information security tools

FSTEC-certified solutions for infrastructure protection in the Linxdatacenter cloud

linx protect

multi-layer protection from all types of cyber attacks including ddos

website protection

Infrastructure protection solutions - information security tools from Linxdatacenter. Proxying incoming traffic through Stormwall network. Individual approach, please call: +7 495 369-05-94

ip protection

Connection to the Stormwall traffic cleaning system via GRE tunneling or on the physical site of Linxdatacenter

web application firewall

Cloud-based solution for preventing security breaches and data leaks in personal accounts, payment systems, etc., along with protection against code injections

deployment

Installation and management by Linxdatacenter

firewall

protection against unauthorized access to your company networks

routing

of network traffic within a virtual infrastructure

access distribution

on L3 layer

GOST-VPN

implementation of information security tools

deployment

Installation and management by Linxdatacenter

Vulnerability scanner

monitoring and assessment of vulnerabilities in
IT-infrastructure

detection

of potential infrastructure vulnerabilities in real time

assessment

of security threats and recommendations for prevention

examination

of software updates and reporting on the security status of the system

control

over data access on the virtual and physical level

antivirus

reliable virus protection without load on virtual resources

routing

of network traffic within a virtual infrastructure

access distribution

on L3 layer

GOST-VPN

implementation of information security tools

deployment

Installation and management by Linxdatacenter

gost-vpn as a service

secure communication channel for personal data information system

access distribution

on L3 layer

integration

with existing infrastructure and network devices

building

Site-to-Site and Client-to-Site encrypted tunnels

deployment

Installation and management by Linxdatacenter

Licenses and certificates

client:

BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.

Solution

To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

Write to us

Security tools

BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.

Solution

To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

Thank you for your inquiry, we will get back to you shortly!