Proxying
The use of a software intermediary (proxy) that processes traffic in a certain way for subsequent sending to another software program.
Blog
Company and industry news, educational articles
Success Stories
Articles with customer case studies
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall for Web
DDoS protection for web applications
StormWall for Networks
DDoS protection for networks via BGP
StormWall for Servers
DDoS protection for TCP/UDP Servers
Web Application Firewall (WAF)
Protecting web applications with a cloud‑based security tool
Content Delivery Network (CDN)
CDN service to speed up content loading
Virtual Dedicated Servers (VDS/VPS)
VDS/VPS servers with DDoS protection
Anti-DDoS Hosting
Hosting and DDoS protection combined
Blog
Company and industry news, educational articles
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Success Stories
Articles with customer case studies
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall Partner Program
For resellers and service providers
White Label
Use StormWall DDoS protection under your brand
Affiliates
Attract clients to protect sites from DDoS - and increase your income
About StormWall
Learn more about our company, see contact details and terms of service
Our Clients
Companies protected by us over the years
Media
Articles featuring our company
Why StormWall
Why StormWall
The use of a software intermediary (proxy) that processes traffic in a certain way for subsequent sending to another software program.
A service that allows to deliver data of various nature and formats (images, videos, web pages, software distributions/patches, etc.) to a large number of users as fast as possible. CDNs help lower costs by freeing customers from the need to create resilient (including to DDoS attacks), reliable, and highly available IT infrastructure necessary for mass delivery of content to consumers.
A software robot designed for executing certain actions determined by algorithms or rules. Bots and bot networks installed on vulnerable nodes are often used for executing DoS and DDoS attacks.
A widely used method to increase available bandwidth by 5% while staying within the selected payment plan, based on the way bandwidth is measured: first, during a month-long period, data transfer stats are collected, then 5% of the highest values are removed from further analysis, while the highest value from the rest is used as the basis for payment calculation.
A unique identifier of an individual network equipment unit, such as a NIC or Ethernet port, designating a sender or a recipient of an OSI network-level packet (frame). Usually MAC addresses are assigned by a manufacturer while producing equipment or components.
Web application firewall is designed to protect your web application from various types of attacks. WAF can be called “reverse-proxy” as it protects server’s data passing clients through itself before providing access to the resource.
Colocation is a unique web hosting model in which a company rents physical space in a hosting provider's data center to house its own server hardware.
Data center (DPC) is a multi-level storage for network and server equipment. Choosing a data center is based on the following points: reputation, reliability, location, etc.
A flag for sequence number synchronization that uses bits 10 to 15 of the TCP packet header.