For hosting

NETWORK SCHEME

MITIGATOR Challenge Response open authentication protocol support
Specialized countermeasures
for UDP applications protection
Distribution and filtering of traffic by any
combination of 5-tuple
Supported integration of MITIGATOR into the
infrastructure of the protected application
Countermeasures to prevent failure of the protected infrastructure even in case of incorrect protection settings
Work with BGP Flow Specification: when dealing with high-volume attacks, filtering rules are transferred to the upstream carrier and received from clients
Various protection options:
always on, on-demand

Documentation