Please update your browser.

Our site no longer supports this browser. Using another one will help provide a better experience.

Menu

DDOS MITIGATION AND APPLICATION SECURITY

Minimise downtime and bolster application performance with multiple layers of defence across multi-vector and mixed application layer attacks.

Under a DDoS attack?

Turn up Lumen® DDoS Hyper in minutes through our digital buying experience.

Get the power of DDoS mitigation at scale

Benefits

Defence in depth

Defence in depth

Our extensive and deeply peered global network acts as a first line of defence with DDoS countermeasures integrated directly into the network to stop attacks faster.

Next generation scrubbing technology

Next generation scrubbing technology

Lumen next-generation intelligent routing technology sends excess traffic to super or regional centres to help reduce collateral damage during attacks.

Proven threat and attack traffic visibility

Proven threat and attack traffic visibility

Black Lotus Labs high-fidelity threat intelligence drives botnet takedowns and powers Rapid Threat Defence automated detection and response—delivering mitigation beyond just scrubbing and minimising time to mitigate.

Features and Specifications

  • BGP FlowSpec automatically delivers rules to the Lumen backbone for highly scalable, global mitigation
  • Carrier-agnostic protection supports Lumen or third-party connections for IPv4 and IPv6 traffic with options for IP VPN Direct, Lumen® Internet Direct and GRE clean traffic return
  • Customer traffic on-boarded at closest scrubbing centre or at hundreds of Lumen internet service or IP VPN points of presence (POP) globally
  • Up to 10-minute time-to-mitigate SLAs for most known forms of attack after traffic is on-ramped through Lumen scrubbing centres
  • Flow-Based Monitoring for early detection and notification of attacks by monitoring customer edge routers directly, or Lumen network edge routers, if Lumen is the internet provider
  • Supports hybrid deployment by integrating DDoS mitigation premises equipment via cloud signalling for local decryption capabilities
  • Full range of proactive and reactive mitigation options:
    • Always-On with customer-initiated mitigation controls
    • On-Demand with proactive or auto-mitigation controls • Around-the-clock support from eight global security operation centres (SOCs) across North America, Latin America, Asia-Pacific and Europe
  • Automated detection and response with Rapid Threat Defence stopping DDoS bot traffic at the network level
    • Rapid Threat Defence countermeasure updated by Black Lotus Labs every 15 minutes
  • DDoS protection turn-up available in minutes through our digital buying experience
  • Next-gen Web Application Firewall (WAF) and Bot Management solutions defend against application layer attacks

Powerful solutions on your terms

We offer predictable commercial terms, regardless of size, length or frequency of DDoS attacks. To build a custom solution with advanced features, contact your sales representative. For rapid turn-up of On-Demand service with over-the-top clean traffic return, configure your own Lumen® DDoS Hyper solution through our digital buying experience.

Compare solutions

Features Lumen® DDoS Hyper DDoS Mitigation Service
How to Purchase    

Available through our digital buying experience

x x

Contact your sales representative

x x
Types of Mitigation    

Always-on

x x

On-demand

x x
Clean Traffic Return Method    

Over the Top/GRE Lumen or Third Party

x x

Integrated with internet circuit

x x

Private connectivity (IP VPN)

x x
Attack Monitoring    

Lumen Network

x x

Customer CPE

x x
Attack Size Mitigation    

Unlimited

x x
Mitigation Control    

Automated

x x

Customer-initiated

x x

SOC-assisted

x x
Global SOC Support 24/7    

Protection against most common attacks with basic customisation

x x

Full customisation for attack mitigation

x x

Priority handling

x x
IP Protection    

IPv4

x x

IPv6

x x
Rapid Threat Defence    

Black Lotus Labs-provided countermeasures

x x
Contract and Billing Currency    

U.S. only

x x

Global, with some restrictions

x x
Professional Security Services Assistance    

Optional, designated security consultant for runbooks, analysis and reporting tailored to your business needs

x x

How much would a cyberattack cost your business? 

Cyberattacks are on the rise as botnets evolve in size, scale and sophistication. Private, public and hybrid cloud environments are also at risk. Try our calculator to find out how much a cyberattack could cost your business.

Resources

Powered by Translations.com GlobalLink OneLink SoftwarePowered By OneLink