sense of innovation
Under Attack? +7 495 792 22 74 Ru

Protection against DDoS attacks without IP address blocking

Problem:
A good conventional defence against DDoS attacks usually involves blocking a wide range of IP addresses.
The main problem with this method, however, is that significant segments of the network components such as public Wi-Fi networks, business centers, neighbourhoods and even small towns could be set to offline mode to safeguard against further DDoS attacks.
A superior security company is usually regarded by the amount of the IP addresses it is able to detect and block during a potential attack.
Solution:
Only malicious automated queries are blocked.
Legitimate users from IP address of “intruder” do not end up being affected. Even during an active DDoS attack, basic business operations should function without any interruptions.
Ultimately, customers may continue using the service and the service provider will maintain its visitor frequency and database.

Protection against low-frequency attacks (L7)

Problem:
Single low-frequency bots are almost impossible to pinpoint.
Low-frequency DDoS attacks usually do not require large amount of resources; they do not alter the statistics and remain unnoticed.
The explosive growth of attacks on the application level paralyzes the work of internet resources.
Currently, there is no effective protection on the market.
Solution:
Single malware requests along with low-frequency attacks are identified, including the application level L7.
All automated malicious requests are fully disabled.
We organize the real-time defence without affecting the user experience.
We guarantee the availability of internet resources during the low-frequency attacks on the application level.

Real-time protection with a first response

Problem:
The operating principle of protection against automated bots is based on the collection of statistical information about the incoming traffic.
Malicious requests are interrupted after the system analyzes the attack and activates the protective filter.
The system needs on average 5-10 minutes to go into full defensive mode.
Solution:
Our system works starting with a first attack without any recollection of statistical information by filtering the incoming traffic in real time.
We also guarantee protection against click-fraud and automated hacking.

Protection from automated data exfiltration

Problem:
Automated data exfiltration or web scraping of content is performed by special applications through a large number of bot requests.
Unauthorized automatic copying of information leads to the loss of of unique content.
Legal countermeasures are limited, human resources are expensive and there are no technological alternatives.
Solution:
We identify automated requests from the first attack and disable all illegitimate traffic.
We protect all the content against automatic scanning and web scraping.
We make automatic data download practically impossible and/or economically inefficient.
There are currently no alternative technical solutions on the market.

Encrypted traffic protection (HTTPS)

Problem:
Protection of encrypted traffic without data disclosure is done with blocking of IP addresses and activation of time delay; blockage of single requests becomes impossible.
Services of competitors require more integration, making the protection of resources difficult to maintain.
The availability of customers’ websites depends on the reliability of the applied solution.
Solution:
We filter the encrypted HTTPS traffic without disclosure of sensitive data and without blocking by IP addresses.
We protect personal bank accounts, payment systems and other web resources containing sensitive information.

Get protection

We know that you are not a bot. Active Bot Protection technology makes
CAPTCHA obsolete.