StormWall Wins Gold at the Globee Cybersecurity Awards 2023
StormWall was honored in the Distributed Denial-of-Service (DDoS) Solution category of the Globee®Cybersecurity Awards.
StormWall was honored in the Distributed Denial-of-Service (DDoS) Solution category of the Globee®Cybersecurity Awards.
StormWall’s DDoS Year-in-Review report takes a look at the 2022 threat landscape, breaks down the industries that were most affected, and explores current DDoS trends.
StormWall is celebrating its 10th anniversary. For all these years we’ve been on guard for our clients and have done a lot — let's recall the main achievements.
Transparent DDoS protection settings, more useful features and attention to detail - since the end of last year, StormWall has added a number of new features to the StormWall Portal. Let's take a closer look.
Although customers of Internet service providers (ISPs) purchase communication channels with a precisely defined bandwidth, they are often not charged for the entire port capacity, but only for the bandwidth actually consumed. For ISP providers, this method is known as burstable billing. Moreover, this actually consumed bandwidth is usually taken into account not according to the highest of the indicators recorded during traffic measurements, but by subtracting 5% of the maximum - according to the largest of 95% of the remaining values. This method is called the 95th percentile.
On March 6-9, 2023 StormWall team is participating as a delegate in Capacity Middle East — the largest forum for representatives of the digital infrastructure industry in the Middle East region.
The year proved to be difficult, but productive. We thank StormWall partners, colleagues and friends for the good engagement. Let us remember what we were able to do to improve the protection of your resources.
We are pleased to announce the opening of our sixth filtering location in partnership with cloud provider IDCloudHost. The new site is located in the Equinix SG3 data center in Singapore, the largest Internet hub in Southeast Asia, providing ultra-low latency connections.
Providers of Anti-DDoS services often offer to connect protection using the asymmetric scheme: only incoming traffic is filtered — the one that goes to the protected resources, and outgoing traffic is not considered at all. In a number of other situations, they use a symmetrical scheme when not only incoming, but also outgoing traffic or service information about it is analyzed.
It often happens that customers of DDoS protection services believe that just by connecting to these services they are fully protected. Unfortunately, it is not quite right: DDoS protection is not magic or a superpower, and in order for it to work effectively, the services themselves must have sufficient immunity against DDoS risks.