Over 50tbps Global DDoS Protection
For any size or type of attack
- Instantly mitigates malicious attacks
- Only clean traffic is sent to the server
- Completely transparent to regular traffic
- Protection from small and large attacks
- Included free of charge with any server
- Keeps services online throughout attacks
- Regular traffic is unaffected
- Peak protection always increasing
- Every IP protected from DDoS attacks
- In-house filtering for no added latency
What's the difference between qGuard-Standard and qGuard-Premium?
Although very complicated we've developed the following diagrams to show in a simple format the basic operational differences between both systems.
qGuard-Standard basic operation
As you can see in the following diagram, qGuard-Standard operates solely in-house and although it's limited for packet inspection it offers very powerful DDoS protection capabilities by using other methods of packet determination.
qGuard-Premium basic operation
The ultimate solution all tied into one tidy package! The use of Datapackets network with NEOProtect's DDoS protection is by far the best solution with all packet inspection and blocking occuring outside of the physical network.
What types of attacks are you protected against?
# |
Layer |
Application |
Description |
Vector Example |
7 |
Application |
Data |
Network process to application |
HTTP floods, DNS query floods, Phishing, Password cracking, Buffer overflow, Format string attack |
6 |
Presentation |
Data |
Data representation and encryption |
SSL abuse, Cracking encryption, File inclusion vulnerabilities, Cross-site scripting (XSS), Cross-site request forgery (CSRF) |
5 |
Session |
Data |
Interhost communication |
Session hijacking, Access control bypass, Adversary-in-the-middle attack |
4 |
Transport |
Segments |
End-to-end connections and reliability |
Lateral Movement, TCP/UDP port scanning, DNS poisoning, TCP/UDP flood (DDoS), SYN floods |
3 |
Network |
Packets |
Path determination and logical addressing |
IP spoofing, Manipulating routing tables, ICMP redirect, UDP reflection attacks, TCP/UDP flood (DDoS), SYN flood (DDoS), Smurf attack (DDoS) |
2 |
Datalinks |
Frames |
Physical addressing |
MAC, ARP, VLAN, DHCP spoofing and rogue access points. |
1 |
Physical |
Bits |
Media, signal, and binary transmission |
Physical, Traffic eavesdropping |