Superior protection against DDoS attacks
We will make sure that your services remain up and running even if they become the target of a massive DDoS attack
DDoS attacks are still one of the greatest threats facing internet infrastructure, causing companies significant financial losses, reputational damage, and loss of trust from their end customers.Security, availability, throughput
Extensive experience and perfect technologies
What our clients say
Choose your type of protection
We hold the necessary certificates and security is our top priority
- Superior DDoS protection
Maximum resilience of services in the event of an attack. - Physical security
Physical security at BT3 level according to the National Security Authority methodology. - Proven technologies
We use and offer only proven and up-to-date technologies to ensure cyber security. - Active support
We provide active support, 24 hours a day.
- ANSI-TIA942
The technology is operated from an ANSI-TIA942 certified DC TOWER data centre - Common Criteria Certification for Information Technology (IT) Security (ISO/IEC 15408)
Certification at CC EAL 4+ level - ISO 9001
Quality management systems - ISO 14001
Environmental management systems - ISO 19011
Standard for the certification of internal auditors - ISO/IEC 20 000-1
Information technologies – Service management system requirements - ISO/IEC 27001
Information security management systems - ISO/IEC 27017
Information technologies – Security techniques – A set of guidelines for cloud environment security and for minimising the potential risk of security incidents - ISO/IEC 27018
Information technologies – Security techniques – A set of procedures for the protection of Personally Identifiable Information (PII) in public clouds acting as PII processors - SOC Type 1 and Type 2
SOC 2 Type 1 and Type 2 certifications, issued in accordance with American Institute of Certified Public Accountants (AICPA) standards and requirements, cover information management and security in organizations - ISO 50 001
Energy management systems - PCI-DSS
Compliance with the requirements of PCI-DSS for data centre operators - NBÚ
Certificate for access to classified information up to the classification level ‘CONFIDENTIAL’ - GDPR compliance
The infrastructure is fully compliant with GDPR requirements
More detailed information
An attacker infects a large number of devices (such as computers, mobiles, IoT devices) with malware, creating a botnet. Subsequently, all these devices are, under the attacker’s control, directed at the target server or service which they flood with an immense number of requests.
A service that is unable to process such a high volume of data starts to slow down or stops working altogether, becoming unavailable to ordinary users.
In very simplified terms, attacks can be divided into three basic categories:
- Bandwidth attacks: The attacker attempts to overload the target network by excessive data transfer.
- Application layer attacks: These attacks target specific applications, such as web servers, mimicking legitimate requests in order to exhaust server resources.
- Protocol attacks: They attempt to exploit weaknesses in communication between network elements.
Protection against DDoS attacks is critical to maintaining the availability of online services and minimising the impact of the attacks. One of the most effective methods is a specialised DDoS protection solution from CRA as your internet connectivity provider. In addition to real-time monitoring, the solution offers rapid response to threats, by virtually instant traffic scrubbing in the case of an attack in a scrubbing centre (popularly referred to as a traffic scrubber). This rapid and effective defence requires very powerful technologies on the provider’s side as well as experts capable of operating them.