Have a question? We're always happy to chat through our solutions

The challenge of Denial of Service Cyber-attacks is intensifying for organisations of all sizes, with attacks becoming more frequent, more sophisticated and growing in aggression.

Distributed Denial of Service (DDoS) attacks launched simultaneously from worldwide ‘bot-nets’ network of compromised devices can bring networks to their knees in seconds. They’re one of the greatest Cyber threats facing organisations today, and are very challenging to remediate using traditional Firewall technology.

Used to extort ransom money, damage reputations, impact peak trading, or to mask simultaneous hacking activity, DDoS attacks range from massive traffic attacks, through to miniscule low-and-slow attacks targeted against a specific web server application, but the goal is the same – to render network services inoperable for the duration of an attack.

Syscomm offer sophisticated DDoS protection running leading technology from specialist DDoS vendors to defend our customers Internet connections, Servers and Services with automatic DDoS defence running from within our core network. We absorb DDoS attack traffic within the Syscomm network, automatically switching to upstream mitigation for the very largest attacks, cleaning your traffic to remove illegitimate sessions and flooded traffic before it congests your Internet circuit, or chokes your Firewall defences.

 

Our always-on network monitoring systems analyse customer traffic flows in real-time, building an understanding of legitimate activity to detect changes in traffic volumes or to detect irregular or malicious protocol patterns. Our monitoring sits to one side of your regular traffic route allowing us to be completely transparent with our monitoring, stealthy against attackers targeting our systems in tandem, and thereby not increasing application latency or performance whilst we scan traffic.

Informational section
Volumetric Attacks: Massive floods of UDP or ICMP traffic to saturate all Internet bandwidth choking legitimate traffic from any available bandwidth.

Protocol Attacks: Floods of incomplete network sessions or fragmented data on Servers, Firewalls and Routers cause them to hold false sessions open, or to reassemble data, consuming resources up to the CPU limit of the device, ultimately slowing legitimate traffic to a point that it becomes unresponsive.

Application Layer Attacks: Known as ‘Low and Slow’ attacks, these DDoS cyber-attacks send often tiny and apparently valid requests into a Server to solicit a response, but the requests are specifically targeted against vulnerabilities in the server application in an attempt to crash the server, or require extensive processing to generate the response, slowing the server to the point that it becomes unusable.

  • Small and Medium Businesses
  • Support for Internal Teams
  • Enterprise Outsourcing
Have a question? We're always happy to chat through our solutions

Let us call you for a quick chat

Please fill out the form below and one of our professional and friendly team will be in contact with you.