Enterprise Solutions | CyberDAM-DDoS Protection Service

SecurityDAM's CyberDAM™ is a cloud-based service for the detection and mitigation of Distributed Denial of Service (DDoS) attacks.
 
It brings together best-in-class technology, DDoS experts, and an SLA commitment for the best attack detection, notification and mitigation response times.

SecurityDAM's CyberDAM™ is a cloud-based service for the detection and mitigation of Distributed Denial of Service (DDoS) attacks. It brings together best-in-class technology, DDoS experts, and an SLA commitment for the  best attack detection, notification and mitigation response times. CyberDAM protects against volumetric attacks, which attempt flooding the network and cause extensive service disruption for legitimate users, as well as handles application-layer attacks, which target server computing resources and can be more difficult to mitigate. 
 
Provided as a managed service and backed by a 24/7 Security Operations Center (SOC), CyberDAM eliminates the need for upfront investment in DDoS protection equipment. It offers a robust cloud infrastructure that can mitigate attacks reaching hundreds of Gbps, which could not be handled by a DDoS protection appliance installed at the perimeter of your datacenter, or an ISP service. 

On-Demand or Always-On Protection

The CyberDAM DDoS service is offered in two modes: On-Demand and Always-On. 

On-Demand service constantly monitors your protected assets to identify the emergence of volumetric DDoS attacks, using one or more of the following methods:
  • Analyzing NetFlow records and SNMP queries
  • Communicating with a dedicated DDoS protection appliance such as Radware’s DefensePro, thereby creating a hybrid DDoS protection service
  • Monitoring the availability and response time of your internet-facing services
Once a volumetric attack is detected, traffic is re-directed through our global network of scrubbing centers, using BGP routing advertising or DNS changes, depending on your network configuration. Traffic diversion may also be triggered via a request on our service portal, by communicating directly with the SOC, or using our API.  


The Always-on service routes traffic through our scrubbing centers at all times to automatically detect and mitigates both volumetric and application level DDoS attacks.

 

High Capacity Scrubbing Centers Network

Located at main internet intersections in Europe, America and Asia, our global network of scrubbing centers provides over 2Tbps of mitigation capacity, allowing us to mitigate the largest DDoS attacks.

Scrubbing centers filter data and pass only clean, legitimate traffic to your data center using GRE tunnels or proxy servers. 

Our scrubbing centers network is designed using resilient mesh topology, N+1 redundancy on all networking and mitigation elements, and GRE tunnels to all customer data centers. This ensures continues operation of all scrubbing centers during maintenance and/or element failure with no effect on latency.

Real-time Insight

A web-based portal provides you with complete visibility of DDoS events and data and lets you take action to expand asset protec tion:
  • View in real-time protected assets, incident information, traffic and mitigation stats
  • Analyze attack data including vectors, sources and destinations
  • View reports covering historical events, trends and forensic analysis
  • Add assets to be protected and define users
  • Activate protection on demand

SSL Traffic Attack Detection

CyberDAM supports the detection and mitigation of DDoS traffic in SSL sessions, while maintaining the connection integrity. Setup for this service requires the submission of SSL certificates.

Flexible Service Plans

Choose your protection level from our flexible service plans, based on your traffic load, and potential attack risk. You can always upgrade to the next level of service even during attack mitigation.

 

 

On Demand

Always On

Service Plans

8 plans, based on clean traffic volume: 100 Mbps to 12 Gbps

8 plans, based on clean traffic volume: 100 Mbps to 12 Gbps

Attack traffic Unlimited Unlimited

Traffic diversion

  • 12 annual diversions (up to 48 hours each)

  • BGP routing

  • DNS diversion (25 IP addresses)

  • Unlimited diversions

  • BGP routing

  • DNS diversion (25 IP addresses)

Attack vector
protection
Volumetric attacks Volumetric and application/server attacks
SoC Service 24/7 Access by portal, Email and phone 24/7Access by portal, Email and phone