Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

MITIGATOR is a tool against modern DDoS attacks at the L3-L7 levels. It is used to protect infrastructure and individual services of financial, gaming, telecom operators, hostings, and enterprise. MITIGATOR is the best choice for companies that recognize the problems in their security system but are not satisfied with the service provided either by MSSP or their current DDoS protection. Features of MITIGATOR Protection of both symmetric and asymmetric traffic with -TCP -TLS protection with traffic decryption -Web Server log analysis via Syslog -Programmable filter usage; WAF integration options; application protection using Mitigator Challenge Response; ISN Synchronization Traffic redirection via BGP. You can send and receive BGP flowspec for traffic filtering -Flexible deployment schemes: Inline, On-a-stick, L2 transparency, L3 router Support for geo-distributed clustering Support for optional Flow Collector -Automatic traffic dump collection

Description

Distributed Denial-of-Service (DDoS) attacks are increasingly frequent, sophisticated, and expensive to combat, posing significant risks to online services that organizations rely on. These attacks consist of coordinated efforts to incapacitate essential online platforms, enabling attackers to cause disorder and disruption. The resulting downtime can severely hinder employee productivity and impair customer service capabilities. Consequently, it is critical for businesses to invest in an affordable Internet protection solution that proactively safeguards against potential outages. A DDoS Mitigation Service offers comprehensive management by continuously monitoring, detecting, validating, and counteracting attacks, including those originating from third-party networks, thereby preventing outages or associated damages. In the event a DDoS attack is identified and confirmed, you will receive an alert within 15 minutes, after which mitigation procedures commence within another 15 minutes, in accordance with your specified attack identification and mitigation service level agreements (SLAs). Additionally, our system is designed to either proactively or automatically initiate mitigation measures when threats are detected, ensuring robust protection for your organization. This level of preparedness is essential in maintaining operational continuity and safeguarding your digital assets against evolving threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

BIFIT

Founded

2008

Country

Russian Federation

Website

mitigator.ru/en.html

Vendor Details

Company Name

Windstream Enterprise

Country

United States

Website

www.windstreamenterprise.com/products/ddos-mitigation-service/

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Product Features

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Alternatives

WEDOS Protection Reviews

WEDOS Protection

WEDOS Group SA

Alternatives

NSFOCUS ADS Reviews

NSFOCUS ADS

NSFOCUS
DDos Protector Reviews

DDos Protector

Check Point Software Technologies