Get to know our product for monitoring BGP announcements.
Vantage Point Security
Cloud Network Security
Content Delivery Network
Under DDoS Attack
Frequently Asked Questions
Find answers to some of UPX clients' frequently asked questions
Why just firewall and blackhole are not enough to mitigate DDoS attacks?
The easiest way to protect your entire network from an attack is to remove the attacked IP addresses from the Internet, either by blocking traffic with a firewall or by removing them from the internet by blackhole. In this way, the other IP addresses of your infrastructure are preserved. But there are two aspects to consider: • What if the IP address that's being attacked belongs to an equipment that supports important/essential services that can not be simply removed from the internet? • What if the attack is done at multiple IP addresses or at all the IP addresses of your whole network? The attacks are increasingly sophisticated and massive, and require more strategic actions such as DDoS mitigation, which goes far beyond the tactics outlined above. DDoS mitigation mitigates the attack by inspecting the packages, discarding the malicious ones and releasing only the legitimate packages, allowing the service supported by that IP address to be kept alive and available.
What is TTM and why is it important that it is as small as possible?
TTM stands for Time To Mitigation and it is the time that a DDoS mitigation system takes to be triggered and begin to soften the attack. By duplicating and inspecting 100% of the customer's incoming traffic to our network, while sending production traffic without increasing latencies, UPX's mitigation system acts within 3 seconds after an attack is identified, guaranteeing minimal impact to the operation of our client. This is way different from other solutions available in the market, which take an average of 5 minutes to take action.
How can I optimize the investment already made with other security platforms, can I integrate them?
One of the biggest shortfalls on the market is not having products that integrate security assets competently. A well-connected ecosystem is essential in the prevention and monitoring of threats. For example, for a quick reaction by the security team during any attacks, triggering alerts, generating automatic reports, taking predetermined actions, etc. and to boost investments, optimizing time for security professionals.
Comparing audience history: Does it help to generate more financial results?
A analytic panel allows you to view metrics that demonstrate whether the content being streamed is well-explored to meet public expectations. As you compare your audience over different periods, you can better understand content that works for your audience, plan the strategies and define what's relevant. The UPX Analytic Panel presents all quantitative results in real-time for better decision making, which directly impacts business profits.
What is the advantage of hiring a CDN from a specialized digital security provider?
UPX has begun its journey in the security segment with the need to protect its own network and therefore brings embedded in its DNA the assumption of offering performance combined to security. In this way, the distribution of content that passes through the network of UPX counts on with mitigated traffic, already cleaned, so that its users do not even notice that there was an attack.
I am suffering DDoS attack, what do I do?
Distributed Denial of Service (DDoS) mitigation is a complex action and maneuver that require constant analysis and study. There are some techniques that can be done to soften the impact of cyber attacks, however the best remedy is prevention.
How do I know if my company data has been leaked to the internet?
Antivirus and Firewalls in different layers of the web, traffic monitoring, anti-fraud devices, among other tools are not always enough to identify and combat incidents. UPX has developed unique algorithms with access to over 4 billion leaked data, which play a key role against so many threats.
Contact an UPX specialist