无需硬件

防护 DDoS 攻击的硬件价格昂贵:数十万美元的硬件以及潜在的数百万美元的网络升级费用。

无需软件

通过BGP或Anycast技术激活后,Ceranetworks即可实时智能地对所有流量进行概要分析,以阻止最新威胁。

On-demand

Ceranetworks DDoS保护由您完全控制:始终清洗流量,仅清洗选定流量或仅在DDoS攻击时清洗流量。

更好的保护

当Ceranetworks社区的一个成员受到新攻击的攻击时,Ceranetworks会自动保护所有其他成员。

现场人员

由经验丰富的安全工程师组成的专业团队提供支持。他们的职责包括主动响应和事件管理,熟练的策略调整,摘要攻击报告以及24x7全天候技术支持。

DDoS 防御专家

安全工程师在内部开发自定义规则集和功能,以处理零时差事件;我们能够比竞争对手更快地阻止所有攻击类型。

使用Ceranetworks控制您的DDoS攻击清洗

始终清洗流量

始终清洗所有流量。或者,始终清洗选择的流量。

被攻击时

出色的保护策略:仅在检测到DDoS攻击时才清洗流量。

VS

专家协助部署

Ceranetworks经验最丰富的工程师为您的IT和业务环境量身定制了远程DDoS保护解决方案。

自主保护

各种类型和大小的DDoS攻击都会自动防御,无需您人工干预。

On-demand

Ceranetworks的DDoS保护解决方案对普通用户完全透明且不可察觉。

ASN (Autonomous System Numbers) IP Address Block(s) Budget
您自己的 ASN 您自己的 IP Block(s) 仅需 $2999 起 Good fit
无 ASN 托管提供商拥有的IP 低于 $1950 Bad fit

Ceranetworks与其他公司的差异之处

Ceranetworks完全在内部设计和开发先进的DDoS防护技术。这意味着Ceranetworks不依赖任何第三方,并且Ceranetworks的DDoS保护可以按照不同客户需求高度定制。

FAQ

Gone are the days of an organization being targeted solely by elite hackers. Today, an aggressor needn’t be a hacker at all: The high school student across the street, a disgruntled employee, or the customer who had an unfortunate experience with your organization can all shutter your online availability with DDoS attacks.
Imagine an unruly individual who requests junk mail to be sent to a victim’s home. A lot of junk mail. The victim’s mailbox soon become overwhelmed. As the mail scales (akin to a DDoS attack strengthening), the mail carrier is going to become overwhelmed. Soon enough, the local post once, the regional post once and so forth, will all become overwhelmed. The transit of all mail, both the good and the junk, becomes gridlocked.
Thanks to the advent and growing popularity of cybercrime-as-a-service, the process of launching DDoS attacks is now effortless and nontechnical. Attack tools are developed in an open-source environment and rapidly evolve. They have become more available and less expensive—even free—and as a result, DDoS attacks have grown in frequency and scale.
In the past, hackers—who inhabited only the darkest corners of the web—were required to master many technical challenges to wield a DDoS attack. First, malware needed to be developed and spread, thereby infecting and gathering machines into a botnet. A botnet, the very epicenter of a DDoS attack, is a network of computers controlled as a group without the owner’s’ knowledge. Then, from the command line (often IRC), the hacker commanded the botnet to attack anyone of their choosing.
Today, with only an email address and a method of payment (a major credit card, PayPal or Bitcoin will do just fine), DDoS cyber crime-as-a-service portals (otherwise referred to as booters) can be subscribed to and DDoS attacks launched. As simple as it is to sign up to Net ix and watch a movie, anyone can subscribe to a DDoS portal, select a type of attack and enter the victim’s domain or IP address to target.