Select Your Style

Choose your layout

Color scheme

How DDoS Protect™ Works

Anix Host - Servers - Ddos-protection

Anix Host DDoS Protect™

[one_half]

As DDoS attacks continue to be on the rise, so do financial and brand risks for online businesses. If your business is dependent on the Internet for connecting with your users and customers, it is important to understand how much protection you need, to fully minimize all your risks.

Though most service providers offer varying degrees of attack protection, Anix Host provides bundled DDoS mitigation as a FREE, valued added service with each of our bare metal server plans, as well as our Colocation, Managed Private Cloud and Virtual Private Data Center service offerings.

[/one_half] [one_half_last]

Anix Host DDoS Protect™ offers you peace of mind knowing that we are watching over your network traffic and taking action against attacks when they happen. 

Anix Host DDoS PROTECT™ INCLUDES:

  • 20 Gbps of DDoS protection
  • Protection against UDP, TCP and ICMP based attacks
  • Entire server protection
[/one_half_last]

DDoS Protection without the Extra Cost

Our DDoS mitigation service comes standard with all bare metal servers. Anix Host Protect™ provides protection against the majority of small and medium sized attacks, and we protect your entire server, not just single IPs. Our automated rule sets, combined with our highly skilled engineering staff and technical support teams, work in concert to deliver a worry-free hosting experience.

We keep your services online during attacks and save you the high added cost of some other providers.

WE OFFER PROTECTION AGAINST A VARIETY OF DDOS ATTACKS:

UDP Based

  • UDP Flood
  • Fragmentation
  • DNS Flood
  • VoIP Flood
  • Media Data Flood
  • Non-Spoofed UDP Flood

TCP Based

  • SYN Flood
  • SYN-ACK Flood
  • ACK & PUSH ACK Flood
  • Fragmented ACK
  • RST or FIN Flood
  • Synonymous Flood
  • Fake Session
  • Session Attack
  • Misused Application

ICMP Based

  • ICMP Flood
  • Fragmentation
  • Ping Flood
  • Fragmented ACK
  • RST or FIN Flood
  • Synonymous Flood
  • Fake Session
  • Session Attack
  • Misused Application