CenturyLink DDoS and Web Application Security

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

High costs of IT personnel

Shortage of inhouse IT engineers


Reduce Costs

Enhance Staff Productivity

CenturyLink DDoS and Web Application Security

Let CenturyLink help you quickly identify and mitigate the latest threats using multiple defenses to safeguard your network, website and cloud applications, so you stay connected—no matter what


Benefits: DDoS Mitigation Rest easier. CenturyLink has used DDoS mitigation scrubbing since 2008 with around-the-clock monitoring and mitigation of your network. Leverage our network power. CenturyLink uses BGP Flowspec deployed across our Internet backbone to mitigate mounting threats. Simplify operations. Our network-based, carrier-agnostic service provides DDoS mitigation with a single point of contact for handling the resolution of threats. Web Application Security Leading technology. Protects against potential compromises of your sensitive data using industry-recognized leading technology. Keep apps safe and running. Detects and blocks malicious web requests, and prevents leakage of sensitive data such as credit cardholder information and social security numbers. Easy payments. Monthly service payment option eliminates the need for constant capital expenditure. Capabilities: DDoS
  • 4.5 Tbps of attack ingestion capacity
  • Re-route and scrub all internet connections, not just CenturyLink on-net capacity
  • Generic route encapsulation (GRE) protocol, direct (VPN), CenturyLink Internet Direct, and proxy clean path returns
  • Advanced behavioral analytics technology and threat intelligence
  • Flow-based application monitoring and mitigation
  • Host level re-routing and IP filtering
  • Real-time attack and peacetime reporting
  • Emergency and customer-initiated mitigation using BGP route control
  • Support of customer premises equipment to cloud signaling
Web Application Security
  • Fully managed installation, configuration and ongoing management of a web application firewall service based on acclaimed Imperva technology
  • Includes 24/7 monitoring to help you react quickly and efficiently to threats as they emerge
  • Inspection of traffic let through the perimeter firewall to the web servers
  • Inspection of encrypted traffic
  • Proactive blocking of malicious traffic