BGP
Border Gateway Protocol (BGP) is a routing protocol, that works on an application level. BGP chooses the most efficient routes to deliver Internet traffic.
Blog
Company and industry news, educational articles
Success Stories
Articles with customer case studies
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall for Web
DDoS protection for web applications
StormWall for Networks
DDoS protection for networks via BGP
StormWall for Servers
DDoS protection for TCP/UDP Servers
Web Application Firewall (WAF)
Protecting web applications with a cloud‑based security tool
Content Delivery Network (CDN)
CDN service to speed up content loading
Virtual Dedicated Servers (VDS/VPS)
VDS/VPS servers with DDoS protection
Anti-DDoS Hosting
Hosting and DDoS protection combined
Blog
Company and industry news, educational articles
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Success Stories
Articles with customer case studies
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall Partner Program
For resellers and service providers
White Label
Use StormWall DDoS protection under your brand
Affiliates
Attract clients to protect sites from DDoS - and increase your income
About StormWall
Learn more about our company, see contact details and terms of service
Our Clients
Companies protected by us over the years
Media
Articles featuring our company
Why StormWall
Why StormWall
A TCP/IP stack protocol used for notifying about exception conditions that can occur in the Internet. Some of the protocol options are used for “internal” purposes only, without involving the transfer of any meaningful data.
Web hosting is a service that allows websites and other information systems to be hosted in the digital space. Companies providing web hosting services are called web hosting service providers, or web hosts.
Ping - the cmd command to determine the delay between the computer and the server.
IP address is the identifier of the device connected to the network.
When the term is used in relation to popular protocols, it means a DDoS attack that exploits vulnerabilities previously unknown to security experts. If used when talking about popular software products, the term refers to security bugs of which their developers were previously unaware. Often, a DDoS-attack can be referred to as zero-day if it is implemented using brand new methods that were never used before.
The time period from the moment a data packet was sent until receiving an acknowledgment of its receipt.
A character-string based identifier (name) of an Internet domain. Domain names are intended to ease the designation of individual nodes and resources deployed on top of them from human readability viewpoint.
The data transfer rate of a communication link. Bandwidth determines the amount of data that can be sent across a link per a unit of time (usually, per second).
A special device which key function is to forward (route) network-level packets from one network segment to another.