Confidentiality, data protection, server DDoS protection, and resource availability are a few of a project’s biggest priorities and are essential for its services to continue operating uninterrupted. In its basic package, HOSTKEY provides all of its customers DDoS server attack protection for all servers by default free of charge in data centers in the Netherlands, Finland and Germany.
For projects threatened by unconventional attacks, HOSTKEY offers advanced protection. Protection against DDoS attacks is provided for all dedicated servers and VPS. Advanced protection uses algorithms that filter incoming traffic round the clock as well as ensuring protection both from unconventional and common types of attacks in addition to attacks targeting network protocol vulnerabilities, which are more difficult to fend off.
All HOSTKEY servers in the Netherlands, Finland and Germany are under ongoing basic protection against DDoS attacks. This service fends off conventional “brute force” attacks designed to overcome the server port’s traffic capacity. This basic protection is provided to all customers by default at no cost to them.
Within the bounds of the basic monitoring protection system, the server port’s incoming traffic is constantly analyzed. In the event that the volume of its threshold values is exceeded, advanced protection is activated and the traffic is cleaned using the latest, effective algorithms.
The basic protection algorithms are sufficient for most projects. Nevertheless, a short-term decline in the services may occur during the process of the switch.
Advanced DDoS attack protection is required for projects for which the uninterrupted provision of its services is crucial. In order to ensure that outcome, the client’s infrastructure is connected to advanced protection algorithms on an ongoing basis.
The algorithms use machine learning to filter out «brute force», high-load attacks from large, distributed botnets as well as more clever, unconventional attacks which take advantage of network protocol vulnerabilities. Take for example the small (about 20 Mbps) syn flood/udp-flood.
When advanced algorithms are used, there is no possibility of even a short-term decline in service quality while the IP addresses are being changed during the switch.
Basic | Advanced * | |
Activation | By default | By order |
Data center locations | The Netherlands, Finland and Germany. | The Netherlands |
Cost, per month | - | for 1 TB of cleared incoming traffic. The first 1 TB of traffic is provided free of charge. |
Free | €50 |
Activation: By default
Data center locations: The Netherlands, Finland and Germany.
for 1 TB of cleared incoming traffic. The first 1 TB of traffic is provided free of charge.
Activation: By default
Data center locations: The Netherlands
* L7 application-level protection not provided
SYN Flood
SYN-ACK Flood
Fragmented ACK Flood
RST / FIN Flood
Fake Session Attack
Multiple SYN-ACK Fake Session Attack
Multiple ACK Fake Session Attack
Session Attack, SlowLoris
Misused Application Attack
Faulty Application Attack
UDP Flood
UDP Fragmentation Flood, UDP Fragmentation, Nuke
DNS Flood
Media Data Flood
Non-Spoofed UDP Flood
ICMP Flood
ICMP Fragmentation Flood, Nuke
Ping Flood
Ping Of Death
Zero Day DDoS attack, 0day DDoS attack
NTP Flood
NTP Amplification Attack
DNS Amplification Attack
IP Null Attack
TCP Null Attack
Type of Service (TOS) flood
Smurf Attack
Fraggle Attack
Naptha attacks
Teardrop Attack
SNMP Reflection
and more.
For more information, please contact our Sales Department
GPU servers for data science
e-Commerce hosting
Finance and FinTech
Private cloud
Rendering, 3D Design and visualization
Managed colocation
Are you afraid that DDoS will damage your business? And this fear is justified! Therefore, so detractors do not bring down a stream of unwanted traffic on your project, choose dedicated servers DDoS protection that are protected from such attacks.
HOSTKEY is providing DDoS protected VPS. Basic protection against such attacks is included in the cost of hosting, meaning it is free. To rent a cheap DDoS protected dedicated server, make a request to our manager, select a ready-made option from the catalog or use the online configurator of DDoS protection for VPS.
This is a type of hacker attack in which a huge number of requests are sent to the resource. Because of this, the server is overloaded and becomes inaccessible to users. This leads to two main dangers:
That is why it is so important to choose DDoS protected VPS! HOSTKEY provides only this type of hosting services — server with DDoS protection.
Evaluate the needs of your project and choose a DDoS-free dedicated server with the appropriate characteristics from our library. You can also make a customized hosting on an online configurator or contact our manager to carry out the task for ordering VPS with DDoS protection. They will select a suitable setup, issue an invoice and answer all your questions.
Most companies tend to underestimate the risks of DDoS attacks on their infrastructure. Every year the attacks become more dangerous and sophisticated; their power is constantly growing. Countering DDoS attacks is an extremely difficult task. Some companies try to organize the protection of their resources in-house, while others use professional dedicated server with DDoS protection and find themselves in a better situation for a number of good reasons:
If you find it difficult to choose a suitable DDoS protection server, then you need to contact the technical support specialists of our center for help. Perhaps your project will need not basic, but additional paid protection against DDoS attacks. We will connect your infrastructure to advanced security algorithms of DDoS protected VPS.
HOSTKEY is a permanent technical support 24/7. We are always in touch with a client using DDoS protection for the server, we solve possible problems within 10-15 minutes. The stability of server DDoS protection is guaranteed.