Voxility DDoS Protection Description

For significant savings, all servers should be connected at the Internet's 10, 40, or 100 Gbps ports-speed. The bandwidth is also aggregated within the same area for significant savings. Amazingly fast internet connectivity is guaranteed by the shortest BGP routes between over 1800 networks, including Lumen (Level3) Telia, NTT Comcast, Telefonica and Arelion. Our Internet edge capacity is much greater than the bandwidth used by customers and it is balanced across the US as well as the EU. To ensure that we have enough spare capacity, we monitor the use of each link. We can not only aggregate all traffic within a specific location but also use our technical skills to offer an Economy’ service that may work well for you. We provide services for serious online businesses, including renting or selling equipment, network equipment, and security services. We do this in the most interconnected and best datacenters in the world.

Pricing

Pricing Starts At:
$500 per month

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Voxility
Year Founded:
2004
Headquarters:
United States
Website:
www.voxility.com
Update This Listing

Media

Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
In Person
Customer Support
24/7 Live Support
Online

Voxility DDoS Protection Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection Service

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)