Zillow
xoom
BlueCross BLueShield
Siemens
AARP
General electric
BGP based DDoS mitigation

BGP-based DDoS mitigation

Our DDoS protection shields entire networks by leveraging the Imperva network’s multi-terabit scrubbing capacity and high-capacity packet processing capabilities to instantly mitigate the largest, most sophisticated DDoS attacks.

Imperva supports multiple deployment models, including Cross Connect, GRE tunnels, and Equinix Cloud Exchange. DDoS protection for networks is available as an always-on or on-demand service, with flow-based monitoring and support for automatic or manual switchover.

High-capacity network

Instantly stop attacks of all sizes

The Imperva global network has over 6 Terabits per second of scrubbing capacity and the ability to process 65 billion packets per second. Once activated, the service blocks any attack in less than 3 seconds with typical time to mitigation of 1 second.

Minimal network latency

Minimal latency

Our mesh network of data centers enables round-trip times of less than 50 milliseconds to more than 90% of the world, ensuring smooth performance even when your server is under attack.

Flexible protection mode

Flexible activation

DDoS protection for networks is available as an always-on service or as an on-demand solution, with either manual or automatic switchover.

Secure assets across cloud environments

Secure assets across cloud environments

DDoS protection for networks guards any network-layer asset, including AWS, Azure, and Google Cloud; whether in a hosted, private cloud, or public cloud environment.

Direct DDoS Protection

Direct protection (optional)

A direct, layer 2 connection to Imperva scrubbing centers is available for always-on deployments or environments that are highly sensitive to latency.

Infrastructure Protection supports any type of service

Support for any type of service

DDoS protection for networks supports any type of service, including TCP, UDP, SMTP, FTP, SSH, VoIP and proprietary or custom protocols.

DDoS attack visibility

Attack visibility

Up-to-the-second dashboards show attack traffic details, including vector types, traffic by PoP and IP range statistics.

Related Content

Key Resources

Protecting Cryptocurrency from DDoS Attacks

White Paper
Read paper ›
DDoS Protection Analytics

Enhanced Infrastructure DDoS Protection Analytics

Blog
Read blog ›