Key features

Flexible traffic distribution over protection policies
In MITIGATOR, traffic separation and filtering is possible not the destination address only, but also by any combination of 5-tuple. This allows you to divert the traffic of specific services to separate protection policies and apply only necessary countermeasures for scrubbing.
Traffic Analysis
There are two ways to create filtering rules: automatically on the client's hardware or by uploading a traffic dump to a dedicated service. The service is used as one of the tools to evaluate the legitimate traffic of a new application, or to create an attack traffic signature.
In both cases, its use greatly simplifies the task of setting up protection against typical attacks.
Service Creation and Access Sharing
MITIGATOR supports the ability to create a DDoS protection service. Traffic separation allows you to provide independent filtering settings for individual clients.
Flexible role model is used.
MITIGATOR protects against attacks at L3-L7 levels of the OSI model
MITIGATOR detects and automatically suppresses DDoS attacks of levels L3-L7 of the OSI model. The product contains more than 50 countermeasures based on various mechanisms: challenge-response, rate-based, regexp, validating, limiting, iplist, application behavior.
Game servers protection
MITIGATOR protects game servers from DDoS attacks over TCP and UDP protocols. The product implements protection mechanisms for Counter Strike: GO and other games from Valve, as well as Minecraft, Rust, ARK, Source Engine Query, etc. New protection mechanisms are added constantly.
Programmable filter
MITIGATOR allows the creation and usage of custom traffic processing programs.

Network Deployment

MITIGATOR can work in L2-transparent and L3-router, inline and on-a-stick modes. The integration method depends on the network structure and tasks. Traffic can be directed to MITIGATOR permanently or only at the moment of attack. Interaction via BGP is supported. Read more


MITIGATOR Challenge-Response

A specialized user authentication protocol employing the Challenge Response method, convenient for embedding in a protected application. Supports operation over TCP and UDP protocols. Read more

MITIGATOR deployment steps

Contact with the client via available communication channels
Analysis of customer needs, discussion of the deal aspects
Organization of a test bench
Practical testing, introduction
to the basic principles
of MITIGATOR operation
Configuration of MITIGATOR according to the specifics of the client’s infrastructure
Activation of the protection
Join our team
Contact us by filling a simple form: