Link Bandwidth
A key link characteristic, the maximum data transfer rate achievable via the link.
Blog
Company and industry news, educational articles
Success Stories
Articles with customer case studies
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall for Web
DDoS protection for web applications
StormWall for Networks
DDoS protection for networks via BGP
StormWall for Servers
DDoS protection for TCP/UDP Servers
Web Application Firewall (WAF)
Protecting web applications with a cloud‑based security tool
Content Delivery Network (CDN)
CDN service to speed up content loading
Virtual Dedicated Servers (VDS/VPS)
VDS/VPS servers with DDoS protection
Anti-DDoS Hosting
Hosting and DDoS protection combined
Blog
Company and industry news, educational articles
How StormWall Works
Explore how our services can protect infrastructure from any type of attack
Success Stories
Articles with customer case studies
Technology
How StormWall DDoS protection works
How to Connect
Instructions for launching DDoS protection
API
Automate management of StormWall DDoS protection
Knowledge Base
Cybersecurity terms and definitions
StormWall Partner Program
For resellers and service providers
White Label
Use StormWall DDoS protection under your brand
Affiliates
Attract clients to protect sites from DDoS - and increase your income
About StormWall
Learn more about our company, see contact details and terms of service
Our Clients
Companies protected by us over the years
Media
Articles featuring our company
Why StormWall
Why StormWall
A key link characteristic, the maximum data transfer rate achievable via the link.
TCP window size is the size of a buffer used when receiving a packet.
A piece of data locally stored by a Web client, characterizing a user from the viewpoint of a server accessed by the user.
A database containing information about known vulnerabilities, including their descriptions and links to websites with additional info. The project is sponsored by the United States Computer Emergency Readiness Team (US CERT) and maintained by MITRE Corp. nonprofit
A type of hosting service where the customer is provided with a dedicated physical server connected to the Internet. Usually, the leased assets are used for the deployment of mission-critical and/or resource-intensive applications and websites.
Using illegal ways of affecting computer networks or individual nodes in order to promote political causes. Hacktivists usually participate in protest movements and try to attract as much attention as possible to the ideas they stand for.
The use of a software intermediary (proxy) that processes traffic in a certain way for subsequent sending to another software program.
A service that allows to deliver data of various nature and formats (images, videos, web pages, software distributions/patches, etc.) to a large number of users as fast as possible. CDNs help lower costs by freeing customers from the need to create resilient (including to DDoS attacks), reliable, and highly available IT infrastructure necessary for mass delivery of content to consumers.
A way to implement a DoS attack providing a manifold increase in impact on a victim server: a small number of bots initiate sending a huge amount of forged packets or requests, which severely slow down or paralyze the attacked server that tries to process them.
Bot is a software robot designed for executing certain actions determined by algorithms or rules. Botnet stands for a "robot network".