DDoS
Automated defense & transparency
Our DDoS mitigation detects attacks in real time and protects your infrastructure by automatically redirecting traffic to powerful scrubbing centers, either in always-on or on-demand mode. Predefined runbooks and guaranteed SLAs ensure a rapid response around the clock. In addition, detailed reports ensure full transparency and traceability of all measures.
Features / advantages at a glance
Clean Pipe Scrubbing
Real-time detection
Automatic redirection
Always On possible
24/7 escalation
What you can expect
Our DDoS mitigation reliably protects against protocol attacks and ensures that your digital services remain stable and accessible even under high load. Intelligent detection and automated countermeasures ensure the availability of your infrastructure at all times, even in the event of complex attack patterns.
-
Real-time detection
Flow data, sensor technology and intelligent anomaly detection identify attacks at an early stage. Alerting and switching to protection mechanisms are automated for a fast and reliable response.
-
Scrubbing and repatriation
The data traffic is specifically redirected to scrubbing centers, where unwanted parts are removed and legitimate traffic is filtered and returned in a controlled manner, for a clean and secure connection.
DDoS as the basic protection of an increasingly.
Detection in seconds
Attacks are detected in real time for a fast response
Scrubbing at all levels
Protection from the network to the application level (layers 3-7)
Support around the clock
24/7 escalation with clear processes
BSI-certified
We use one of the few BSI-certified scrubbing solutions in Germany
Technology in detail
Targeted protection:
Publicly accessible services such as websites, APIs and DNS are detected at an early stage and protected against attacks via cloud scrubbing.
Flexible operating modes:
The service can be operated permanently active, on demand or combined, to suit the risk and traffic profile.
Stable despite attacks:
Legitimate requests remain undisturbed, response times and user experience are not affected.
Managed & binding:
RIEDEL Networks operates the protection as a managed service with clearly defined service levels.
Network Security
Secure & Tailor-Made
Our solutions offer managed services with 24/7 monitoring, configuration management and incident handling. They are individually tailored to your infrastructure and are optimally prepared for hybrid and multicloud-capable corporate networks.
DDoS Protection
Active, flexible and supported around the clock
Cloud scrubbing and L7 protection
Web, portals, APIs and DNS are reliably protected. Cloud scrubbing removes volumetric attacks at network level, while an upstream proxy checks requests at application level. This ensures that only cleaned traffic reaches your systems, for maximum security and performance.
Control and operating modes
Protection remains permanently active, on demand, continuously or combined. GeoIP controls and rate limiting specifically limit conspicuous sources. Upstream monitoring detects faults at an early stage. Integration via API and GRE simplifies the connection. Operation is carried out around the clock by experienced experts.
Integrated in RIEDEL Networks' Internet Access Service
Available as an add-on to RIEDEL Networks Internet Access. Activation and switching are coordinated so that your services remain reliably available at all times. Contact us for more information.
Frequently asked questions
Here are some of the most frequently asked questions we receive.
-
How does the defense work in the event of an attack?
Detection, redirection to scrubbing, filtering and return of legitimate traffic.
-
How quickly do you react?
Alerting and switching are automated and take just a few milliseconds.
-
Does scrubbing noticeably increase latency?
No, our high-performance scrubbing centers "wash" the data traffic without any loss of performance.
-
How do we integrate DDoS into existing access points?
Only a DIA provided by RIEDEL Networks.
Get started today!
Our Solution Architects will be happy to have an initial discussion with you. When it comes to network security, one basic rule applies: it's always better to start than to put it off!