Various protection options: always on, on-demand
Specialized countermeasures for UDP applications protection
Work with BGP Flow Specification: when dealing with high-volume attacks, filtering rules are transferred to the upstream carrier and received from clients
Distribution and filtering of traffic by any combination of 5-tuple
Countermeasures to prevent failure of the protected infrastructure even in case of incorrect protection settings
MITIGATOR Challenge Response open authentication protocol support
Supported integration of MITIGATOR into the infrastructure of the protected application

Network scheme


Contact us by filling a simple form: