- Free Phishing Audit - Cloud Expo Europe
- Layer 3/4 DDoS Attacks
- Layer 7 DDoS Attacks
- UDP Amplification DDoS Attacks
- Layer 3/4 Attacks
- UDP Amplification Attacks
- Known Layer 7 attacks or custom rules / filters
- All other Layer 7 Attacks
- Volume of requests.
- Bandwidth consumed.
- Content Delivery Network
- eCloud Public™
- eCloud Flex™
- Continuous Optimisation Package
- Threat Monitoring
- Threat Response
- Disaster Recovery as a Service (DRaaS)
The following Service Terms apply only to the specific Services outlined on your Order Form. In the event of a conflict between the Service Terms and the Conditions, the terms and conditions in these Service Terms shall prevail, but only to the extent of such conflict. Any capitalised terms used in this document shall have the meanings set out in the Agreement (save where expressly provided otherwise below) and any additional definitions outlined in relation to the relevant service.
DDoSX® (DDoS protection)
A "DDoS Attack" shall have the definition generally recognised in the hosting industry including a Denial of Service (DoS) event (including Distributed Denial of Service (DDoS)) or Distributed Reflection Amplification Denial of Service (DRDoS) attacks).
The DDoSX® is designed to protect the Services provided to the Customer from the following types of attacks:
* Support for HTTPS inspection is only available where SSL Offloading is enabled which is dependent on the Customer’s requirements.
SLA / Mitigation
The following types of DDoS Attacks will be automatically filtered and as such mitigation will occur within 5 minutes of identification of the attack vector and profile:
The following types of DDoS Attacks will require manual intervention and will be mitigated against within 30 minutes of identification of the attack vector and profile:
Such manual intervention will require the Company and the Customer to coordinate and exchange information that will enable custom filtering to be applied to the System.
Mitigation times are based on each single attack vector. If attack vectors change during the course of a DDoS Attack then each will be treated as new and separate DDoS Attack.
The Company will provide to the Customer on request analytical information for DDoSX® and DDoS Attacks which will include but is not limited to:
The Company shall notify the Customer within 30 minutes of identifying that an incoming DDoS Attack is causing degradation in performance to the Services, notifications will be via the normal notification methods set out in the standard SLA including via the Company’s ticket system.
If the attack requires manual intervention then the Company will provide updates in line with the standard SLA.