Network and data center protection

Our DDoS protection solutions provide comprehensive security and seamlessly integrate into your network infrastructure, ensuring attacks never impact performance or customer experience

Ask question
Volumetric DDoS and transport-layer attacks are the most effective attack types. They can render your network, infrastructure, or applications inaccessible within minutes

Volumetric DDoS and transport-layer attacks are the most effective attack types. They can render your network, infrastructure, or applications inaccessible within minutes

How it works

BGP switching

Traffic redirection is achieved by announcing your BGP prefixes. To protect infrastructure, we perform statistical traffic analysis. Filtered traffic can be delivered to your network via dedicated channels, GRE tunnels, or private IX peering

BGP switching

Modes of traffic passing

Always-On

Traffic continuously passes through our Scrubbing Centers, ensuring attack mitigation occurs transparently without impacting your users or business operations

On-Demand

Once an attack begins, traffic is automatically redirected to Scrubbing Centers, where malicious packets are filtered out. Only legitimate users reach the protected resource, ensuring uninterrupted service

Modes of traffic passing

Filtration modes

Symmetric filtration

Both inbound and outbound traffic pass through the system. During an attack, only inbound traffic is analyzed for detection while outbound traffic is excluded. This provides enhanced data for analysis, enabling more precise traffic filtration

Asymmetric filtration

Only inbound traffic passes through the system, while outbound traffic is routed through your ISPs. This alternative filtration mode provides cost-optimized protection

Filtration modes

Protection inside the network perimeter

If redirecting traffic outside your network perimeter is undesirable—especially for high-speed networks—we offer on-premises Scrubbing Centers deployed directly within your infrastructure. Attack detection is performed through metadata analysis, where a Collector gathers traffic data for filtration systems to process. The filtration system can scale without any upper bandwidth limits

Protection inside the network perimeter

Our advantages

Fault-tolerance

Fault-tolerance

Each geographic zone has two Scrubbing Centers -a primary and a backup

Reliability

Reliability

Each Scrubbing Center is connected to multiple Tier-1 ISPs to ensure network availability

Proprietary developed filtration system

Proprietary developed filtration system

Kaspersky DDoS Protection system is the company’s proprietary system designed to filter traffic and protect against DDoS attacks

Protection for all application types

Protection for all application types

Our system safeguards applications running on SMTP, DNS, VPN, and other protocols not used for web services

System event notification

System event notification

We send notifications about anomalies and attacks on your IPs and services via SMS, Email, Telegram, or Webhook

Plans & Pricing

The cost of network protection depends on the amount of network resources (services, protocols, IP addresses), traffic volume and connection schemes of protection

On-Premises Platform

On-Premises Platform

For scenarios where cloud-based solutions are technically or organizationally unfeasible
Cloud-Based Platform

Cloud-Based Platform

Comprehensive tools for fine-tuned protection configuration of each service in the defended network
Service Provider Protection

Service Provider Protection

To protect entire subnets with heterogeneous and constantly changing services

Useful resources

Learn more about network and data center protection