inwi Cybersecurity – Solutions
Cyber defense in demanding and regulated environments!
Our Cybersecurity Solutions
MANAGED ANTI-DDoS
Protect all your resources against DoS (denial of service) attacks:
Expertise
Security
On-demand | Subscription | ||
Managed Anti DDOS Emergency | Managed Anti DDOS Standard | Managed Anti DDOS Premium | |
Deployment | Cloud | Cloud | Cloud and Client Premises/On-Site |
Number of Mitigations | By intervention | Unlimited | Unlimited |
Volumetric Attack Detection | Included | Included | Included |
Protocol Attack Detection | Included | Included | Included |
Application Attack Detection | - | On demand | Included |
Attacks Mitigation | On demand | Included | Included |
Application Mitigation | - | On demand | Included |
Mitigation Triggering | 30 min after Client quarantine | Permanent | Permanent |
Availability | 99,8% | 99,8% | CPE under 4 hours |
Reporting | End of Mitigation Report | Monthly | Monthly |
Email Alert | - | Included | Included |
Portal Access | - | Included | Included |
Incoming Traffic | - | Included | Included |
Outgoing Traffic | - | - | Included |
BUSINESS PROTECT
The security and managed firewall bundle for all businesses.
Commitment | 12 months | 24 months | 36 months | |
Business Protect CleanPipe | Business Protect VIRTUEL | Business Protect DEDICATED | ||
Flexible Deployment | Cloud | Cloud | On Customer Premises | |
Tailor-Made | "A la carte" Profiles | By flow rate and number of users | ||
Next Generation Firewall | X | X | X | |
ZeroDay Protection | X | X | X | |
Intrusion detection/protection | X | X | X | |
Application control | X | X | X | |
Web Filtering | X | X | X | |
Anti-Virus Anti-Spam Anti-Spyware | X | X | X | |
Reporting | X | X | X | |
File Filtering | X | X | ||
SSL and IPSec VPN | X | X | ||
DNS Sinkhole | X | X | ||
Custom Policy | X | X | ||
Extranet access | X | X | ||
Identity theft protection | X | |||
Data Leak prevention | Option | Option |
MANAGED WAF
Ensure the availability and security of your web applications and application servers with proactive protection against attacks and vulnerabilities:
And many more benefits
State-of-the-art infrastructure managed without CAPEX
Visibility and control of applications
Monthly reports on application behavior
Increased website integrity and availability
Physical or virtual solution that can be implemented in the customer's data center
We have the answers to your questions !
Denotes a Distributed Denial of Service attack. It is an attack that aims to make a server, a service or an infrastructure unavailable by overloading the server's bandwidth or by hogging its resources until they are exhausted. There are three types of attacks: - Volumetric attacks: Attacks that saturate the bandwidth; - Protocol attacks: Attacks aimed at exhausting the system resources of the client's computer equipment (server, router or firewall) and thus preventing it from responding to legitimate requests; - Application Attacks: Attacks that exploit software flaws in order to render a computer device unavailable, or to take control of it.
Our Anti-DDos solution is used to counter all denial of service attacks aimed at saturating bandwidth and enterprise servers down to the application to prevent it from working. At the heart of the network, this security solution acts effectively against massive targeted attacks because it detects them upstream and prevents them from infiltrating the network and invading the company's environment. As a result, it provides comprehensive protection for all critical points in the enterprise network, from peering to applications."
The WAF offer allows Cloud inwi Business customers to protect their resources exposed on the web by blocking malicious requests and allowing legitimate requests to reach the server: - Application traffic management - Load-balancing - Authentication and identity management - Machine learning based on artificial intelligence - Protection against application attacks - Management and reporting
The offer is available in 100% cloud mode or on site: - In Cloud mode: No installation required, centralized management provided by the NGF Platform; - At the customer's site: Equipment installed at the customer's site and management provided by Inwi Business.
Only a core network anti-Ddos solution is truly effective because: - Filtering and detection of attacks is done upstream from our 3 peering points: France, Spain and nationwide; - Mutualization of mitigation capacities in the operator's core network; - 1st level of protection for network equipment and customer security.
Firewall protection solves a major security problem: unauthorized access to data. Enterprise firewalls increase the attack surface and can become targets for DDoS attacks. Firewall protection has no inherent ability to detect or stop DDoS attacks because attack vectors use open ports and protocols. As a result, enterprise firewalls are likely to become the first victims of DDoS attacks as their ability to track connections is exhausted.
The monthly subscription covers the protection of a single web application. Additional fees are added if you add another web application
°- Better connectivity (reduced service interruptions/latency/slowdowns) in case of attacks; - Additional layer of security for servers, firewalls and business applications; - No investments to fight against these random and recurring attacks: - Reports made available to demonstrate the effectiveness of the solution.
There is no limit as to how many times your services are targeted by DDoS attacks.