Corona Rescue Package

Sucuri CloudProxy (Managed)

The Managed Sucuri Cloud Proxy is a Fully Managed Cloud-Based Website Firewall with 24/7/365 monitoring & Intrusion Detection System (IDS) to block all malicious attacks.

Check out our Sucuri Cloudproxy Special Package Details, Features and Pricing

What is Fully Pro Active Managed Service?

In Fully Pro Active Managed Service, we will mitigate the DDoS attack and setup custom ruleset on your firewall once our monitoring system detects DDoS Attack without you having to initiate request. We do necessary configuration, setup, follow up on any outages and provide you reports - in short, help your service stay online.

What Is Cloud Proxy Protection?

The Managed Cloud Proxy Protection helps your website stay secure with a cloud based Web Application Firewall that safeguards your website from malicious attacks and hacking attempts. Bundled with a powerful Intrusion Detection System (IDS) and log correlation engine, it provides Virtual Patching and protection to your website.

globe

How many locations does it cover?

The Managed Sucuri CloudProxy offers more than 30 PoPs globally giving your website visitors best latency and enhance the performance and security of your website by serving visitor's request through closest PoP.
infinity

How much data transfer is included?

Our main value proposition is Unmetered Data Transfer and the reason is we don't cap the traffic sent through the CloudProxy thereby giving your website flexibility and virtually unlimited traffic.
defense

What types of attacks are mitigated?

Offering extensive protection from multitude of attacks - blocking hacking attempts, DDoS mitigation and multi-layer DDoS attacks including Layer 4 and Application Layer 7 DDoS Attacks.
block

What ports are protected?

In order to keep your website protected and secure, we prefer to block all ports excluding 80 for HTTP and 443 for HTTPS traffic. We follow this practice to limit and stop malicious traffic routed towards the website.

Are you under attack? We are here 24x7x365

Why choose Managed Sucuri CloudProxy?

CloudProxy is a Managed Cloud-Based Website Firewall to secure a website against Attacks. It is setup between Internet and Web Server (Origin Server), filtering and blocking malicious requests and sending only clean traffic to the Server.

  • Multi-Layer DDoS Attack Protection specially Layer 4 and Layer 7 Attacks
  • Unlimited Data Transfer and Unlimited DDoS Attack Handling
  • Custom Dashboard and Reporting to keep you Fully Updated
  • Full Management with Monthly Pricing and Lowest Price [$10/mo in Corona Rescue Plan]

How Managed Sucuri CloudProxy works?

The process is pretty much seamless after you place the order. We'll give you instructions to update your DNS and let you know once your protection is ON and the Proactive Monitoring is Deployed.

  • We ask for your backend server IP and the domain name during order process
  • We provide you DNS entries (A records and WWW) to add in your DNS
  • You make the necessary changes in your DNS and update us
  • Viola! Your protection is ON and your website is receiving clean traffic
 

Package

Managed WAF
Managed Sucuri
Sucuri CloudProxy Managed
$10/mo
Order Now
30+ POP Locations
Fully Pro Active Managed Service
Unmetered Data Transfer
Unlimited DDOS Attack Mitigation Capacity
HTTP / HTTPS Supported Protocol Only
80,443 Supported Ports
Protection against All kind of L4 DDOS Attacks
Limited Layer 7 Application DDOS Protection
24/7 Monitoring Included
24/7/365 Technical Support Included
Web Application Firewall
Virtual Patching
Custom Dashboard
Reporting
Caching

What are some of the common DDoS Attacks we Protect you from?

Network Layer Attack (Layer 3)

A common type of Network Layer attack is "ICMP Flood" whereby attacker takes down the system through repeated "pings" (ICMP echo requests).

Transport Layer Attack (Layer 4)

The most common attack in Transport Layer is "UDP Flood Attack" which involves a taking down target server with UDP requests from large number of computer systems.

Session (Layer 5) & Presentation Layer Attack (Layer 6)

One of the most common Presentation Layer attack is "SSL exhaustion" whereby a large number of requests are sent to target host to force server to perform resource extensive process for setting up secure sessions.

Application Layer Attack (Layer 7)

A popular Application Layer Attack is "Slowloris" which involves sending a large number of simultaneous requests to target server timed carefully to avoid timeout thereby not leaving room for legitimate requests.

Accepted Payment Methods

icon btc 300x150 Blockdos 1icon perfect money 300x150 blockdos 1Stripe bluelogo visamaster Blockdos 5logo discoveramex blockdos

Still not convinced?

Read what our current customers have to say about us.

Case Study: Middle East Airlines

A comprehensive case study on how BlockDoS was able to protect Lebanon Airline from complex DDoS attacks.

Download Now

DDoS Protection Overview

Website Performance, Reliability and Availability through Unlimited DDoS Protection

According to a research by CDNetworks, more than 54% of businesses were victim of DDoS Attacks in 2017 and even greater number is at risk in 2018. By leveraging on the vulnerabilities within hundreds and thousands of of insecure IoT (Internet of Things) devices, the creation of botnets and subsequent large-scale volumetric attacks is easier and more impactful than ever before. Besides massive scale DDoS Attacks, the focus of attacks is rapidly moving from network & transport layer to application layer 7 where the attacks are way more complex. This means that taking an application or a website offline would require lesser bandwidth and fewer resources resulting in greater disruption and impact on operations. DDoS attacks are able to hamper standard business operations by negatively affecting website availability and performance, sometimes even completely taking them offline. On average, the hourly cost of downtime due to network infrastructure failure is more than USD 100K/hr. One of the obvious side affect of similar attacks is loss of brand reputation, business and customers. In order to combat these complex, massively disruptive attacks, an intelligent, AI-powered scalable network is required which can combat every new type of attack. BlockDoS achieves this by using a global network with more than 150+ PoPs, data-driven intelligence to combat vulnerabilities and exploits and proven scalable unlimited DDoS protection.

Are you under attack? We are here 24x7x365


DDoS Attack Glossary

A thorough glossary which covers popular DDoS attacks and their mode of action
LAYER 3 - Network
ICMP Flood
ICMP Fragmentation
BGP Hijacking
LAYER 4 - Transport
IPSec Flood
UDP Flood
SYN Flood
LAYER 5 – Session / LAYER 6 - Presentation
SSL Exhaustion
Long Lived TCP sessions
DNS query floods
LAYER 7 - Application
Slowloris
Slow Post
Slow Read
HTTP/S Flood
CVE Attack Vectors
Layer 7 protocol floods (SMTP, DNS, SNMP, FTP, SIP)
Database Connection Pool Exhaustion
Resource Exhaustion
Large Payload POST requests
Mimicked user browsing

Are you under attack? We are here 24x7x365