Please update your browser.

Our site no longer supports this browser. Using another one will help provide a better experience.

Menu

DDOS MITIGATION AND APPLICATION SECURITY

Minimize downtime and bolster application performance with multiple layers of defense across multi-vector and mixed application layer attacks.

Under a DDoS attack?

Our security operations center can help. Reach out today to speak with an expert.

We own DDoS Mitigation – at scale

At Lumen, our global network visibility into the threat landscape powers our portfolio of DDoS mitigation solutions to help keep networks and services protected. With 15 global scrubbing centers leveraging 85+ Tbps of FlowSpec-based defense capacity, we own DDoS.

Benefits

Protection on any connection

Protection on any connection

Lumen can re-route and scrub all internet connections, regardless of carrier, supporting both IPv4 and IPv6 traffic with options for IP VPN Direct, Lumen Internet Direct and GRE clean traffic return path connections.

Around-the-clock monitoring and support

Around-the-clock monitoring and support

Lumen DDoS Mitigation monitors your edge routers directly, providing early detection and notification of attack backed by 24/7 global support via eight global security operations centers (SOCs) across North America, Latin America, Asia-Pacific and Europe.

Hybrid deployment and customer-driven

Hybrid deployment and customer-driven

Easily integrate DDoS mitigation premises equipment via cloud signaling for local decryption capabilities and define when, where, how and what is mitigated to provide fully automated implementations that can help eliminate the resource vortex.

Features and Specs

  • Around-the-clock support from 8 global security operation centers (SOCs) across North America, Latin America, Asia-Pacific and Europe
  • 15 global scrubbing centers, leveraging 85+ Tbps of FlowSpec based defense capacity
  • 9,000+ unique AS Interconnects1 and 120+ Tbps of network capacity
  • Advanced behavioral analytics technology with DDoS proxy service
  • Up to 10-minute time-to-mitigate SLAs for most known forms of attack after traffic is on-ramped through Lumen scrubbing centers
  • Black Lotus Labs threat intelligence for botnet identification and takedowns
  • Full range of proactive and reactive mitigation options:
    • Always-On with customer-initiated mitigation controls
    • On-Demand with proactive or auto-mitigation controls

1Telegeography, Global Internet Geography Executive Summary, 2018.

How would an attack impact your business?

The impact of a security breach can be staggering. Use our calculator to see what a DDoS attack could cost your organization.

Resources