* Eliminate the DDoS attack risk without expenditures of capital equipment budgets.
* “Manage by Exception†with the additional benefit of expert advice when there are decisions to make.
* Receive detailed network security event reports and notifications through SNMP and E-mail.
* Fully outsource a rapidly evolving, network security threat without impacting staff training requirements.
Day Zero DDoS threats are evolving at greater rates than ever before. Common practices of using firewalls, routers and unified threat management devices are not adequate for the current strain of threats and are not architected properly to counter future threats. Most of these solutions use general-purpose processors and operating systems and therefore cannot handle the processing demands required. They add significant latency to network service flows, thereby impacting the performance of applications such as VoIP. The manual nature of these approaches drives up IT administration expenses and yet do not mitigate the latest evolution of threats. IntruGuard’s advanced DDoS firewall solutions represent a best-of-breed approach to network security and now the MSSP partners are armed with the tools to offer customers a dedicated solution to network flood protection. IntruGuard has made significant technology investments to ensure its solutions provide the best possible support for MSSP partners. These partners also benefit from IntruGuard’s investment in ASIC based designs ensuring performance, simplified installation, configuration, management, and utilize a straightforward user interface.
“The IntruGuard MSSP Program offers service providers the leading DDoS firewall appliance used by organizations worldwide,†said Tom Bleier, Vice President, Marketing and Business Development†of IntruGuard Devices. “The program is designed to offer MSSP partners a solution that can be installed in minutes with no network changes and employ a `set and forget’ methodology with thresholds that self-adjust. The secure, out-of-band role based remote management and detailed reports and graphs allow for fast drill downs into the network traffic situation. This combination yields a two second attack response time for the customer, with a low cost of operations for the service provider.â€
Now, IT management staff of e-commerce companies, enterprises and other targets of malicious DDoS attacks, can fully outsource this necessary network protection. A customer simply utilizes the protection service from one of the partners to fully offload all installation, configuration, event management, monitoring, and elimination of all such DoS/DDoS assaults.