Rozwiń nawigację
About us
Our Offer
Dedicated Servers
GPU LITE Servers
Virtualization servers
Hosting servers
Servers for corporate Email
Fast Storage Servers
Servers for critical services - BIG DATA
Database servers
Backup servers
RODO Servers with Hardware Encryption
Online Gaming Servers
Servers for Remote Desktop
Full Offer
VPS Servers
Cloud VPS SSD QUATTRO
Cloud-in-Cloud - VPS servers wholesale offer
Private Cloud - Cloud Computing
Turnkey solutions
VPS Servers
Managed VPS Servers
Options
What is VPS/Cloud?
Usage
Operating Systems
Full Offer
Co-location
Basic packages
Servers co-location
Co-location of cabinets
Additional Co-location Services
Backup and Services
Software rentals
Full Offer
Partners Programme
Privacy Policy
Our server rooms
Your own server room at Datahouse.pl
Certificate ISO 27001:2013
EU Data Protection Regulation (RODO).
Security policy
Surveillance, monitoring, access
Additional options
GIODO requirements
Anti-spam Policy
Tier class Data center - DataHouse.pl Tier3/4
Protection against DDOS attacks
Order
Login
FAQ
Contact
Uptime
24 years
24 years
on telco market
Rozwiń nawigację
DEDICATED SERVERS
Calculator - dedicated server
COLOCATION
Calculator Servers Rack
Calculator - Freestanding Servers
Calculator - Cabinet Rental
VPS/CLOUD SERVERS
Calculator VPS
CLOUD SERVICES - SaaS
Cloud MYSQL
Cloud Postgres - SaaS
Cloud DNS Servers - SaaS
SERVER ADMINISTRATION
Calculator - administration
FTTB internet
FTTB - Fibre to the Business
Internet connections
Lines to the data centre and to the backup centre
Liaison between departments
Protection from DDOS attacks
Range map
Protection from DDOS attacks
Many years of experience in protecting servers from DDOS
accidents
has resulted in one of the most excellent attack detection and mitigation systems currently offered to any Internet access service at no extra charge.
Physical structure of detection system:
Traffic sensors on external network connections
Traffic sensors on internal network connections
Real-time traffic analysis servers with a heuristic element to create a valid traffic model
Mitigation control servers
Switches mirroring traffic
Physical structure of the Mitigation System:
High-performance network switches
Backbone routers
DDOS BYPASS routers
Basic types of mitigated attacks:
Volume dense attacks based on UDP packets
Socket overrun attacks - based on TCP packets
SYN FLOOD attacks
Attacks on individual layer 4 services.
Packet fragment attacks
NTP REDIRECTION attacks
DNS FLOOD attacks
Attack detection times and mitigation times:
Thanks to the use of real-time analysis technology, most attacks are detected and mitigated within a few (on average 2-4) seconds.
A more detailed description of DDOS
accidents
protection systems is available to interested and existing customers.
Copyright 2024
Datahouse
. All rights reserved
Polityka prywatności
Ta strona korzysta z plików cookie, aby poprawić komfort poruszania się po witrynie. Spośród nich pliki cookie sklasyfikowane jako niezbędne są przechowywane w Twojej przeglądarce, ponieważ są niezbędne do działania podstawowych funkcji witryny. Używamy również plików cookie stron trzecich, które pomagają nam analizować i rozumieć, w jaki sposób korzystasz z tej witryny. Te pliki cookie będą przechowywane w Twojej przeglądarce tylko za Twoją zgodą. Masz również możliwość rezygnacji z tych plików cookie.
Ustawienia
OK, ZGADZAM SIĘ