Protect your applications with the modern DDoS protection from SyntaxPhoenix
Contrary to many competitors, the SyntaxPhoenix DDoS protection is permanently active and permanently filters the traffic for potential DDoS attacks. In this way we can ensure that traffic from a DDoS attack, if it can be filtered, will not reach your server.
The SyntaxPhoenix DDoS protection relies on many filter methods for the best possible protection and uses multi-level filter pipelines with up to 28 filter levels. The SyntaxPhoenix DDoS protection is already prepared for amplification attacks, TCP floods, well thought-out Layer 7 attacks and other attack scenarios.
Thanks to our network being sufficiently connected to the outside world, we can fend off attacks of up to 750Gbit/s without the use of null routing.
Flood attacks are typical DDoS attack scenarios in which the attackers send increased traffic volumes to the affected systems.
TCP stack attacks explicitly attack the handshake functionality of the TCP / IP stack.
Fragmenation attacks are based on the IP / ICMP fragmentation packets. The attackers send packets that cannot be defragmented and thus fill the memory of the server.
Application attacks are explicitly aimed at the application layer and exploit weak points in applications.