DDoS Protection

Outsmart Hackers

Protect Your Business, Sign Up for DDoS Protection Services Today

NTT Com has globally deployed best-of-breed infrastructure with robust DDoS mitigation capabilities and sufficient capacity to combat large-scale attacks. When notified of a possible DDoS attack, our security experts analyze network data to confirm an attack is underway and then apply various countermeasures including the redirection of all traffic destined for the DDoS target through NTT Com’s mitigation platform for scrubbing.

DDoS Protection Services (DPS)

Recognizing the continuously increasing size and complexity of DDoS attacks, NTT Com has expanded the mitigation options available to its Global IP Network customers, giving them the opportunity to choose the tier of support they need based on their own cyber defense strategies and plans. These options are DPS Control and DPS Core.

DPS Control is an entry-level tier of service that provides support on access control lists (ACL) and is intended for customers that don’t require full mitigation assistance. Using the service, a customer can define permanent ACLs which are deployed on its NTT Com interface(s) to block a network from certain types of traffic as defined by the customer.

DPS Core is an advanced tier of service for customers that require full DDoS mitigation support. DPS Core is supported by NTT Com’s Network Security Team, the same expert team responsible for keeping the company’s tier-1 Global IP Network (AS2914) infrastructure safe and secure. Subscribers to DPS Core also enjoy exclusive use of the company’s DPS Portal, a platform where customers can request mitigations and configuration changes, and review past mitigation reports.

DPS Detect offers an even higher, more thorough level of support. On top of all the great features offered by DPS Core, it adds services such as detection capabilities to help notify clients of potential attacks, and customer-initiated mitigations from the DPS Portal. Customers can also review their detection history and past mitigation reports, and request configuration change