack methodologies. When malicious traffic is detected, it is directed to the scrubbing center.

DDoS Protection Scrubbing

Scrubbing

When the DDoS traffic is identified, the scrubbing center mitigates the malicious traffic and then forwards the clean traffic to your infrastructure with little to no impact to the end user.

The right package for your business needs

Standard

All of our dedicated servers, colocation and cloud services come with our free Standard DDoS IP Protection, which handles volumetric attacks up to 5 Gbps. This package protects you with a mitigation time of 2-3 minutes and includes automated e-mail notifications.

Volumetric attacksUp to 5Gbps*
Protocol-based attacksUp to 2.5k pps
Application layer attacks
DDoS mitigation time2-3 min.
Support during business hours
24/7 Support
Reporting on request
Customizable profiles
Automatic on-demand mitigation
Always on (in-line) mitigation
Automated e-mail notification

FREE

Always On

The Always On (in-line) algorithmic mitigation protects you against any type of DDoS attack that may take place. This service gives you the fastest possible response to a Layer 3, 4 and 7 DDoS attack, with a mitigation time of less than 90 seconds.
 

Volumetric attacksn x 10Gbps**
Protocol-based attacksn x 6k pps**
Application layer attacks
DDoS mitigation time<90 sec.
Support during business hours
24/7 Support
Reporting on request
Customizable profiles
Automatic on-demand mitigation
Always on (in-line) mitigation
Automated e-mail notification
Contact Us

Customized

Get additional protection that’s fully customizable to your traffic patterns. Protects you against volumetric- and protocol-based attacks (layer 3 and layer 4) of up to 40Gbps, as well as those on the application level (layer 7) with a mitigation time of 2–3 minutes.
 

Volumetric attacksUp to 40Gbps*
Protocol-based attacksUp to 20k pps
Application layer attacks
DDoS mitigation time2-3 min.
Support during business hours
24/7 Support
Reporting on request
Customizable profiles
Automatic on-demand mitigation
Always on (in-line) mitigation
Automated e-mail notification
Contact Us

*We rate-limit well-known attacks before they reach our scrubbing centers. Actual figures are much higher.
**"n" is the number of Always-On DDoS Protection devices.

Resources

Webinar

How to Secure your Website from Cyber Attacks

Be aware of cyberattacks and learn how you can protect yourself with WAF and anti-DDoS solutions.

Watch

Webinar

Cybersecurity: The nightmare before Christmas

Do you want to know how you can protect your holiday sale from DDoS and web application attacks.

Watch

Webinar

Experience a DDoS attack and mitigation

Discover how you can use our cloud platform to beat DDoS attacks, which are becoming more and more frequent and costly.

Watch

Webinar

Security: Don't gamble with your security

Learn more about the dangers for the gambling/gaming industry and how you can prevent attacks.

Watch

White Paper

Report: The true cost of a Web Application Attack

Find out about financial effects of attacks and how to protect yourself.

Download

Contact an expert

Talk to one of our experts

Our highly qualified Leaseweb staff are on-hand to help you get the right fit for your business.

Start Live Chat   Email Us  

Or click here to see our full list of contact options.