inwi Cybersecurity – Solutions

Cyber defense in demanding and regulated environments!

Our Cybersecurity Solutions

Protect all your resources against DoS (denial of service) attacks:

Expertise

  • Daily monitoring and optimization of our Internet routes to various destinations
  • Solution backed by the world's leading DoS attack protection solutions.

Security

  • Redundancy of international internet peerings: the attacks are stopped even before reaching the Moroccan territory
  • "Scrubbing Centers" available at all levels for optimal protection; attack mitigation is performed on different layers
 On-demandSubscription
 Managed Anti DDOS EmergencyManaged Anti DDOS StandardManaged Anti DDOS Premium
DeploymentCloudCloudCloud and Client Premises/On-Site
Number of MitigationsBy interventionUnlimitedUnlimited
Volumetric Attack DetectionIncludedIncludedIncluded
Protocol Attack DetectionIncludedIncludedIncluded
Application Attack Detection-On demandIncluded
Attacks MitigationOn demandIncludedIncluded
Application Mitigation-On demandIncluded
Mitigation Triggering30 min after Client quarantinePermanentPermanent
Availability99,8%99,8%CPE under 4 hours
ReportingEnd of Mitigation ReportMonthlyMonthly
Email Alert-IncludedIncluded
Portal Access-IncludedIncluded
Incoming Traffic-IncludedIncluded
Outgoing Traffic--Included

 

The security and managed firewall bundle for all businesses.

  • Zero Day Protection: Detection and protection against unknown attacks.

  • Web and Application Filtering: control Internet traffic, restrict documentation provided on the Web

  • Virtual Private Network (VPN): create a tunnel between remote computers allowing them to connect safely

  • Intrusion Detection and Prevention: Track abnormal/suspicious activity, gain knowledge of successful and failed intrusion attempts

  • Next Generation Firewall: Enforce network security policy, measure application and packet prevention

  • Anti-Virus, Anti-Spyware and Anti-Spam: Detect and destroy computer viruses and spyware, Limit the volume of unsolicited emails

  • Identity Theft Protection: Protect against the theft of legitimate user credentials to access critical corporate information

  • Data Leak Prevention: Identify, control and protect information with in-depth content analysis
Commitment12 months24 months36 months
 Business Protect CleanPipeBusiness Protect VIRTUELBusiness Protect DEDICATED
Flexible DeploymentCloudCloudOn Customer Premises
Tailor-Made"A la carte" ProfilesBy flow rate and number of users
Next Generation FirewallXXX
ZeroDay ProtectionXXX
Intrusion detection/protectionXXX
Application controlXXX
Web FilteringXXX
Anti-Virus Anti-Spam Anti-SpywareXXX
ReportingXXX
File Filtering XX
SSL and IPSec VPN XX
DNS Sinkhole XX
Custom Policy XX
Extranet access XX
Identity theft protection  X
Data Leak prevention OptionOption

Ensure the availability and security of your web applications and application servers with proactive protection against attacks and vulnerabilities:

  • Advanced detection and protection of web application security.
  • Support for SSL endpoints
  • Protection against the most common attacks such as SQL injection and cross-site scripting
  • Compliance to standars and requirements , including PCI DSS, ISO 27001, FISMA, BITS and HIPA.
  • Event monitoring and alerts round the clock – 24 hours a day, 7 days a week, 365 days a year
  • Automated scanning by a cloud engine to find known threats, abnormal behavior and suspicious activity

And many more benefits

block benefits

State-of-the-art infrastructure managed without CAPEX

block benefits

Visibility and control of applications

block benefits

Monthly reports on application behavior

block benefits

Increased website integrity and availability

block benefits

Physical or virtual solution that can be implemented in the customer's data center

We have the answers to your questions !

Denotes a Distributed Denial of Service attack. It is an attack that aims to make a server, a service or an infrastructure unavailable by overloading the server's bandwidth or by hogging its resources until they are exhausted. There are three types of attacks: - Volumetric attacks: Attacks that saturate the bandwidth; - Protocol attacks: Attacks aimed at exhausting the system resources of the client's computer equipment (server, router or firewall) and thus preventing it from responding to legitimate requests; - Application Attacks: Attacks that exploit software flaws in order to render a computer device unavailable, or to take control of it.

Our Anti-DDos solution is used to counter all denial of service attacks aimed at saturating bandwidth and enterprise servers down to the application to prevent it from working. At the heart of the network, this security solution acts effectively against massive targeted attacks because it detects them upstream and prevents them from infiltrating the network and invading the company's environment. As a result, it provides comprehensive protection for all critical points in the enterprise network, from peering to applications."

The WAF offer allows Cloud inwi Business customers to protect their resources exposed on the web by blocking malicious requests and allowing legitimate requests to reach the server: - Application traffic management - Load-balancing - Authentication and identity management - Machine learning based on artificial intelligence - Protection against application attacks - Management and reporting

The offer is available in 100% cloud mode or on site: - In Cloud mode: No installation required, centralized management provided by the NGF Platform; - At the customer's site: Equipment installed at the customer's site and management provided by Inwi Business.

Only a core network anti-Ddos solution is truly effective because: - Filtering and detection of attacks is done upstream from our 3 peering points: France, Spain and nationwide; - Mutualization of mitigation capacities in the operator's core network; - 1st level of protection for network equipment and customer security.

Firewall protection solves a major security problem: unauthorized access to data. Enterprise firewalls increase the attack surface and can become targets for DDoS attacks. Firewall protection has no inherent ability to detect or stop DDoS attacks because attack vectors use open ports and protocols. As a result, enterprise firewalls are likely to become the first victims of DDoS attacks as their ability to track connections is exhausted.

The monthly subscription covers the protection of a single web application. Additional fees are added if you add another web application

°- Better connectivity (reduced service interruptions/latency/slowdowns) in case of attacks; - Additional layer of security for servers, firewalls and business applications; - No investments to fight against these random and recurring attacks: - Reports made available to demonstrate the effectiveness of the solution.

There is no limit as to how many times your services are targeted by DDoS attacks.

Connectez-vous avec inwi



Copyright 2024 ©. Tous droits réservés.