DDoS Protection made in Berlin
Protect your Hard- and Software
For effective protection against attacks, we offer customers of our Cloud, Managed Cloud, and Carrier Services a package of measures to defend against Distributed Denial of Service (DDoS): The SysEleven DDoS Guard protects against various types of attacks and ensures the availability of your application.
All Features at a glance
Effective DDoS Protection
The SysEleven DDoS Guard combines relevant defense and protection methods at both hardware and software level. These include DDoS scrubbing appliances, DDoS protection of the F5 load balancer, firewall appliances with geo-filtering and blocking, FlowSpec filtering, DDoS protection profiles, and more.
Our all-round carefree protection
We have designed the SysEleven DDoS Guard to offer effective DDoS protection at transparent costs. Powerful components as well as the know-how of our cloud and network teams offer you all-round, carefree protection.
DDoS Protection through fiber Optic network
We operate our own fiberoptic ring with an external connection of over 700 Gbit/s. This enables us to intercept attacks at up to 250 Gbit/s guaranteed.
SysEleven DDoS Guard factsheet
Find all important information in our SysEleven DDos Guard Factsheet.
Automated Filter Protections
A DNS flood attack interrupts the DNS resolution. This causes the performance of your website, API, or application to no longer be sufficient or interrupts availability.
Attackers use the functions of an open DNS or NTP resolver to overload a target server or network by increasing server requests to where the load is significantly higher than the original requirements.
An HTTP flood attack generates vast numbers of HTTP, GET or POST requests from various sources. They target the application layer and degrade the service or even cause it to go offline.
SYN flood, SYN-ACK flood, ACK/push flood, fragmented ACK, RST/FIN flood, synonymous IP, fake sessions, session attacks, misused or out of protocol attacks, replay verb attacks, faulty application protocol attacks, UDP fragmentation attacks, VoIP flood, media data attacks, ICMP floods, fragmentation flood, ping flood, and many more.