Corona Rescue Package
Cloudflare Pro (Managed)
Cloudflare Pro is a Fully Pro-Active Managed Solution with Built-in Web Application Firewall (WAF), 24x7x365 Service Uptime Monitoring, Role Based Access, Custom Dashboard and Caching.
What is Fully Pro Active Managed Service?
In Fully Pro Active Managed Service, we will mitigate the DDoS attack and setup custom ruleset on your firewall once our monitoring system detects DDoS Attack without you having to initiate request. We do necessary configuration, setup, follow up on any outages and provide you reports - in short, help your service stay online.
What is Cloudflare Pro (Managed)?
Unlike regular Cloudflare Pro plan, the Managed Plan comes with Fully Pro-Active Managed round-the-clock support and service monitoring. With Cloudflare Enterprise features like Role Based Access, Extensive Reporting and a Custom Dashboard, the Managed Cloudflare Pro plan starts from a monthly price less than retail Cloudflare Pro price!
Why choose Cloudflare Pro (Managed)?
If you're a fan of Cloudflare, then being on the Cloudflare Pro (Managed) Plan should be on your top must-have essentials. You get a host of more features in less price!
- 24/7/365 Service Uptime Monitoring and Email Alerts
- 24/7/365 Fully Pro-Active Managed Technical Support over Email & Live Chat
- Role-Based Access for multiple users with Custom Dashboard & Permissions
- Unbelievable Price, Even Lesser than Cloudflare Pro Retail [$15/mo in Corona Rescue Plan]
How Cloudflare Pro (Managed) works?
The process is pretty much seamless after you place the order. We'll give you instructions to update your DNS and let you know once your protection is ON and the Proactive Monitoring is Deployed.
- We ask for your backend server IP and the domain name during order process
- We provide you Name Servers or DNS Entries (CNAME) to update
- You make the necessary changes and update us
- Viola! Your protection is ON and your website is receiving clean traffic
Package
Managed CDN |
---|
CloudFlare Pro Plan Managed |
$15/mo |
Order Now |
150+ POP Locations |
Fully Pro Active Managed Service |
Unmetered Data Transfer |
Unlimited DDOS Attack Mitigation Capacity |
HTTP / HTTPS Supported Protocol Only |
80,443 Supported Ports |
Protection against All kind of L4 DDOS Attacks |
Limited Layer 7 Application DDOS Protection |
24/7 Monitoring Included |
24/7/365 Technical Support Included |
Web Application Firewall |
Custom Dashboard |
Reporting |
Role Base Access |
Caching |
$15/mo |
Order Now |
What are some of the common DDoS Attacks we Protect you from?
Network Layer Attack (Layer 3)
A common type of Network Layer attack is "ICMP Flood" whereby attacker takes down the system through repeated "pings" (ICMP echo requests).
Transport Layer Attack (Layer 4)
The most common attack in Transport Layer is "UDP Flood Attack" which involves a taking down target server with UDP requests from large number of computer systems.
Session (Layer 5) & Presentation Layer Attack (Layer 6)
One of the most common Presentation Layer attack is "SSL exhaustion" whereby a large number of requests are sent to target host to force server to perform resource extensive process for setting up secure sessions.
Application Layer Attack (Layer 7)
A popular Application Layer Attack is "Slowloris" which involves sending a large number of simultaneous requests to target server timed carefully to avoid timeout thereby not leaving room for legitimate requests.
Accepted Payment Methods
Still not convinced?
"After two months of our website being knocked out by DDOS attacks, and a major ISP being totally unable to protect us, BlockDoS finally came to the rescue. I can’t tell you what a relief it is to visit our site and actually get to see it. I no longer have to expect the dreaded access denied message, and or staff no longer have to explain that yes, we are still in business. Thank you!"
"As a customer of BlockDoS.net, our experience and continued support from their team of experts has been wonderful. Their 24/7 availability was crucial in our situation, as it was after hours on a holiday weekend when we were alerted to the fact that our website was down due to a denial-of-service attack. From the moment we spoke with tech support to the final solution for ..."
DDoS Protection Overview
According to a research by CDNetworks, more than 54% of businesses were victim of DDoS Attacks in 2017 and even greater number is at risk in 2018. By leveraging on the vulnerabilities within hundreds and thousands of of insecure IoT (Internet of Things) devices, the creation of botnets and subsequent large-scale volumetric attacks is easier and more impactful than ever before. Besides massive scale DDoS Attacks, the focus of attacks is rapidly moving from network & transport layer to application layer 7 where the attacks are way more complex. This means that taking an application or a website offline would require lesser bandwidth and fewer resources resulting in greater disruption and impact on operations. DDoS attacks are able to hamper standard business operations by negatively affecting website availability and performance, sometimes even completely taking them offline. On average, the hourly cost of downtime due to network infrastructure failure is more than USD 100K/hr. One of the obvious side affect of similar attacks is loss of brand reputation, business and customers. In order to combat these complex, massively disruptive attacks, an intelligent, AI-powered scalable network is required which can combat every new type of attack. BlockDoS achieves this by using a global network with more than 150+ PoPs, data-driven intelligence to combat vulnerabilities and exploits and proven scalable unlimited DDoS protection.
DDoS Attack Glossary
LAYER 3 - Network |
ICMP Flood |
ICMP Fragmentation |
BGP Hijacking |
LAYER 4 - Transport |
IPSec Flood |
UDP Flood |
SYN Flood |
LAYER 5 – Session / LAYER 6 - Presentation |
SSL Exhaustion |
Long Lived TCP sessions |
DNS query floods |
LAYER 7 - Application |
Slowloris |
Slow Post |
Slow Read |
HTTP/S Flood |
CVE Attack Vectors |
Layer 7 protocol floods (SMTP, DNS, SNMP, FTP, SIP) |
Database Connection Pool Exhaustion |
Resource Exhaustion |
Large Payload POST requests |
Mimicked user browsing |