Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
MITIGATOR is a tool against modern DDoS attacks at the L3-L7 levels. It is used to protect infrastructure and individual services of financial, gaming, telecom operators, hostings, and enterprise.
MITIGATOR is the best choice for companies that recognize the problems in their security system but are not satisfied with the service provided either by MSSP or their current DDoS protection.
Features of MITIGATOR
Protection of both symmetric and asymmetric traffic with -TCP
-TLS protection with traffic decryption
-Web Server log analysis via Syslog
-Programmable filter usage; WAF integration options; application protection using Mitigator Challenge Response; ISN Synchronization
Traffic redirection via BGP. You can send and receive BGP flowspec for traffic filtering
-Flexible deployment schemes: Inline, On-a-stick, L2 transparency, L3 router
Support for geo-distributed clustering
Support for optional Flow Collector
-Automatic traffic dump collection
Description
Noction IRP is an edge-deployed BGP optimization platform that analyzes traffic in real-time to detect congestion, link failures, and performance degradation. The system continuously probes network routes across all available providers, measuring latency, packet loss, and historical reliability to identify the best paths for both inbound and outbound traffic. Route probing operates independently of production traffic flow, ensuring comprehensive visibility without impacting live sessions.
IRP manages ingress and egress bandwidth intelligently, distributing traffic flows across providers to minimize costs while maintaining quality of service. The platform features configurable traffic engineering policies that allow operators to define cost priorities, performance targets, and failover behaviors. Traffic is automatically rerouted when performance thresholds are reached, ensuring optimal traffic delivery, while respecting network policies and business requirements.
Built-in Automatic Anomaly Detection (AAD) provides DDoS protection by analyzing traffic behavior and identifying deviations from established baselines. Unlike static threshold-based systems, AAD builds adaptive behavioral models that adjust to legitimate traffic patterns. AAD detects volumetric floods, amplification attacks, TCP SYN floods, and application-layer threats, then executes mitigation automatically using BGP FlowSpec for granular filtering and RTBH mechanisms for complete traffic blocking when necessary.
IRP delivers 30%-50% average performance improvement, up to 50% latency reduction, and near-100% network availability while reducing bandwidth costs through intelligent multi-homed routing decisions. The platform integrates seamlessly with existing BGP infrastructure.
API Access
Has API
API Access
Has API
Integrations
Plivo
Slack
Twilio
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
BIFIT
Founded
2008
Country
Russian Federation
Website
mitigator.ru/en.html
Vendor Details
Company Name
Noction
Founded
2011
Country
United States
Website
www.noction.com
Product Features
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Product Features
Application Performance Monitoring (APM)
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
Load Balancing
Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting