Skip to content

DDoS Protection

Anti-DDoS

The availability and performance of connected services now condition daily activity, directly impact business and forge the image of most companies and administrations. Likewise, they are proving to be critical quality measures for any access and content provider, host or even cloud player. In this sense, the DDoS attacks (Distributed Denial of Service), by targeting infrastructures, servers and applications, continuously threaten, by their intensity, frequency and sophistication, the legitimate functioning of these critical services.

6cure Threat Protection®, the result of more than ten years of attack-fighting R&D, is based on patented algorithmic logic that identifies and filters the most complex DDoS attacks in real time, down to the application level, and thus preserves the integrity and performance of legitimate flows. It can be natively integrated into an on-site, upstream (operator or cloud level) or hybrid protection architecture.

Protection of data centers & cloud services

IllustrationPosed as permanent protection on your Internet access points or at the front end of your cloud applications, in physical or virtual mode, our 6cure Threat Protection® appliances eliminate application-level and/or volume-restricted attacks. They integrate natively with upstream protections at the Internet or cloud operator level to offer you complete protection against the DDoS threat.

Infrastructure protection

IllustrationAt the core of the network or at the operator peering points, the 6cure Threat Protection® solution detects and cleans up in real time volumetric or application attacks targeting your infrastructures and those of your customers. Build your anti-DDoS services from our solutions with a controlled and advantageous pricing offer.

Hybrid protection

IllustrationAt the core of the network or at the operator peering points, the 6cure Threat Protection® solution detects and cleans up in real time volumetric or application attacks targeting your infrastructures and those of your customers. Build your anti-DDoS services from our solutions with a controlled and advantageous pricing offer. Choose the best of DDoS protection by combining “on-premise” protection on site and “upstream” protection in the heart of infrastructure. With a TTM (Time-To-Mitigate) of less than 5 seconds and an unmatched granularity of protection, erase DDoS attacks without disrupting your real-time application services or your VPNs.

Back to top