ISP

Internet Service Provider is a provider of Internet connection and services. For any ISP it should be important to understand customer needs and offer its customers quality and satisfactory services. Availability and security of services provided over Internet is getting increasingly important in today's world of rapidly developing technologies. The increasing trend of Distributed Denial of Service (DDoS) or Denial of Service (DoS) attacks is a real threat to the availability of Internet services. DDoS attacks' monitoring and their consequent mitigation represent an efficient defence against DDoS attacks. In terms of law, every ISP is bound to maintain data on communication operations taking place over its networks. One of efficient solutions is a collection of flow information from network operations. A suitable system is able to use data hereby collected for various purposes. For example, it can use these data to monitor changes in network operation volumes or to store information in order to fulfil legal obligations resulting from Sect. 97 subsect. 3 of the Act on Electronic Communication and the implementing public notice No. 357/2012.

DDoS attacks are either of volumetric or application type. We often face a combination of both these types, or several kinds of application-type DDoS attacks. Volumetric DDoS attacks are trying to flood Internet connectivity in order to prevent any further connections. These attacks are mostly massive ones and can even reach dozens or hundreds Gbps. With increasingly available computing technologies and the number of attacking devices, these attacks are becoming ever more frequent. Application-type attacks are more sophisticated than volumetric ones. As an example, we can name 'SYN flood' that generates relatively little traffic in terms of volume, while opening many server connections that remain incomplete, thereby prohibiting additional connections. The server is no longer able to handle new rightful users and the service becomes unavailable.

 

More Less
SOLUTION LIST

DDoS Protection

The idea of an DDoS attack is simple: the attacker is trying to “overwhelm” the service (application servers, infrastructure, etc.). Lately, however, we have experienced a significant increase in these attacks. There is an increasing frequency of these attacks, in addition to their duration (globally, there even are users under permanent attack) and complexity (attacks are thoroughly prepared, often combining more than five different ways). The number of different goals is also increasing. We can say that these days virtually any company or a market segment can become a victim.

Solution details

Data Acquisition According to Business or Legal Requirements

Information on data being transferred and users who communicated, with whom and when, represent the most-important security building block, whether it is an organization, an institution, or the state. As the network infrastructure has developed and its complexity increased in recent years, it is becoming more and more difficult to provide sufficient reliability, security and availability of computer networks. Traditional SNMP monitoring tools are therefore no longer sufficient to cover administrators’ needs. This opens new opportunities for modern network traffic monitoring technologies based on data flow analyses, providing a detailed network traffic overview. Today’s IT environment administration should be based on computer network monitoring by means of data flows. Such a solution can save both time and costs, in addition to various benefits for both small and large companies or organisations.

Solution details

SD-WAN

Software-defined WAN (SD-WAN) is a specific subsection of the Software-Defined Networking (SDN) technology, applied to WAN networks. These are most often used for interconnecting enterprise networks, regional and global branches and data centers, including private and public clouds.

Solution details

Data Traffic Control – a Solution for ISPs

Network infrastructure quality, capacity and availability have enjoyed rapid development in recent years. Nowadays, Internet connection is available virtually anywhere, and it is often a broadband one. However, this causes many challenges for ISPs (Internet Service Providers), responsible for most of capital costs, without the ability to control actively the efficiency and bandwidth usage. File downloading, emails, on-line games, streamed video, chat, P2P networks – all these data keep flowing without control, possibly congesting network connectivity, slowing the network down and making it more expensive.

Solution details
10
:71:120:131:132:
Do you wish to receive our newsletter? Yes, I am interested

Získejte

DOKUMENT ZA KONTAKT
popup





I give consent to the company VUMS Datacom, Ltd. based Lužná 591, 16000 Prague 6, ID: 48585611, registered in the Commercial Register of the Municipal Court in Prague, Section C, File 17811, to collect and process in accordance with law no. 101/2000 Coll. as amended, my name and e-mail address and other personal data provided for inclusion in the database in order to offer products, services and sending commercial messages by electronic means pursuant to applicable law no. 480/2004 Coll., on indefinitely until further notice.


Souhlasím se zařazením do databáze za účelem nabízení výrobků, služeb a zasílání obchodních sdělení prostřednictvím elektronických prostředků dle platného zákona č. 480/2004 Sb., a to na dobu neurčitou do odvolání.


Souhlasím se zasíláním newsletteru VUMS DataCom s informacemi, a to na dobu neurčitou do odvolání.