České Radiokomunikace

Superior protection against DDoS attacks

We will make sure that your services remain up and running even if they become the target of a massive DDoS attack

DDoS attacks are still one of the greatest threats facing internet infrastructure, causing companies significant financial losses, reputational damage, and loss of trust from their end customers.

Security, availability, throughput

Detection and response
Detection and response
Real-time traffic monitoring and fast response to threats will ensure minimisation of the impact of a DDoS attack on the performance and availability of your network.
Performance of the CRA DDoS platform
Performance of the CRA DDoS platform
The platform makes it possible to scrub traffic in the lower hundreds of Gb/s.
Variability of the DDoS protection service
Variability of the DDoS protection service
The service comes with several options, from basic protection of internet connectivity with an elementary set of rules to a comprehensive customised solution.
Legal compliance
Legal compliance
DDoS protection will help you meet regulatory requirements related to cybersecurity, such as NIS 2 or ZoKB.
Cost savings
Cost savings
You will receive security infrastructure and process services worth tens of millions of crowns, while eliminating potential financial losses caused by service outages and recovery costs following an attack.
Service portal
Service portal
A detailed overview of network traffic, attack vectors, and an array of other interesting information.
Hybrid protection
Hybrid protection
An extension option adding dedicated inline protection in the form of special endpoint devices.
Reporting
Reporting
Regular reporting on the status of your services, summary reports on attacks and mitigation.

What our clients say

Lukrom
Lukrom
Ing. Radomír Bušo
IT manager of LUKROM systems

When looking for a new solution, we aimed to choose the best possible comprehensive infrastructure solution to which we could transfer all of the services provided at that time on our own server infrastructure, which was reaching its limits in terms of its lifetime. Having considered every aspect of our needs, we decided to move our servers over to cloud services. We were looking for a partner for long-term cooperation to support our business.

PRO.MED.CS Praha a.s.

Roman Hošek
Corporate ICT Manager, PRO.MED.CS Praha a.s.

We have decided to cooperate with CRA based on our prior experience and extended cooperation. We particularly appreciate CRA’s expertise and excellent communication, which has proven itself especially in an analysis of our existing systems and the design of customised solutions for us. We have chosen CRA as a long-term partner to provide our internal and external IT with the potential to expand our cooperation further.

Pivovary Lobkowitz, a. s.

Ing. Martin Mahovský
IT Specialist, Pivovary Lobkowitz, a. s.

Specialists from CRA have dispelled our concerns and relieved us of the hassle of having to replace our hardware. They provide us with quality services and the users of our IT systems are happy. Furthermore, given that we use several services from CRA, we get better oversight and faster response time. Whenever we need it. It is good to know that when something is at stake, we can count on our supplier and its infrastructure.

Choose your type of protection

Basic
Choose your type of protection
  • 24x7 monitoring
  • Automatic attack mitigation
  • Unlimited number of mitigations
  • Reports
Standard
Choose your type of protection
  • 24x7 monitoring
  • Automatic or manual attack mitigation
  • 8 x 5 assistance during an attack
  • Unlimited number of mitigations
  • Reports
Advanced
Choose your type of protection
  • 24x7 monitoring
  • Customised configuration of the service
  • Automatic or manual attack mitigation
  • 24 x 7 assistance during an attack
  • Unlimited number of mitigations
  • Option to add dedicated AED protection
  • Reports

We hold the necessary certificates and security is our top priority

  • Superior DDoS protection
    Maximum resilience of services in the event of an attack.
  • Physical security
    Physical security at BT3 level according to the National Security Authority methodology.
  • Proven technologies
    We use and offer only proven and up-to-date technologies to ensure cyber security.
  • Active support
    We provide active support, 24 hours a day.
  • ANSI-TIA942
    The technology is operated from an ANSI-TIA942 certified DC TOWER data centre
  • Common Criteria Certification for Information Technology (IT) Security (ISO/IEC 15408)
    Certification at CC EAL 4+ level
  • ISO 9001
    Quality management systems
  • ISO 14001
    Environmental management systems
  • ISO 19011
    Standard for the certification of internal auditors
  • ISO/IEC 20 000-1
    Information technologies – Service management system requirements
  • ISO/IEC 27001
    Information security management systems
  • ISO/IEC 27017
    Information technologies – Security techniques – A set of guidelines for cloud environment security and for minimising the potential risk of security incidents
  • ISO/IEC 27018
    Information technologies – Security techniques – A set of procedures for the protection of Personally Identifiable Information (PII) in public clouds acting as PII processors
  • SOC Type 1 and Type 2
    SOC 2 Type 1 and Type 2 certifications, issued in accordance with American Institute of Certified Public Accountants (AICPA) standards and requirements, cover information management and security in organizations
  • ISO 50 001 
    Energy management systems
  • PCI-DSS 
    Compliance with the requirements of PCI-DSS for data centre operators
  • NBÚ
    Certificate for access to classified information up to the classification level ‘CONFIDENTIAL’
  • GDPR compliance
    The infrastructure is fully compliant with GDPR requirements

More detailed information

A DDoS (Distributed Denial of Service) attack is a cyber attack in which the perpetrators inundate a target server, network, or service with an immense number of requests from various sources (usually from a botnet – a network of infected devices). The aim of the attack is to make the service or system unavailable by overwhelming its resources, such as bandwidth, processing performance, or memory.

An attacker infects a large number of devices (such as computers, mobiles, IoT devices) with malware, creating a botnet. Subsequently, all these devices are, under the attacker’s control, directed at the target server or service which they flood with an immense number of requests.

A service that is unable to process such a high volume of data starts to slow down or stops working altogether, becoming unavailable to ordinary users.

In very simplified terms, attacks can be divided into three basic categories:

  • Bandwidth attacks: The attacker attempts to overload the target network by excessive data transfer.
  • Application layer attacks: These attacks target specific applications, such as web servers, mimicking legitimate requests in order to exhaust server resources.
  • Protocol attacks: They attempt to exploit weaknesses in communication between network elements.

Protection against DDoS attacks is critical to maintaining the availability of online services and minimising the impact of the attacks. One of the most effective methods is a specialised DDoS protection solution from CRA as your internet connectivity provider. In addition to real-time monitoring, the solution offers rapid response to threats, by virtually instant traffic scrubbing in the case of an attack in a scrubbing centre (popularly referred to as a traffic scrubber). This rapid and effective defence requires very powerful technologies on the provider’s side as well as experts capable of operating them.

Tato část je určená k ochraně proti spam robotům. Vidíte-li tento text, vyplňte pole uvedené za otázkou. Tlačítko jsem robot ignorujte.
Kolik je dvě plus tři

Contact us

Others are also interested

Data centres
Data centres
With your servers and other IT equipment placed in a data centre, you retain full control of your equipment while securing space to run it with a high degree of availability.
Cloud
Cloud
A modern and secure corporate IT infrastructure solution that allows you to use unlimited amounts of computing power while ensuring a high level of availability. All this without you having to invest in your own hardware.
Telco and infrastructure
Telco and infrastructure
Connectivity from CRA offers high quality connection of sites to the internet, with uninterrupted availability. This ensures that services, information, and multimedia content reach your clients in a reliable and timely manner.
IoT - Internet of Things
IoT - Internet of Things
Connect your devices, sensors, meters, and other elements directly from the field to your application or system using our LoRaWAN infrastructure. CRA’s IoT Cloud is an ideal and universal platform for an integrated IoT multi network with huge synergy potential.
Streaming and OTT services
Streaming and OTT services
Digital TV and multimedia services are not just about content. For example, processing a video and delivering it to the recipient in a way that meets contemporary requirements is quite challenging. České Radiokomunikace’s streaming and OTT services – Media Cloud and HbbTV – offer very cost-effective solutions for multimedia services based on a unique cloud infrastructure.