AntiDDoS

Guarantee of website availability thanks to Anti-DDoS.

Anti-DDoS service offered by T-Mobile is an uninterrupted protection of websites allowing to ensure their constant availability.
It consists in active network monitoring and quick reaction to block artificial traffic generated by botnet networks.

Inquire about offer

Scope of service

The offer of protection against DDoS attacks (Distributed Denial of Service) includes two elements of the service.

Procedure for an emergency service activation
If you have an internet connection from T-Mobile, you can take advantage of one-time, free support in case of a DDoS attack.
For more details, contact your account manager or call 604 604 604.

Monitoring

Around the clock, 365 days a year, we actively monitor and analyse incoming traffic, verifying it for any anomalous and unauthorised signatures, traffic profiles and the latest identifying patterns.
The detection of an attack triggers the activation of the second component – the protection plan.

Protection

The first stage of protection is to redirect traffic to the cleanup center. We care about the quality of our service, so we contact the client before taking action, making sure that the detected anomaly is not a false alarm. We then provide ongoing protection, adapting it to the changing dynamics of a given DDoS attack.
You can monitor network traffic statistics and our actions on a dedicated web portal.

Procedure for an emergency service activation
If you have an internet connection from T-Mobile, you can take advantage of one-time, free support in case of a DDoS attack.
For more details, contact your account manager or call 604 604 604.

Comparison
of packages

  • Comparison
    of packages

    Package<br />
Bronze

    Package
    Bronze

    Package<br />
Silver

    Package
    Silver

    Package<br />
Gold

    Package
    Gold

  • SLA guarantee

  • Daily update of signatures

  • Service management by T-Mobile Polska

  • Client support center 24/7/365

  • Dedicated thresholds
    alarm

    (based on customer data)

    (established with the support of T-Mobile)

    (established with the support of T-Mobile)

  • Dedicated mitigation profile

    (based on customer data)

    (established with the support of T-Mobile)

    (established with the support of T-Mobile)

  • 24/7/365 Layer 3 and 4 attack monitoring

  • Access to web-based information portal
    informacyjnego

    (1 account)

    (1 account)

    (3 accounts)

  • Number of protected objects

    1

    1

    Up to 3

  • Automated mitigation

  • Possibility of running the mitigation by the user

  • Execution time of protection procedure

    Up to 30 minutes

    Up to 30 minutes

    Up to 30 minutes

  • Start time of protection (auto-mitigation)

    < 1 minute

    < 1 minute

    < 1 minute

  • Informing about events (e-mail, SMS)

  • Tests of security procedures

    optional

    at startup

  • Platform availability

    99,99%

    99,99%

    99,99%

AntiDDoS
protection process

  • Planning

    1

    Development and implementation of a protection plan tailored to the Client’s needs.

  • Continuous monitoring

    2

    Incoming and outgoing data flows along the usual, unchanged route. DDoS attack monitoring system continuously analyses received traffic, comparing its parameters with established threshold values and characteristics of historical incoming traffic

  • Attempted DDoS attack

    3

    When the monitoring system detects a threat, it records it and immediately notifies the team and the Client via SMS and email. The SOC T0 Mobile expert immediately checks and classifies the incident and then contacts the Client to inform them of the situation.

  • Mitigation of a DDoS attack

    4

    Classification of an event as a DDoS attack triggers the threat mitigation procedure. In less than a second, incoming traffic is redirected to T-Mobile’s traffic cleaning center (where so-called scrubbing takes place) and the client’s web application regains full availability. In order to achieve the most important standard of protection, T-Mobile technical staff will monitor the event as long as the stream of malicious traffic directed towards the Client’s network is detected.

  • End of DDoS attack

    5

    Once the appropriate time indicators show that the traffic has returned to normal, T-Mobile’s expert will terminate the prevention porcedure and redirect the traffic to a normal path.

Technical
parameters

  • High performance platform

    > 200 Gb/s.

  • Technology

    Arbor Networks leading technology solutions.

  • Option

    Application layer attack protection.

  • Redundancy

    Secure and antiDDOS platform located in T-Mobile Data Center in Poland.

  • Individual protection plan

Product benefits

Quick and effective repulsion of DDoS attacks

We protect all types of resources against various DDoS attacks in a single product.

Uninterrupted support

Expert SOC T-Mobile support during attacks.

Proactive monitoring

Monitoring of protected infrastructure 24/7/365.

Operational continuity

You can continue to use your company resources, even during large-scale DDoS attacks (with the possibility of receiving attacks with a strength of up to 200 GB/s).

Test for free

To convince you of the effectiveness of Anti-DDoS, we give you the opportunity to test the service before deciding to implement it.

Do you have questions or need an offer?

Write to our Business Advisor
Welcome
How can we help you?
5000
...