BGP (Border Gateway Protocol)
Border Gateway Protocol (BGP) is a routing protocol, that works on an application level. BGP chooses the most efficient routes to deliver Internet traffic.
Blog
Company and industry news, educational articles
Success Stories
Articles with customer case studies
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall for Web
DDoS protection for web applications
StormWall for Networks
DDoS protection for networks via BGP
StormWall for Servers
DDoS protection for TCP/UDP Servers
Web Application Firewall (WAF)
Protecting web applications with a cloud‑based security tool
Content Delivery Network (CDN)
CDN service to speed up content loading
Virtual Dedicated Servers (VDS/VPS)
VDS/VPS servers with DDoS protection
Anti-DDoS Hosting
Hosting and DDoS protection combined
Blog
Company and industry news, educational articles
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Success Stories
Articles with customer case studies
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall Partner Program
For resellers and service providers
White Label
Use StormWall DDoS protection under your brand
Affiliates
Attract clients to protect sites from DDoS - and increase your income
About StormWall
Learn more about our company, see contact details and terms of service
Our Clients
Companies protected by us over the years
Media
Articles featuring our company
Why StormWall
Why StormWall
Border Gateway Protocol (BGP) is a routing protocol, that works on an application level. BGP chooses the most efficient routes to deliver Internet traffic.
ICMP is a TCP/IP stack protocol used for notifying about exception conditions that can occur in the Internet.
Web hosting is a service that allows websites and other information systems to be hosted in the digital space. Companies providing web hosting services are called web hosting service providers, or web hosts.
Ping - the cmd command to determine the delay between the computer and the server.
IP address is the identifier of the device connected to the network.
When the term is used in relation to popular protocols, it means a DDoS attack that exploits vulnerabilities previously unknown to security experts.
RTT is the time period from the moment a data packet was sent until receiving an acknowledgment of its receipt.
Domain is a character-string based identifier (name) of an Internet domain.
Router is a special device which key function is to forward (route) network-level packets from one network segment to another.