Qrator.AntiDDoS  

Empowering businesses with high network availability and clients loyalty through cloud-based DDoS mitigation solution

99.95%

Service Level Agreement for availability of customers' applications, guaranteed by a contract

<5%

Less than 5% false positive under attack (guaranteed by the contract)

>4tbps

Total network bandwidth

Seamless DDoS Mitigation without Performance Hits

Mitigate DDoS attacks with guaranteed uptime and no performance impact. DDoS attacks can have severe consequences for business, damaging network performance, brand reputation, leading to missed profit with every second of downtime equating to lost business. To avoid frustrating delays in response times businesses need fast, automated mitigation for minimal downtime when under attack.

Qrator Labs filtering network

Industry Leading DDoS
Attacks Mitigation

Comprehensive DDoS Protection

Qrator Labs filtering centers are located in global points of the Internet traffic concentration, connected to transcontinental TIER1 providers as well as leading regional backbone Internet providers. 

Strengthen Your Protection

Qrator Labs' filtering network allows small and large businesses to protect their applications from all types of DDoS attacks, regardless of bandwidth or complexity.

Full Coverage

With 15 scrubbing centers around the globe and throughput of more than 4,000 Gbps Qrator Labs filtering network ensures excellent connectivity in the regions of North America, LatAm, Europe, MENA, and APAC.

Stay Online Always

Qrator Labs own unique geo-distributed filtering network based on united BGP Anycast architecture provides reliable, low latency web infrastructure protection from any network attacks leading to unavailability of web resources.

How it works

Connection methods

DNS-Based Connectivity

BGP-Based Connectivity

Targeted Infrastructure Protection
DNS connectivity allows you to selectively protect specific elements of your infrastructure rather than the entire network. This selective approach can be advantageous for businesses that want to protect only their critical assets while managing costs effectively.
Per-Resource Cost
Additional resources require an extra Qrator IP, which incurs an additional cost for each IP added.
Simpler Setup for Small-Scale Protection
For businesses with a small number of critical resources, DNS-based connectivity is easier to set up than BGP. The DNS approach leverages standard proxying mechanisms (such as HTTP and TCL proxies) to redirect traffic, which simplifies the connection process.
TCP Traffic Compatibility
DNS-based connectivity supports TCP traffic only. It does not support UDP traffic, which means it’s not suitable for businesses needing protection for VPNs, video conferencing systems, or IP telephony services reliant on UDP.
No Outbound Connection Support
This method is not suitable for services that initiate outbound connections, such as email sending services or NAT gateways.
No Dedicated Communication Channels Required
Unlike BGP, DNS-based connectivity does not require establishing dedicated virtual or physical communication channels. This reduces the complexity of implementation and maintenance for businesses that only need selective protection.
Suites for:
Web Resources Application-Level Protection (L7)
DNS-based connectivity is suitable for businesses focused on protecting web applications from application-layer (Layer 7) attacks.
No AS or Independent IP Block
Businesses without an Autonomous System (AS), an established infrastructure, or a provider-independent IP block will find DNS-based connectivity beneficial.
Cost-Effective, Partial Protection
This approach is ideal for organizations that want to isolate and protect only their critical infrastructure elements without covering the entire infrastructure, thus optimizing costs.
Ask an expert
Comprehensive Infrastructure Protection
BGP connectivity enables protection of the entire infrastructure, including multiple resources (such as websites, email servers, and more) within a business's Autonomous System (AS).
No Additional Cost for Extra Resources
Unlike DNS connectivity, adding resources in BGP connectivity does not require additional IPs from Qrator, as the client’s IP addresses are used. This can be more cost-effective for large infrastructures.
No DNS Record Changes Required
BGP connectivity does not require any DNS adjustments, which simplifies the configuration process.
Supports All Traffic Protocols
BGP connectivity supports a full range of traffic protocols, making it suitable for protecting services requiring UDP, such as VPNs, IP telephony, video conferencing systems, and email servers.
Supports Outbound Connections
This method is compatible with services that initiate outbound connections, ensuring seamless operations for applications such as mail servers and NAT gateways.
Dedicated Communication Channels for High Availability
BGP-based protection requires establishing dedicated communication channels. These trusted channels contribute to higher reliability and improve the service level agreement (SLA) by ensuring a robust connection even during high traffic periods or attacks.
Infrastructure-Wide Protection, Including Bandwidth Overflow
BGP connectivity can secure the entire infrastructure, including communication channels, preventing issues related to bandwidth overflow during an attack.
Suites for:
Large Infrastructure with Multiple Resources
BGP is more cost-effective than DNS for businesses with five or more IP addresses, considering the communication channel costs.
Businesses with AS and Infrastructure Needs
Companies with an Autonomous System (AS) and complex infrastructure requiring VPN, IP telephony, video conferencing, and email protection will benefit from BGP’s comprehensive protection.
Organizations Needing Full Infrastructure Coverage
BGP connectivity is ideal for businesses requiring end-to-end protection of their entire infrastructure, ensuring that all resources, protocols, and traffic are safeguarded.
Ask an expert

Grow your business and customers loyalty with world-class network security technologies

Mitigating attacks at all ISO OSI layers, including L7 Full set of protection options on all billing plans and for all customers.

Mitigating attacks at all ISO OSI layers, including L3-L7

Full set of protection options on all billing plans and for all customers.

Always-on 24/7 automatic protection 

No need for manual configuration or involvement of qualified specialists to get reliable protection against complex DDoS attacks.

SSL (PCI-DSS ready)

HTTPS filtration with no key disclosure allows to analyze and filter HTTPS traffic without disclosing encryption keys, without breaching the customer’s security policies.

99.95% – the highest SLA in the industry for availability of customer´s infrastructure

Customers don't pay for the service in case it does not meet the declared quality (guaranteed by a contract).

Transparency for legitimate users 

We don't use CAPTCHA or other annoying user checks.

Easy integration with mobile apps and APIs

The Qrator Labs API can be integrated with your authentication system, database or device monitoring service providing a wide range of system managing features.

Easy connection 

Multiple connection options, including DNS and BGP.

Balancing traffic between IP addresses and client web servers

We distribute the traffic between main and backup servers of the customer's website. Depending on the customer's needs we can implement individual algorithms for accessing the backup servers.

No effect on Search Engine Optimization

Can improve a website's SEO by reducing page load times and improving security.

Four easy steps to enable DDoS attacks mitigation within 15 minutes

Mitigate ddos threats in 15 minutes with 4 easy steps

Register in your Personal Dashboard 

Get a Qrator IP

Install an SSL certificate chain
    

Redirect your traffic to the Qrator Labs IP

Trusted by 1000+
Enterprises all over the globe

Learn more