Infrastructure DDoS Protection

Imperva Incapsula Infrastructure DDoS Protection safeguards critical network assets through DDoS mitigation for any application, web asset and underlying server infrastructure.

BGP based DDoS mitigation

BGP based DDoS mitigation

Infrastructure Protection shields entire networks by leveraging the Imperva Incapsula network’s multi-Terabit scrubbing capacity and high-capacity packet processing capabilities to instantly mitigate the largest, most sophisticated DDoS attacks.

Imperva supports multiple deployment models, including Cross Connect, GRE tunnels, and Equinix Cloud Exchange. Infrastructure Protection is available as an always-on or on-demand service, with flow-based monitoring and support for automatic or manual switchover.

High-capacity network

Instantly stop attacks of all sizes

The Imperva INcapsula global network has over 6 Terabits per second of scrubbing capacity and the ability to process 65 billion packets per second. Once activated, the service blocks any attack in less than 10 seconds with typical time to mitigation of 1 second.

Minimal network latency

Minimal latency

Our mesh network of data centers enables round-trip times of less than 50 milliseconds to more than 90% of the world, ensuring smooth performance even when your server is under attack.

Flexible protection mode

Flexible activation

Infrastructure Protection is available as an always-on service or as an on-demand solution, with either manual or automatic switchover.

Secure assets across cloud environments

Secure assets across cloud environments

Infrastructure Protection guards any network-layer asset, including AWS, Azure, and Google Cloud; whether in a hosted, private cloud, or public cloud environment.

Direct DDoS Protection

Direct protection (optional)

A direct, layer 2 connection to Imperva scrubbing centers is available for always-on deployments or environments that are highly sensitive to latency.

Infrastructure Protection supports any type of service

Support for any type of service

Infrastructure Protection supports any type of service, including TCP, UDP, SMTP, FTP, SSH, VoIP and proprietary or custom protocols.

DDoS attack visibility

Attack visibility

Up-to-the-second dashboards show attack traffic details, including vector types, traffic by PoP and IP range statistics.

Related Content

Key Resources

Protecting Cryptocurrency from DDoS Attacks

White Paper
Read paper ›
DDoS Protection Analytics

Enhanced Infrastructure DDoS Protection Analytics

Blog
Read blog ›