Developers: | DDoS-Guard |
Last Release Date: | 2019/09/24 |
Technology: | Firewall |
Content |
2019
Start of the center of traffic filtering in Los Angeles
On September 24, 2019 the DDoS-GUARD company announced start of the center of traffic filtering in Los Angeles. Filtering of the "American" traffic within the country optimizes routes of its transfer and accelerates loading of the client websites.
The point of traffic filtering is placed in data center CoreSite corporation. The point of filtering is entered in global architecture of DDoS-GUARD: forward allocated channels connected it with the centers of filtering in Hong Kong and Amsterdam. Thanks to high-speed connection to to operators by means of 100 GbE of ports and to full redundancy of all systems the center of protection meets the most strict requirements for speed and fault tolerance. With opening of a node of filtering in Los Angeles the active band of filtering increased by hundreds of gigabits per second that allows to cope with relevant volume TCP flood DDoS- the attacks, claim in DDoS-GUARD.
According to the statement of DDoS-GUARD, the main benefits from start of the center of filtering will be received by clients whose interests are anyway connected with the North American continent — the filtering point in Los Angeles will improve the connectivity of network thanks to what routes are optimized and transmission time of traffic will decrease. As result – the websites of clients will begin to be loaded quicker. The started center will act as one more node of caching on the content delivery network (CDN) of DDoS-GUARD company which will allow to give content directly to such participants of the world market as Google, Apple and Amazon.
Start of a node of traffic filtering in St. Petersburg
On March 20, 2019 the company DDoS-GUARD announced start of a node of traffic filtering of century St. Petersburg. The node is development of DDoS-GUARD and is located century data center Selectel "Flower 2".
The DDoS-GUARD and Selectel joint project — again started traffic filtering node — will allow to optimize routes of traffic and to lower delays on network (RTT) for clients of St. Petersburg. It is connected by physical channels to other nodes of filtering: in Amsterdam and Moscow that reduces load of each element of network.
It is the first in the Northern Capital of Russia local node of traffic filtering which is a part of the filtering network distributed on the world, claim in DDoS-GUARD. Filterings can be connected to a node as other data centers, telecom operators, providers and integrators, and the companies from other industries, it is crucially important to them to protect the web resources. For clients it is an opportunity to receive all range of the services and opportunities provided by the company, having connected directly in St. Petersburg.
Any customer having presence at data center "Flower 2" can increase reliability and fault tolerance of own services, to optimize routes of traffic and to lower delays on network. Local traffic will be processed directly in St. Petersburg, without transfer on filtering to other regions.
The client receives basic protection against DDoS attacks at the L3-L4 levels of the OSI model. The traffic going on the protected client's IP addresses will pass at first through the filtering node where the analysis and cleaning is carried out it. Parameters of filtering and methods of connection are selected individually under project requirements.
The filtering system of DDoS-GUARD is capable to calculate and block DDoS attacks with power up to 1.5 Tbps (including attacks on L7 level — protection against them is connected at the request of the client). The self-trained system works in the automatic mode. The end user receives already cleaned traffic without delays, at the same time only legitimate traffic is rated.
2018
Private peering
Since February, 2018 the DDoS-GUARD company receives content from Google and Yandex passing networks of third-party providers, on private peering.
What is private peering? Two networks are present at one general data center, connection between their equipment is organized directly, without connection to a point of exchange of traffic. It is rational in case networks exchange the large volume of traffic since allows to level delays and to optimize costs for transfer of traffic through networks of other operators.
Than peering with DDoS-GUARD is profitable? It allows content generators, to telecom operators, Internet service providers to lower load of the networks, having given the outbound abnormal traffic to us on cleaning directly. Partner peering of DDoS-Guard receives the minimum delays to the announced networks, and, above all - reduces risks of overflow of joints with other operators at outgoing DDoS attacks.
Advantages of private peering are relevant more than ever because of the found vulnerability of Memcached of servers used for amplification of DDoS attacks now.
Start of a node of traffic filtering in Asia
The DDoS-Guard company, provider of protection against DDoS attacks, in January announced start in operation of a node of traffic filtering in Asia which is designed to improve the connectivity of network in the region. The filtering equipment is installed in partner data center of Equinix HK1 (Hong Kong).
It is expected that opening of a node will allow DDoS-Guard to provide to the clients high cohesion in the territory of Asia, individual solutions for hosting providers and telecom operators from the People's Republic of China are also possible.
According to DDoS-Guard, the filtering equipment is capable to protect network from DDoS attacks with power up to 1.28 Tbps without use of pre-firewall filter.
Connection to network is possible by means of virtual tunnels (GRE, IPIP) and a direct link. At a design of services of IP-transit or "the Protected IP-transit" is provided the free test period for up to 3 days.
Systematic expansion of the filtering network is a priority strategic problem of development of DDoS-GUARD. The arrangement of the filtering nodes in different parts of the world allows to process traffic most close to its source.
As of January 22, 2018, the geodistributed network of filtering with nodes in the Netherlands, Russia, Germany, Japan, the USA and China has capacity more than 1.5 Tbps and provides protection against DDoS attacks of 6000 clients from around the world.
2017
Integration of DDoS-Guard with ISPmanager
According to information for October, 2017 the user of a panel (both the owner of a resource, and hosting provider) can turn on protection preventively or directly "under the attack" literally in couple of clicks, having spent for it time minimum.
For this purpose ISPsystem developers implemented the protection module directly in ISPmanager - a control panel the website. Service can be connected for one or several domains, besides, the webmaster (system administrator) has an opportunity to independently configure traffic processing rules from the separate IP addresses or subnets. An important point - payment for services of traffic filtering from DDoS will be included in joint account for services of a hosting at the end of the month, i.e. prepayment or the conclusion of the separate agreement on protection will not be required.
Registration in the Register of domestic software
The software (service) of DDos-Guard Protection is officially registered by the order of the Ministry of Telecom and Mass Communications of the Russian Federation of 6/26/2017 No. 326 as an instrument for ensuring of information security in the Unified register of the Russian programs for electronic computers and databases.
DDoS attack is a cyber attack to failure in service which represents the parasitic traffic directed by malefactors to an Internet resource of the victim with the purpose to make it unavailable to legitimate users. Subject to DDoS attacks the websites, servers, AS, web services (e-mail, payment systems, online games and so forth)
The DDoS-GUARD company offers services in protection against DDoS attacks for any Internet resources based on own developments and own network of traffic filtering that protects the Russian companies from influence of a world environment. Besides, existence of several centers of traffic filtering in the territory of the Russian Federation allows clients to perform processing and filtering of local traffic within the country.
At the same time the level of the rendered services conforms to all modern requirements: the DDoS-GUARD system allows to reflect the attacks like UDP Flood, ICMP Flood, SYN-Flood, HTTP Flood in levels of 2-4 and 7 (application level) of the OSI model.
If to speak about volumes of parasitic traffic, then a system copes with the attacks with power up to 1.5 Tbit / with or 120 million packets per second. For comparison, the average power of the DSoS-attacks according to the statistics is the companies 4.6 Gbps, and the most powerful attack in the history of the Internet did not exceed a mark of 1 Tbit / page. Also It should be noted that the provider of protection has opportunities for "hot" expansion of channel capacity since the company management understands how quickly possibilities of hackers and therefore works for advancing grow presently.
The DDoS-GUARD company guarantees to the clients confidentiality of the transmitted data on section of passing of traffic through the centers of cleaning and also provides a user-friendly interface for obtaining information on work of the protected resources and automatically created reports on DDoS attacks. The functionality of the interface is regularly upgraded to correspond to requests of users. In staff of the company the qualified experienced engineers who develop new algorithms of filtering work, and the technical support specialists who are round the clock rendering to consultation on connection of company services and their setup also monitor uninterrupted operation of functioning of a system of protection, and.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls