<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

Visiblity and Control

Through a Portal, the Communications Service Provider (CSP) will have access to an integrated Dashboard and automated tools to:

  • Monitor aggregate network traffic.
  • Configure network-level security policies.
  • Monitor and audit mitigation activities.
  • View event alerts, logs and reports.
  • Carry out null-routing (blackhole) to a Host.

Global Scrubbing Centers

Nexusguard’s globally located scrubbing centers are strategically deployed in main internet intersections, i.e. San Jose, L.A., Miami, London, HK (x2), Taiwan and Singapore, to mitigate attacks closest to their sources. This architecture ensures high resiliency, scalability and availability at all times, and minimizes latency even under a massive volumetric attack.

Remote Monitoring + Auto Mitigation

CSPs without local flow-analysis capability can send sample Flow data to our detection engine for remote traffic monitoring. Detection of traffic anomalies will trigger traffic redirection via BGP announcement to our scrubbing cloud, which will return clean traffic to the CSP network via a GRE tunnel.

The detection engine is comprised of flow-based traffic analyzer and collector that supports NetFlow, JFlow and limited versions of Netstream. Based on threshold anomaly detection, the engine is capable of continuously monitoring hundreds of thousands of IP addresses in real time.

Self-Managed Detection + Mitigation

This deployment is ideal for CSPs deployed with flow-aware devices or anti-DDoS appliances on the edge of their network. When a DDoS attack is detected by the CSP, the CSP can decide if they would like to redirect traffic to our scrubbing cloud via BGP announcement. After traffic scrubbing, clean traffic will be forwarded back to the CSP network via a GRE tunnel.

Protect Large Networks Including Downstreams

Regardless of mitigation effectiveness, InfraProtect is capable of provisioning for and protecting large networks of /16 and smaller within the same AS or across multiple AS’s, as long as they have the same traffic return point.

Automatic Abnormality Detection and Mitigation

As a DDoS mitigation solution intended for a large network, the mitigation engine is based on auto-mitigation templates built on top of a parent detection and mitigation profile.

Self-Service/Managed Mitigation Platform As A Service

The CSP will have access a Portal that functions as a single-point management and reporting by consolidating data received from flow-analysis devices or Nexusguard’s detection engine as well as Nexusguard’s mitigation platform.

One-Button Blackhole

Customer can perform null-routing (blackhole) via the Portal. Null-routes can only be performed every two hours. This action drops all traffic to a Host when attacks are so overwhelming that they might cause collateral damage.

Intelligence-Based Detection Engine

Nexusguard Threat Intelligence collects and analyzes traffic data from multiple sources, including our mitigation platform, Security Operation Center (SOC), industry research, IP reputations and external intelligence exchanges to identify threats, proactively mitigate them, and enable preventive security postures.