Products found: 1

Offer a reference bonus

CenturyLink DDoS and Web Application Security

Benefits: DDoS Mitigation Rest easier. CenturyLink has used DDoS mitigation scrubbing since 2008 with around-the-clock monitoring and mitigation of your network. Leverage our network power. CenturyLink uses BGP Flowspec deployed across our Internet backbone to mitigate mounting threats. Simplify operations. Our network-based, carrier-agnostic service provides DDoS mitigation with a single point of contact for handling the resolution of threats. Web Application Security Leading technology. Protects against potential compromises of your sensitive data using industry-recognized leading technology. Keep apps safe and running. Detects and blocks malicious web requests, and prevents leakage of sensitive data such as credit cardholder information and social security numbers. Easy payments. Monthly service payment option eliminates the need for constant capital expenditure. Capabilities: DDoS
  • 4.5 Tbps of attack ingestion capacity
  • Re-route and scrub all internet connections, not just CenturyLink on-net capacity
  • Generic route encapsulation (GRE) protocol, direct (VPN), CenturyLink Internet Direct, and proxy clean path returns
  • Advanced behavioral analytics technology and threat intelligence
  • Flow-based application monitoring and mitigation
  • Host level re-routing and IP filtering
  • Real-time attack and peacetime reporting
  • Emergency and customer-initiated mitigation using BGP route control
  • Support of customer premises equipment to cloud signaling
Web Application Security
  • Fully managed installation, configuration and ongoing management of a web application firewall service based on acclaimed Imperva technology
  • Includes 24/7 monitoring to help you react quickly and efficiently to threats as they emerge
  • Inspection of traffic let through the perimeter firewall to the web servers
  • Inspection of encrypted traffic
  • Proactive blocking of malicious traffic
... Learn more

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.