Need More Info?
Let Us Know How to Contact You For More Info.
Thank you. Your request has been submitted. We'll be in contact with you shortly.
A distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its legitimate users. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Today’s many types of attacks fall into two main categories:
Flooding attacks. Saturates and consumes network bandwidth and infrastructure. Examples: ICMP, UDP or TCP Syn Floods.
APPLICATION LAYER ATTACKS
Harder to detect than Volumetric Attacks.
Targets specific applications of services
where they exhaust resources.
Examples : HTTP or DNS attacks.
Our system takes a layered approach that enable us to block both types of attacks.
Liquid Web DDoS Attack Protection
Essential Protection for Your Hosting Infrastructure.
Distributed Denial of Service Attacks can have a significant impact on your company. Downtime, lost revenue and brand tarnishment just to name a few. It doesn’t matter if you are a large enterprise, small business, e-commerce company or government institution. If your website is internet facing, you’re vulnerable to Denial of Service attacks, so it is vital that you detect and stop these attacks before they impact your business.
Since 1997, Liquid Web has been helping their customers detect and mitigate DDoS attacks before they impact business. Recently Liquid Web made a million dollar investment into a state-of-the-art DDoS protection system that will help protect our clients from nefarious activities on the internet. Our state-of-the-art DDoS Mitigation System is comprehensive and has three critical functions: detection, mitigation and reporting.
Our DDoS Prevention has the Capability to:
- Detect and block emerging application-layer
- Deploy a turnkey solution to stop threats
- Accelerate responses to DDoS attacks to
prevent legitimate services from going down.
- Prevent illegitimate botnet communications by
leveraging real-time security intelligence
- Mitigate volumetric attacks
- Block illegitimate traffic from costing you money
in bandwidth charges.
How Our DDoS Prevention Works
When a customer signs up for Liquid Web DDoS Mitigation, the customer will identify a group of IP addresses, which will be setup for detection and mitigation. A network object will be created and applied to the Analytics and Threat Detection System which will monitor all network traffic in real-time by doing statistical analysis of packets at the border layer of our network.
When the Analytics and Threat Detection System identifies an attack, the network traffic is routed to our Threat Mitigation System which is a dedicated piece of specialized hardware that will deploy countermeasures based upon the specific attack.
The countermeasures will scrub all of your network traffic at the border layer, not just web traffic like many providers, and separate legitimate from illegitimate traffic and only pass along the legitimate traffic to your server. When the attack subsides your network object will be removed from the Threat Mitigation System and traffic will begin flowing as normal. If the Analytics and Threat Detection System identifies a new threat the process will be repeated.
Advantages of Liquid Web DDoS Prevention
Other Hosting providers which do not have a comprehensive DDoS Mitigation System will not be able to adequately handle a large DoS attack that is targeting one of their customers. This will often times result in the DDoS attack having a negative effect on other customers which may utilize the same server or the same networking infrastructure.
As a result, the hosting provider will often demand that the target client be removed from the network or asked to enlist a 3rd party DDoS system which may cost thousands of dollars, require DNS changes and may result in hours or days of downtime. This is obviously not a good solution because it will result in significant downtime and loss of revenue.
In contrast, the Liquid Web DoS Mitigation System can be deployed in line without the need of DNS changes and can be implemented in minutes instead of hours or days.
Comparing Liquid Web DDoS Prevention to Other DDoS Solutions
|DoS Mitigation Options||Disadvantages||Cost|
|No DoS Protection
Loss of Revenue and Brand Tarnishment
|3rd Party DoS Service||
Thousands of Dollars per month
|Dedicated DoS Hardware||
Hundreds of thousands of dollars in hardware and potentially millions in network upgrades.
|Protection for a DDoS that is:||Protection for DDoS with a Volume of:||Price|
|2 Gb/per second||3 million packets per second||$500/month|
|4 Gb/per second||6 million packets per second||$950 /month|
|8 Gb/per second||12 million packets per second||$1,800/month|
|12 Gb/per second||18 million packets per second||$2,640/month|
|15 Gb/per second||22.5 million packets per second||$3,000/month|
In addition to the monthly cost listed above, each DDoS Prevention plan requires a setup fee equal to one-month’s service. If you require a higher level of protection than what is listed, please contact a member of our sales team today. DDoS Mitigation monthly fees and setup fees are non-refundable.
Chat with Us.
Have a question for our staff? We’re available to help via Live Chat for your convenience.
Need a custom quote or prefer e-mail communication? E-Mail us anytime and we’ll respond quickly.
Talk with Us.
We’re here 24x7 to take your call at 1-800-580-4985, or 1-517-322-0434 (International)