Customers: MegaFon Moscow; Telecommunications and Communications Contractors: MFI Soft Product: MFI Soft: PerimeterProject date: 2015/03 - 2015/09
|
Since the beginning of year MegaFon strengthened protection of the corporate clients against DDoS attacks due to expansion of the state of technical support. Now the client does not need most to ask for the help - the attack will be eliminated by technical support engineers within 15 minutes.
Earlier two types of service in case of the attack were available to the clients of MegaFon connected to service in counteraction to the DoS/DDoS-attacks: ask in Technical Support for the help or to independently counteract the attack in a personal account. Both methods were insufficiently operational to continue work in the normal mode.
Now, to close needs of the acting clients, the MegaFon company improved service of rendering service due to expansion of the state of technical support by highly-skilled employees who online monitor traffic on existence of DDoS attacks on the client's Internet resources. The engineer independently reacts to DDoS attacks and makes the decision on turning on of necessary filters for her elimination, without demanding in it participation of the client. Time of elimination of negative impact of the attack takes from 15 to 25 minutes depending on the power of the attack and option of rendering service.
The service of counteraction to DDoS attacks can be provided to exacting clients with prior approval of a task of cleaning. Remote access via the WEB interface is provided to clients for independent counteraction or just viewing statistical information on traffic.
DoS and DDoS attacks are most popular as they allow to finish to the full practically any system, without leaving legally significant proofs. This year the protective systems should maintain traffic of at least 15 Gbps to provide to the client reliable protection against the majority of the attacks. Perimetr agrarian and industrial Complex, power 80gb/sec., guarantees to our clients reflection of the most powerful attacks. Due to permanent improvement of the platform reflection of the DoS/DDoS-attacks to the 7th level of the OSI model inclusive is possible. This reliable platform allows to carry out traffic filtering in data networks, blocking harmful and also provides pro-active monitoring of 24/7 network traffic.