BGP-based DDoS mitigation
Our DDoS protection shields entire networks by leveraging the Imperva network’s multi-terabit scrubbing capacity and high-capacity packet processing capabilities to instantly mitigate the largest, most sophisticated DDoS attacks.
Imperva supports multiple deployment models, including Cross Connect, GRE tunnels, and Equinix Cloud Exchange. DDoS protection for networks is available as an always-on or on-demand service, with flow-based monitoring and support for automatic or manual switchover.
Instantly stop attacks of all sizes
The Imperva global network has over 6 Terabits per second of scrubbing capacity and the ability to process 65 billion packets per second. Once activated, the service blocks any attack in less than 3 seconds with typical time to mitigation of 1 second.
Our mesh network of data centers enables round-trip times of less than 50 milliseconds to more than 90% of the world, ensuring smooth performance even when your server is under attack.
DDoS protection for networks is available as an always-on service or as an on-demand solution, with either manual or automatic switchover.
Secure assets across cloud environments
DDoS protection for networks guards any network-layer asset, including AWS, Azure, and Google Cloud; whether in a hosted, private cloud, or public cloud environment.
Direct protection (optional)
A direct, layer 2 connection to Imperva scrubbing centers is available for always-on deployments or environments that are highly sensitive to latency.
Support for any type of service
DDoS protection for networks supports any type of service, including TCP, UDP, SMTP, FTP, SSH, VoIP and proprietary or custom protocols.
Up-to-the-second dashboards show attack traffic details, including vector types, traffic by PoP and IP range statistics.
“We now spend less time on issues such as software changes and can direct more energy on protecting our members’ data and company information.“
Sr. Manager of Information Security,
BlueCross BlueShield of Tennessee
“Increasing the visibility into threats allows us to make informed decisions into securing our environment.”
IT Security and Risk Manager,