DDoS-Protection

Unavailability of services is a major risk for any company. More and more DDoS attacks are the cause.

For more than 10 years, we have been protecting our customers' data specifically against these attacks. Benefit from our experience.

aixit offers its customers the Arbor Peakflow SP product line as an efficient protection against DDoS attacks.

By using the Arbor Peakflow platform, aixit is able to offer managed DDoS services to its data center customers.

Arbor Peakflow SP already protects more than 80 percent of the world's Internet service providers from DDoS or worm traffic attacks.

All
Attack Vectors
Individual
Configuration
AI
Controlled Filtering
Arbor
Advanced Support

DDoS-Protection by Arbor

Arbor Networks, a leading provider of backbone infrastructure security solutions, uses its threat management systems to protect aixit's Frankfurt Datacenter and our customers from unwanted attacks.

aixit deploys the entire Arbor Peakflow SP product suite for enhanced network security, traffic engineering and managed security services.

By leveraging the Arbor Peakflow platform, aixit is one of the first German provider to offer managed DDoS services to its Datacenter customers.

The Peakflow platform builds on Arbor's years of experience helping ISPs deliver managed security services. Here, the integrated DDoS detection service enables cost-effective DDoS protection and detailed analysis of attacks.

DDoS protection includes a flow sensor component that cost-effectively provides visibility and security across an ISP's or carrier's Internet backbone.

aixit has also implemented the Threat Management System (TMS) component for carrier-grade deep packet inspection, so security threats can be prevented quickly and intelligently. The Peakflow SP platform is distinguished by its ability to detect, analyze and defend against threats across entire ISP networks.

 

"As the first German hosting company to offer managed security services, aixit is in a fantastic position to use the Peakflow platform to solve its customers' long-term problems and generate new revenue streams."

Michael Tullius, Territory Manager Germany/Switzerland at Arbor

DDoS analysis and defense

For attack detection, the netflow sent by our routers is analyzed in real time. Flow data, SNMP and BGP updates are used to learn the normal network and routing behavior of routers and interfaces. Then, traffic patterns are matched with topology data to create logical data models.

Using this data, the system notifies our staff and customers of any significant changes in the network. These can be DDoS attacks, misconfigurations or device failures, and also include long-term impacts due to changes in data traffic.

Our complete solution, provides detailed information, is scalable and ensures network availability so that threats to network integrity are effectively contained.

To ensure customer satisfaction and the best possible performance of applications such as HTTP, VoIP and DNS, we provide our customers with visibility into key metrics such as jitter, latency, network round-trip time (RTT), delays (DEL) and packet loss.

Defense includes all methods and techniques to mitigate the negative impact of DDoS attacks. For this purpose, the data stream is filtered to allow only desired traffic through.

With this solution, aixit can detect attacks at the network and application level and eliminate attack traffic while maintaining regular traffic.

What is a leased line?

A leased line is a permanent, exclusive connection between two or more locations. In contrast to conventional shared Internet connections, a leased line offers dedicated bandwidth and greater reliability. It is particularly suitable for companies that require constant, stable data transmission without interruptions, e.g. for VoIP, video streaming or corporate networks.

What is dark fiber?

Dark fiber (or “unlit fiber”) refers to fiber optic cables that are laid but not yet actively used in a network. Companies can rent or buy dark fiber and then install the hardware themselves to “light up” the network. This offers maximum flexibility and control, especially when it comes to the scalability and security of your own network.

What is a symmetrical connection?

A symmetrical connection means that the upload and download speeds are identical. This is particularly important for companies that not only need to download but also upload large amounts of data, e.g. for cloud applications, video conferencing or remote backup solutions. Symmetrical connections generally offer a more stable and powerful connection.

What Internet bandwidths does aixit offer?

aixit offers flexible bandwidth options that are tailored to the specific needs of your company. We generally offer symmetrical connections only, ranging from 100 Mbit/s to 40 Gbit/s or 100Gbit/s. Depending on the location and availability, we can adapt the connection to your requirements. Please contact us for a customized consultation.

What are the advantages of radio relay?

Radio relay is a wireless communication method that transmits data between two points via a line-of-sight connection. The benefits include fast setup without the need for physical cabling, high bandwidths and low latency. Radio relay is ideal for hard-to-reach areas or as a backup solution to wired connections.

How can I find out whether aixit can connect my building or office?

You can contact us via the contact form on our website, by e-mail to sales@aixit.com or by telephone on 069 - 203470980. To check availability, please let us know the exact address of your building or office and the desired symmetrical bandwidth. Our team will contact you immediately to discuss the next steps.