The fundamentals of the Anti-DDoS offering
Cloud Temple's Anti-DDoS service is a security solution that protects applications published on the Internet against Distributed Denial of Service (DDoS) attacks of the following types volumetric. Positioned as an essential shield, it is included by default and with no configuration required in our Internet access offering. Protection operates upstream of the customer infrastructure, as close as possible to our operator links, to guarantee continuity of service by cleaning up traffic before it reaches your services.
Our compliance procedures
Our Anti-DDoS offering is HDS and ISO 27001 certified
The key benefits of our Anti-DDoS
Protect your applications published on the Internet
Your website and applications remain online, regardless of the intensity of the attack.
Avoiding service stoppages
Your infrastructure remains available even during a DDoS attack.
Real-time analysis
Incoming traffic is constantly monitored for instant reaction.
Key features of Anti-DDos Cloud Temple
Volumetric protection
Upstream traffic cleansing to block volumetric (capacitive) DDoS attacks before they impact your services.
Traffic analysis
Detection and analysis of malicious traffic patterns.
Continuous monitoring
Incoming traffic is constantly monitored.
Technical specifications
Need to secure your infrastructure? Let's discuss your protection strategy
Do you manage mission-critical applications, a high-traffic e-commerce site or a SaaS platform? The availability of your services is the foundation of your business and your brand image.
Our experts will work with you to assess your risk exposure and validate the integration of native anti-DDoS protection within your network architecture. Whether you are migrating to a sovereign cloud or optimising your current infrastructure, we can help you build a resilient environment that complies with the highest security standards (SecNumCloud, HDS).
Pricing
| Work units | Unit | Unit price per month | Commitment |
|---|---|---|---|
| Anti-DDoS | - | Included in our Private backbone product | - |
Use cases
Fully transparent, automated deployment.
There is no deployment “project” as such, because the service is an inseparable component of our Internet access offer. As soon as your Cloud Temple public IP addresses are activated, they automatically benefit from continuous monitoring and capacitive mitigation. It's a 100% “as-a-service” experience.
Automatic detection and mitigation in real time.
Our specialised equipment constantly analyses incoming traffic. When a volumetric anomaly is detected, illegitimate traffic is automatically diverted and filtered. Only legitimate traffic reaches your applications. In the event of a significant attack, our support teams can provide you with a detailed incident report on request.
No, protection is provided at network level.
Unlike software application firewalls installed on your virtual machines, our Anti-DDoS protection is managed at Cloud Temple network equipment level. This means that your instances retain 100% of their computing power for your applications, even during an attack attempt.
Total transparency and compliance with the Data Act.
Although the service is automated, you remain in control of your security information. In accordance with the Data Act, we can export your incident reports within 30 days, free of charge, in the event of termination or on request. You're never locked in, and you retain full visibility of the security events that have impacted your infrastructure.