DDoS Protection

Global Digital Forensics has partnered with DOSarrest to offer a robust, yet affordable, security offering.  DDOS protection in a cloud based “instant on” offering gives our clients the final crucial brick in the defensive wall.   Now GDF E-Defense clients can remediate DDoS attacks (Distributed Denial of Service) in near real time and get unparrelled insight into the traffic attacking their network through the GDF Security Portal.

DDoS Attack SolutionsDOSarrest is a cloud based DDoS protection service that, since its inception in 2007, has developed, implemented and real-world tested a wide range of proprietary methods and techniques to stop DDoS attacks. We do not rely on purpose-built DDoS mitigation devices to stop all attacks. Our experience has taught us that no one DDOS mitigation device can stop all varieties of DDoS attacks in existence today.

Our Nodes are geographically dispersed in such a way as to offer our worldwide customer base, not only DDoS protection, but also able to handle large bursts of legitimate traffic. It operates like a content delivery network, except it can stop any and all DDoS attacks. We cache, as well as proxy, for added performance.

Once a website is running on our service, the site is protected 24/7 from any DDoS attack. We set alerts on the number of requests to your site for a given unit of time, using a baseline for what is normal for your site. Should the requests exceed the predetermined threshold, our team will investigate to determine the next course of action and apply any necessary mitigation techniques. This is all performed without interruption in service, or intervention by the customer. We have also built our own custom monitoring system that will alert us to any performance or site unavailability. This custom system is completely external to any of our traffic scrubbing nodes. From 6 different networks, in 3 geographic regions, that constantly monitors your site being anycasted from all of our nodes.

We have our own custom built customer access area (DSS) where customers are able to view and make changes to their configurations, as well as see any attack in real-time.

Customers are able to customize the cache for optimal performance and can fine-tune hundreds of parameters, to enhance security or improve performance.

All of the above is supported 24/7 by an experienced DDOS mitigation team.

Cyber Intrusion Timebomb