Moscow, Russia, December 07, 2017 --(PR.com
)-- This is the way TTK has strengthened the existing system of protection against cyber attacks, having ensured the customer’s security at the network, transport and application level. DDoS-GUARD’s module has successfully supplemented the hardware and software complex, which has been successfully operating on the TTK node for several years.
DDoS-GUARD is a robust solution as it is based on unique algorithms and modern machine learning technologies developed by the company's specialists given the peculiarities of traffic at the application level.
The new features of the protection against DDoS attacks service from TTK will be attractive to those companies that want to protect their communication channels as well as information resources (websites, online shops, online banking, etc.) from hackers. Many large companies - banks and telecom operators in particular-have already opted for TTK’s system for protection against cyber attacks.
"Thanks to cooperation with DDoS-GUARD we have started to provide our corporate customers with a durable comprehensive solution that will protect them against all types of DDoS attacks,"- said Alexander Dubinin, head of the TTK Business Development Department on the corporate and state market. "Amid global cyber attacks, which have become more frequent recently, it is important for corporate clients to make use of high-quality systems to protect themselves from cyber threats. We understand this and strive to protect our clients from cybercriminals as much as possible."
DDoS attacks at the application level today are one of hackers’ most cunning methods. Web applications that are available from outside often act as links between different elements of the corporate infrastructure. Therefore, a successful DDoS attack can lead to inaccessibility of all services or be a cover (a distracting maneuver) for hacking and stealing confidential information.
To organize such attacks hackers need minimal available bandwidth and computing resources.
The flow of malicious requests directed at a customer’s application can easily overcome firewalls, mixing with the legitimate stream and cause the avalanche response of the attacked system exhausting its resources.
Although carried out alone not very often (about 7% of the total), such attacks are widely used as an auxiliary tool for large-scale combined attacks on complex web applications. HTTP / HTTPS flood remains the most common type of such DDoS attacks.
The number of participating devices increases from year to year, the pattern of attacks becomes more complicated, new tools for their implementation appear. The damage from such cyber attacks amounts to tens of millions USD, but what is more important is they cause irreparable harm to the reputation of the suffering company.