Before you can respond to suspicious cyber activity, you must identify it.
We collect sample packets and other pertinent information from switches, routers and other devices to establish a view of normal traffic. We feed this information into a correlation engine for threat detection, alerts and reporting.
24/7 access to a secure Web dashboard providing real-time information about your site’s network traffic patterns and enabling you to respond to potential threats quickly. Features include: alerts, bandwidth and traffic graphs, escalation plan management, reports and more.
Based on the information you provide during customer set-up, Verisign creates a customised escalation plan of who to contact in the event of a network crisis.
We provide a view across your entire network and traffic patterns all in one place, which improves the ability to quickly and confidently initiate mitigation strategies.
We leverage our expertise and global connections to distinguish suspicious traffic from legitimate traffic, enabling organisations to receive early warning of attacks.
Verisign delivers always-on monitoring; alerts based on a custom customer profiles; and advanced reporting and analysis during and after attack mitigation activities.
Our professionals provide advice as circumstances dictate and ensure that the team monitoring your traffic has hands-on experience.
Stop a DDoS attack in the cloud before it can harm your network
Our mitigation service works with multiple ISPs and third-party technologies providing a single solution to protect your applications across multiple locations.
When a malicious event is detected, we quickly direct the harmful traffic to a Verisign mitigation site in the cloud before it reaches a customer’s network.
Our 24/7 security team “scrubs” traffic through proprietary filtering technology and techniques that have protected critical Internet infrastructure for more than 15 years. We layer these techniques to filter out malicious traffic and allow the legitimate traffic through so that you can sustain normal business operations.
By filtering malicious traffic in the cloud, Verisign stops cyber attacks before they have the chance to significantly affect your network. This eliminates the need to dramatically over-provision bandwidth to keep up with escalating attack sizes.
We provide a recommendation that fits the attack—either a "surgical" IP-based approach or a broad-scale approach. This ensures your resources are optimised and individualised for each attack.
Have confidence in the integrity of the data exchange process as we base secure on-ramping on your post-attack security requirements.
We offer joint solutions that allow seamless interoperability between on-premise devices, cloud platforms and Verisign’s cloud-based DDoS Protection Service.
No matter what level of DDoS Protection Service you choose, we are on hand to help
We are available 24/7 in case your critical online systems and applications need swift and thorough mitigation.
Our DDoS experts can provide advice as circumstances dictate and ensure that the team monitoring your traffic has hands-on experience.
Interested in becoming a reseller? Explore our channel program.