The cloud platform consists of our own traffic filtering centers in Russia and Europe.
Each node processes at least 160 Gbps of active traffic. This makes the total effective filtering bandwidth more than 1.5 Tbps. The nodes are connected to several service providers and they have backup copies of all systems, such as cleaning servers, managing servers, data storage systems, and network equipment.
You don’t need your own infrastructure to be protected. Your business processes won’t stop, and your users and customers won’t even notice that your resource has been attacked.
Resource load is analyzed in real time for any statistical abnormalities.
Each new query undergoes a basic technical analysis of the client who sent it (for example, the median size of network packets is analyzed).
If a client has sent more than one query within the monitored period of time, then the client’s behavior on the website is analyzed (for example, the time between queries and subqueries).
The query is checked against suspicious signatures currently relevant for the resource. Both coincidence and “proximity” can be checked.
As a result, the information is combined into a factor vector that is used to calculate query validity.
We don’t charge for 5 % of your resource’s peak traffic.
You don’t have to pay for traffic surges during sales or emergencies.
The guaranteed availability of your resources is no less than 99.5 %.
If we can’t protect you, we return your money.
We provide a hardware and software system.
To enable protection, simply configure a DNS record.
Problem |
Solution |
---|---|
Problem
Bots (both useful and harmful) generate an average of 50 % of your web traffic, with peak numbers reaching 60–70 %. To process all this traffic, serious investment into infrastructure is needed. By using stolen databases with millions of login and password combinations, bots may gain access to your resources. Suppose you use paid traffic to attract clients. Are you sure that the traffic you paid for is generated by real humans and can be converted into sales? Articles, prices, merchandise descriptions, comments, infographics, and photos are valuable content. They generate sales, improve the image of your brand, and boost search results. It’s in the best interests of any business to spread this content as widely as possible, but only on your own terms and under your name. Without reliable protection, parsers freely gather information (e.g. about prices) from your website or mobile app to supply your competitors with data. Let’s say you offer limited-issue goods (tickets to events, special issues, etc.). By utilizing their speed, bots are able to purchase these goods at a lower price before your clients can. Those goods are later resold with a substantial markup. Such situations can significantly harm your reputation. Your metrics are crucial in optimizing your conversion rates and increasing UI efficiency. But if you can’t distinguish between bot traffic and user traffic, you’re analyzing corrupted data. Bots can disrupt the sales process on your website. They might fill up carts with goods that will never be bought to make them unavailable to your customers. This leads to stock build-up while your clients can’t buy anything. |
Solution
We’ll block all unwanted bot-generated traffic. Your website and API will be utilized by real users only. We’ll block bots that try to figure out logins and passwords to gain access to your system. We’ll clean up your paid traffic so that you can analyze the sources of low-quality traffic and optimize your marketing budget. We’ll block parser bots and protect your content against automatic copying. We’ll block parser bots and protect your data from competitors and aggregators. We guarantee that your merchandise will actually get into the hands of the people who it’s meant for. We’ll clean irrelevant bots from your figures. We’ll protect your sales by shutting down manipulations that use fake purchases. |
A Web Application Firewall (WAF) provides efficient protection for web applications against hacking and unauthorized access to confidential data.
Any application code might contain errors. Hackers frequently use such vulnerabilities to access user data. If you block entire ports, IP addresses, or protocols (which is how network firewalls work), you might also disable important, legitimate processes. That’s why a modern-day protection system must analyze packet contents and better "understand" how applications work.
We’ll not only detect and prevent attacks on your application in time, but we’ll also eliminate the possibility of vulnerabilities being exploited.
Blocks the majority of attacks on web applications. Can work with large amounts of traffic.
The unsupervised training algorithm helps prevent false positives.
Detects existing safety errors within web applications.
Provides information about detected vulnerabilities and detailed recommendations on how to eliminate them.
Protects applications from vulnerabilities by detecting and blocking attacks and hacking attempts in real time.
No website downtime required.
START | PRO | ENTERPRISE | |
---|---|---|---|
Monthly subscription fee |
€
50
/mo
|
€
140
/mo
|
Personal terms
|
Guaranteed availability (SLA) | >99.5% | >99.9% | >99.9% |
Protection from network and transport layer DDoS attacks (L3, L4) | Unlimited | Unlimited | Unlimited |
Protection from application layer DDoS attacks (L7) | Unlimited | Unlimited | Unlimited |
Number of protected resources | 1 | 1 | 1 |
Technical support | 8/5 | 24/7 | 24/7 |
Protection for 1 additional resource per month | 50 € | 50 € | Per request |
Legitimate traffic included* | 3 Mbps | 5 Mbps | Per request |
Traffic charge above quota (per Mbps) | 10 € | 8 € | Per request |
Show advanced options
|
|||
START |
---|
Monthly subscription fee
€
50
/mo
|
Guaranteed availability (SLA)
>99.5%
|
Protection from network and transport layer DDoS attacks (L3, L4)
Unlimited
|
Protection from application layer DDoS attacks (L7)
Unlimited
|
Number of protected resources
1
|
Technical support
8/5
|
Protection for 1 additional resource per month
50 €
|
Legitimate traffic included**
3 Mbps
|
Traffic charge above quota (per Mbps)
10 €
|
Show advanced options
|
PRO |
---|
Monthly subscription fee
€
140
/mo
|
Guaranteed availability (SLA)
>99.9%
|
Protection from network and transport layer DDoS attacks (L3, L4)
Unlimited
|
Protection from application layer DDoS attacks (L7)
Unlimited
|
Number of protected resources
1
|
Technical support
24/7
|
Protection for 1 additional resource per month
50 €
|
Legitimate traffic included**
5 Mbps
|
Traffic charge above quota (per Mbps)
8 €
|
Show advanced options
|
ENTERPRISE |
---|
Monthly subscription fee
Personal terms
|
Guaranteed availability (SLA)
>99.9%
|
Protection from network and transport layer DDoS attacks (L3, L4)
Unlimited
|
Protection from application layer DDoS attacks (L7)
Unlimited
|
Number of protected resources
1
|
Technical support
24/7
|
Protection for 1 additional resource per month
Per request
|
Legitimate traffic included**
Per request
|
Traffic charge above quota (per Mbps)
Per request
|
Show advanced options
|
* Legitimate traffic (billable traffic) is prevailing clean traffic (usually incoming traffic from a client). The average bandwidth of incoming and outgoing clean traffic is calculated separately every minute (Mbps). Statistics for the month are collected and 5 % of the highest values are discarded (36 hours). Then the maximum figure for each direction is weighted (95th percentile). The larger of these two figures is the bandwidth of legitimate (billable) traffic.
PRO | ENTERPRISE | |
---|---|---|
Monthly subscription fee | 710 € | 920 € |
Attack protection for 1 application up to 1.000 RPS* | + | + |
Perimeter vulnerability scan for 50 IP addresses | + | + |
Attack double-check and zero-day vulnerability detection for an application | + | + |
Application protection against bots and brute-force attacks up to 1.000 RPS* | - | + |
Custom creation of blocking rules and virtual patching of applications | - | + |
PRO |
---|
Monthly subscription fee
710 €
|
Attack protection for 1 application up to 1.000 RPS*
+
|
Perimeter vulnerability scan for 50 IP addresses
+
|
Attack double-check and zero-day vulnerability detection for an application
+
|
Application protection against bots and brute-force attacks up to 1.000 RPS*
-
|
Custom creation of blocking rules and virtual patching of applications
-
|
ENTERPRISE |
---|
Monthly subscription fee
920 €
|
Attack protection for 1 application up to 1.000 RPS*
+
|
Perimeter vulnerability scan for 50 IP addresses
+
|
Attack double-check and zero-day vulnerability detection for an application
+
|
Application protection against bots and brute-force attacks up to 1.000 RPS*
+
|
Custom creation of blocking rules and virtual patching of applications
+
|
1–5 licenses | 6–10 licenses | 10+ licenses | |
---|---|---|---|
Attack protection for an additional application (second-level domain) | 55 € | 40 € | 23 € |
+500 RPS* for an application | 285 € | 200 € | Per request |
Perimeter vulnerability scan for 50 more IPs | 75 € | 57 € | 38 € |
Attack double-check and zero-day vulnerability detection for an additional application | 75 € | 57 € | 38 € |
Application protection against bots and brute-force attacks when the load is increased by 500 RPS* | 72 € | 70 € | 55 € |
1–5 licenses |
---|
Attack protection for an additional application (second-level domain)
55 €
|
+500 RPS* for an application
285 €
|
Perimeter vulnerability scan for 50 more IPs
75 €
|
Attack double-check and zero-day vulnerability detection for an additional application
75 €
|
Application protection against bots and brute-force attacks when the load is increased by 500 RPS*
72 €
|
6–10 licenses |
---|
Attack protection for an additional application (second-level domain)
40 €
|
+500 RPS* for an application
200 €
|
Perimeter vulnerability scan for 50 more IPs
57 €
|
Attack double-check and zero-day vulnerability detection for an additional application
57 €
|
Application protection against bots and brute-force attacks when the load is increased by 500 RPS*
70 €
|
10+ licenses |
---|
Attack protection for an additional application (second-level domain)
23 €
|
+500 RPS* for an application
Per request
|
Perimeter vulnerability scan for 50 more IPs
38 €
|
Attack double-check and zero-day vulnerability detection for an additional application
38 €
|
Application protection against bots and brute-force attacks when the load is increased by 500 RPS*
55 €
|
*RPS (requests per second) — the number of requests per second that a server is able to process.
G‑Core Labs | Qrator Labs | Kaspersky | Cloudflare | |
---|---|---|---|---|
Hacking protection (WAF) | + | + | + | + |
L3/L4 attack protection | + | + | + | + |
L7 attack protection without IP block | + | + | + | + |
L7 attack protection from the first query | + | — | — | — |
HTTPS protection without SSL disclosure, log transfer, or IP blocking | + | — | — | + |
Bot protection (web) | + | — | — | — |
Bot protection (mobile API) | + | — | — | — |
Bot protection without changes in the app code (mobile API) | + | — | — | — |
We monitor singular queries, detect threats, and prevent attacks against banks and financial institutions.
We detect and block even singular bot queries, providing you reliable protection against competitors.
We detect and automatically block traffic sources that generate ad impressions for bots.
We analyze all traffic and keep websites available during major DDoS attacks.