Incapsula is guaranteed to mitigate any DDoS attack in under 10 seconds, regardless of its size and without getting in the way of legitimate traffic. Multiple DDoS protection options have been designed to meet your exact needs.GET QUOTE
Incapsula can protect your organization against any DDoS threat.
On-demand or always-on protection against DDoS attacks that directly target your network infrastructure.
Infrastructure Protection can be used to defend entire subnets or individual IP addresses.READ MORE >
Name Server Protection
Always-on DDoS protection for your Name Server (NS) that protects DNS servers against network and application layer assaults.
Name Server Protection also accelerates DNS responses.READ MORE >
All-Inclusive DDoS Protection
Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets.
10-Second mitigation SLA
When DDoS strikes, it takes target services moments to go down and hours to recover. Incapsula is the only service to offer a SLA-backed guarantee to detect and block all attacks in under 10 seconds.
Our high-capacity global network holds over (Terabits per second) of on-demand scrubbing capacity and can process 30 billion attack packets per second. Incapsula network has successfully defended clients against some of the largest attacks on record.
Incapsula shows you attacks as they are happening and gives you actionable insight into Layer 7 attacks. Incapsula security dashboard lets you quickly analyze attacks and lets you adjust security policies on-the-fly to stop web application attacks.
Block Any Type of DDoS Attack
Incapsula proxies all web requests to block DDoS attacks from being relayed to client origin servers. Incapsula detects and mitigates any type of attack, including:
- TCP SYN+ACK
- TCP FIN
- TCP RESET
- TCP ACK
- TCP ACK+PSH
- TCP Fragment
- DNS Flood
- Ping of Death
- HTTP Flood
- Brute Force
- Connection Flood
- Reflected ICMP & UDP
- Mixed SYN + UDP or ICMP + UDP Flood
- As well as other attacks