Corona Rescue Package
Sucuri CloudProxy (Managed)
The Managed Sucuri Cloud Proxy is a Fully Managed Cloud-Based Website Firewall with 24/7/365 monitoring & Intrusion Detection System (IDS) to block all malicious attacks.
What is Fully Pro Active Managed Service?
In Fully Pro Active Managed Service, we will mitigate the DDoS attack and setup custom ruleset on your firewall once our monitoring system detects DDoS Attack without you having to initiate request. We do necessary configuration, setup, follow up on any outages and provide you reports - in short, help your service stay online.
What Is Cloud Proxy Protection?
The Managed Cloud Proxy Protection helps your website stay secure with a cloud based Web Application Firewall that safeguards your website from malicious attacks and hacking attempts. Bundled with a powerful Intrusion Detection System (IDS) and log correlation engine, it provides Virtual Patching and protection to your website.
Why choose Managed Sucuri CloudProxy?
CloudProxy is a Managed Cloud-Based Website Firewall to secure a website against Attacks. It is setup between Internet and Web Server (Origin Server), filtering and blocking malicious requests and sending only clean traffic to the Server.
- Multi-Layer DDoS Attack Protection specially Layer 4 and Layer 7 Attacks
- Unlimited Data Transfer and Unlimited DDoS Attack Handling
- Custom Dashboard and Reporting to keep you Fully Updated
- Full Management with Monthly Pricing and Lowest Price [$10/mo in Corona Rescue Plan]
How Managed Sucuri CloudProxy works?
The process is pretty much seamless after you place the order. We'll give you instructions to update your DNS and let you know once your protection is ON and the Proactive Monitoring is Deployed.
- We ask for your backend server IP and the domain name during order process
- We provide you DNS entries (A records and WWW) to add in your DNS
- You make the necessary changes in your DNS and update us
- Viola! Your protection is ON and your website is receiving clean traffic
Sucuri CloudProxy Managed
|30+ POP Locations
|Fully Pro Active Managed Service
|Unmetered Data Transfer
|Unlimited DDOS Attack Mitigation Capacity
|HTTP / HTTPS Supported Protocol Only
|80,443 Supported Ports
|Protection against All kind of L4 DDOS Attacks
|Limited Layer 7 Application DDOS Protection
|24/7 Monitoring Included
|24/7/365 Technical Support Included
|Web Application Firewall
What are some of the common DDoS Attacks we Protect you from?
Network Layer Attack (Layer 3)
A common type of Network Layer attack is "ICMP Flood" whereby attacker takes down the system through repeated "pings" (ICMP echo requests).
Transport Layer Attack (Layer 4)
The most common attack in Transport Layer is "UDP Flood Attack" which involves a taking down target server with UDP requests from large number of computer systems.
Session (Layer 5) & Presentation Layer Attack (Layer 6)
One of the most common Presentation Layer attack is "SSL exhaustion" whereby a large number of requests are sent to target host to force server to perform resource extensive process for setting up secure sessions.
Application Layer Attack (Layer 7)
A popular Application Layer Attack is "Slowloris" which involves sending a large number of simultaneous requests to target server timed carefully to avoid timeout thereby not leaving room for legitimate requests.
Accepted Payment Methods
Still not convinced?
"After two months of our website being knocked out by DDOS attacks, and a major ISP being totally unable to protect us, BlockDoS finally came to the rescue. I can’t tell you what a relief it is to visit our site and actually get to see it. I no longer have to expect the dreaded access denied message, and or staff no longer have to explain that yes, we are still in business. Thank you!"
"As a customer of BlockDoS.net, our experience and continued support from their team of experts has been wonderful. Their 24/7 availability was crucial in our situation, as it was after hours on a holiday weekend when we were alerted to the fact that our website was down due to a denial-of-service attack. From the moment we spoke with tech support to the final solution for ..."
DDoS Protection Overview
According to a research by CDNetworks, more than 54% of businesses were victim of DDoS Attacks in 2017 and even greater number is at risk in 2018. By leveraging on the vulnerabilities within hundreds and thousands of of insecure IoT (Internet of Things) devices, the creation of botnets and subsequent large-scale volumetric attacks is easier and more impactful than ever before. Besides massive scale DDoS Attacks, the focus of attacks is rapidly moving from network & transport layer to application layer 7 where the attacks are way more complex. This means that taking an application or a website offline would require lesser bandwidth and fewer resources resulting in greater disruption and impact on operations. DDoS attacks are able to hamper standard business operations by negatively affecting website availability and performance, sometimes even completely taking them offline. On average, the hourly cost of downtime due to network infrastructure failure is more than USD 100K/hr. One of the obvious side affect of similar attacks is loss of brand reputation, business and customers. In order to combat these complex, massively disruptive attacks, an intelligent, AI-powered scalable network is required which can combat every new type of attack. BlockDoS achieves this by using a global network with more than 150+ PoPs, data-driven intelligence to combat vulnerabilities and exploits and proven scalable unlimited DDoS protection.
DDoS Attack Glossary
|LAYER 3 - Network
|LAYER 4 - Transport
|LAYER 5 – Session / LAYER 6 - Presentation
|Long Lived TCP sessions
|DNS query floods
|LAYER 7 - Application
|CVE Attack Vectors
|Layer 7 protocol floods (SMTP, DNS, SNMP, FTP, SIP)
|Database Connection Pool Exhaustion
|Large Payload POST requests
|Mimicked user browsing