Maxis DDos Protect | Maxis

What is DDoS?

The Distributed Denial of Service, or better known as DDoS, is one of the most destructive online threats to date and each of its attack can last between 24.5 to 34.5 hours (source: Prolexis). Depending on the volume of the attack, financial losses caused by DDoS can range from as little as RM30,000 per hour to a whopping RM300,000 per hour (source: Neutsar DDoS Survey 2012).

A DDoS attack occurs when the targeted website or application is flooded with a large volume of incoming requests from malicious botnets. This process goes on until the targeted system uses up all its resources to process the fake request and causes the system to deny its original service to legitimate users. The two DDoS attacks are:

  • Volumetric attack – it overloads the target by saturating the target’s bandwidth. These volumetric attacks targets HTTP, HTTPS, UDP, ICMP and SYN flooding.
  • Application layer attack – it overloads the target by exploiting zero days weaknesses or weaknesses inherent in the application.

Want to know more?

Contact our representatives at 1800-82-1919

OR

Arrange a Call Back .

Benefits



Network-based

Puts the workload back on the ISP, which is equipped to handle DDoS attacks.




No additional equipment

MCP does not introduce new equipment to customers’ networks.




Fully managed

MCP is fully managed with SLA for your peace of mind.




Flexible and scalable

It’s a versatile solution that can be customised to our customers’ growth requirements.




Real time mitigation

All threats are monitored and mitigated as they happen.




Traffic packet inspection

Maxis will inspect traffic patterns and signatures when evaluating threats.



No more malicious DDoS threats.

With Maxis DDoS Protect, businesses have the ability to provide uninterrupted services to its customers without having to worry about malicious Distributed Denial of Service (DDoS) attacks on their infrastructure. As a comprehensive ISP-based solution, the DDoS Protect uses Maxis network assets, capacity and capability to prevent customers from receiving adverse or damaging DDoS attacks.

On top of that, your business is assured with the MCP Service Level Agreement (SLA) which includes:

  • UDP Flood
    Detects and blocks attacks within 30 minutes.
  • SYN Flood
    Detects and blocks attacks within 30 minutes.
  • ICMP Flood
    Detects and blocks attacks within 30 minutes.
  • HTTP Page Flood
    Detects and blocks attacks within 30 minutes.
  • Unknown Attacks
    Detects and blocks attacks within 60 minutes.


Let's talk business

Got an enquiry on any of our Business Solution? Contact our representatives at 1700-818-881 or leave your contact details with us and we'll call you.

First name is required

Company name is required

Organisation Size is required

Company region is required

Email is required

Contact number is required

Please tick this box

This field is required.


^