DDOS MITIGATION AND APPLICATION SECURITY

Minimize downtime and bolster application performance with multiple layers of defense across multi-vector and mixed application layer attacks.

Mitigate Threats for Less

For a limited time only, get up to 1Gbps of autmoated protection for just $1,500/mo*

Get the power of DDoS mitigation at scale

Illustration of a computer monitor showing lines of code with a virtual bug next to a lock icon representing security

Benefits

DDoS

Defense in depth

Our extensive and deeply peered global network acts as a first line of defense with DDoS countermeasures integrated directly into the network to stop attacks faster.

Defense in depth

Our extensive and deeply peered global network acts as a first line of defense with DDoS countermeasures integrated directly into the network to stop attacks faster.

Internet Services

Next generation scrubbing technology

Lumen next-generation intelligent routing technology sends excess traffic to super or regional centers to help reduce collateral damage during attacks.

Next generation scrubbing technology

Lumen next-generation intelligent routing technology sends excess traffic to super or regional centers to help reduce collateral damage during attacks.

Threat Detect

Proven threat and attack traffic visibility

Black Lotus Labs high-fidelity threat intelligence drives botnet takedowns and powers Rapid Threat Defense automated detection and response—delivering mitigation beyond just scrubbing and minimizing time to mitigate.

Proven threat and attack traffic visibility

Black Lotus Labs high-fidelity threat intelligence drives botnet takedowns and powers Rapid Threat Defense automated detection and response—delivering mitigation beyond just scrubbing and minimizing time to mitigate.

Man and woman sitting in a row of desks in front of a computer while talking

Features and Specs

  • BGP FlowSpec automatically delivers rules to the Lumen backbone for highly scalable, global mitigation
  • Carrier-agnostic protection supports Lumen or third-party connections for IPv4 and IPv6 traffic with options for IP VPN Direct, Lumen® Internet Direct and GRE clean traffic return
  • Customer traffic onboarded at closest scrubbing center or at hundreds of Lumen internet service or IP VPN points of presence (POP) globally
  • 1 second time to mitigate after most attack traffic hits scrubbing centers
  • Flow-Based Monitoring for early detection and notification of attacks by monitoring customer edge routers directly, or Lumen network edge routers, if Lumen is the internet provider
  • Supports hybrid deployment by integrating DDoS mitigation premises equipment via cloud signaling for local decryption capabilities
  • Full range of proactive and reactive mitigation options:
    • Always-On with customer-initiated mitigation controls
    • On-Demand with proactive or auto-mitigation controls
  • Around-the-clock support from eight global security operation centers (SOCs) across North America, Latin America, Asia-Pacific and Europe
  • Automated detection and response with Rapid Threat Defense stopping DDoS bot traffic at the network level
    • Rapid Threat Defense countermeasure updated by Black Lotus Labs every 15 minutes
  • DDoS protection turn-up available in minutes through our digital buying experience
  • Next-gen Web Application Firewall (WAF) and Bot Management solutions defend against application layer attacks
Lumen DDoS Quarterly Report

Lumen Quarterly DDoS & Application Threat Report Q3 2023

Stay up to date on the latest cybersecurity intel and mitigation strategies in the new Lumen Quarterly DDoS & Application Threat Report. In this edition, you’ll learn about: 

 

  • Router malware poses an enormous opportunity for attackers — AVrecon is an example.
  • Leading trends on duration and size of DDoS & application attacks
  • Industry profiles of the top verticals targeted in 3Q23

Powerful solutions on your terms

We offer predictable commercial terms, regardless of size, length or frequency of DDoS attacks. To build a custom solution with advanced features, contact your sales representative. For rapid turn-up of service with over-the-top clean traffic return, configure your own Lumen® DDoS Hyper solution through our digital buying experience.

How much would a cyberattack cost your business? 

Cyberattacks are on the rise as botnets evolve in size, scale and sophistication. Private, public and hybrid cloud environments are also at risk. Try our calculator to find out how much a cyberattack could cost your business.

Resources

Contact a DDoS Mitigation and Application Security specialist

*Listed rate is per Internet service port with on-demand clean return bandwidth up to 1Gbps and is available to qualifying business customers purchasing new service in eligible U.S. service locations. Requires Lumen internet service, a minimum 12-month term agreement and early termination fees will apply as set forth in customer's agreement. Rate excludes installation, taxes and fees. Customer must remain in good standing and offer may terminate if Customer changes their account in any manner including, but not limited to, their service location. Credit approval and deposit may be required. Offer may not be combined with other offers. Additional restrictions, terms and conditions apply.