LIGHTWEIGHT CLOUD-DMZ INSTANCES THAT MITIGATE THE MOST SEVERE DDoS ATTACKS
Conventional DDoS mitigation solutions inspect all incoming traffic and rely on filtering or traffic anomaly detection to block DDoS traffic. This approach cannot match the scale and sophistication of today’s DDoS attackers, and therefore frequently fails and requires extensive IT resources. Addressing today’s threat landscape cannot rely on traditional approaches and requires a paradigm shift.
Sentrix Cloud DMZ takes a completely different approach. Instead of inspecting traffic it processes the customer’s web systems and creates lightweight, read-only servers, which replicate the origin site and respond instantly to user requests because they require no back end processing. These servers are deployed to the cloud and can easily scale when a volumetric attack grows. As a result Cloud-DMZ contains any level of DDoS without impacting user experience and with virtually no IT attention.
KEEPS SERVING USERS UNDER MASSIVE DDoS
- Cloud-DMZ contains all DDoS bandwidth. As a result users are always served under any attack
- No false positives – unlike conventional DDoS mitigation solutions Cloud-DMZ does not block requests, so legitimate users are never blocked
- Lightweight replication servers withstand heavy attacks and leverage Cloud elasticity
MULTIPLE INSPECTION MEASURES
Traffic that is not served by the Cloud-DMZ, typically 0 – 20% of traffic, is passed through rigorous inspection measures before approved to reach the original servers:
- IP Reputation
- Bot detection
- Response verification vs. request
- Response verification vs. known legitimate response schemes
- User behavior analysis
- Advanced mitigation services
PRE AND POST LOGIN PROTECTION
Cloud-DMZ protects against DDoS both at the pre-login and post-login area, which is rapidly becoming a primary DDoS target.
ENDS THE OVERLOAD – MAINTAINS FOCUS DURING AN ATTACK
Conventional DDoS solutions produce millions of alerts and log entries during an attack. This overwhelms security teams and makes it impossible to detect malicious activity and manage the attack. With lack of focus attacks may take days to mitigate.
Cloud-DMZ removes the majority of the attack surface and produces a fraction of the alerts as compared to traditional solutions. As a result, emergency response teams can focus on high priority tasks and successfully end the attack in minimal time.