This website uses cookies in order to improve its ease of use. You accept this by continuing to use of the website. You can find more information on cookies and their deactivation here.

The Ever Stronger DDoS Protection

The self-learning AI learns from all attacks fended off by Link11
making your DDoS protection stronger every day.

  1. Attacks fended off in the previous year: 54.000+
  2. Largest attack fended off: 370.507 Mbps
Get Demo now

Excerpt of some references:

Verified and confirmed:

Benefit from self-learning AI protection:

The trend shows that DDoS attacks are increasingly getting stronger

Rise in complex attacks:
from 34% to 59%

Increase in average attack volume: 192%

Server outages up to:
1,007 Minutes

Your Benefits of the Link11 DDoS protection

Protect your web pages and IT infrastructure from DDoS attacks on all levels

Secure Investment

No additional hardware

Concentrate on what matters. You do not need to make expensive investments in additional hardware and cumbersome staff training. Link11 DDoS protection is fully cloud-based and is subject to ongoing improvement.

360° Protection

Intelligent architecture

The self-learning technology duly fends off all types of modern attacks. Depending on the connection, Link11 offers reliable protection against DDoS attacks on all layers and is ready to use within a few minutes.

Scalability

Individual packages

As you grow and need to upsize your infrastructure, your DDoS protection grows with you. Special packages custom-tailored to your needs facilitate the overview of the services you have booked.

Powerful Protection

Self-learning AI Shield

All attacks fended off by Link11 are stored in a sequence database. The self-learning AI of the DDoS protection analyzes every attack sequence and compares it with the existing data. This benefits all protected companies, as it facilitates the predictability of similar incidents, resulting in an even faster reaction.

Intelligent Threat Detection

Fingerprint Technology

Like every human, a user in the network leaves a digital fingerprint. This fingerprint can be created from hundreds of properties. The fingerprint identification of Link11 analyzes the behavior and the mark left by the user's browser and computer. On this basis, it creates the digital DNA of every user, which is compared in real time with known threat patterns.

Instant Protection

Instant protection

At the customer's request, all unwanted traffic variants, such as UDP or ICMP, can be blocked. In the event of an attack, the Link11 Security Operation Center informs you immediately and initiates all required protection measures. If an enterprise opts for the always-on variant via BGP, Link11 offers 24/7 support and detects and acts automatically in the event of an attack.

Secure Investment

No additional hardware

Concentrate on what matters. You do not need to make expensive investments in additional hardware and cumbersome staff training. Link11 DDoS protection is fully cloud-based and is subject to ongoing improvement.

360° Protection

Intelligent architecture

The self-learning technology duly fends off all types of modern attacks. Depending on the connection, Link11 offers reliable protection against DDoS attacks on all layers and is ready to use within a few minutes.

Scalability

Individual packages

As you grow and need to upsize your infrastructure, your DDoS protection grows with you. Special packages custom-tailored to your needs facilitate the overview of the services you have booked.

Contact us now

Powerful Protection

Self-learning AI Shield

All attacks fended off by Link11 are stored in a sequence database. The self-learning AI of the DDoS protection analyzes every attack sequence and compares it with the existing data. This benefits all protected companies, as it facilitates the predictability of similar incidents, resulting in an even faster reaction.

Intelligent Threat Detection

Fingerprint Technology

Like every human, a user in the network leaves a digital fingerprint. This fingerprint can be created from hundreds of properties. The fingerprint identification of Link11 analyzes the behavior and the mark left by the user's browser and computer. On this basis, it creates the digital DNA of every user, which is compared in real time with known threat patterns.

Instant Protection

Instant protection in the event of an attack

At the customer's request, all unwanted traffic variants, such as UDP or ICMP, can be blocked. In the event of an attack, the Link11 Security Operation Center informs you immediately and initiates all required protection measures. If an enterprise opts for the always-on variant via BGP, Link11 offers 24/7 support and detects and acts automatically in the event of an attack.

Contact us now

Your Link11 Dashboard

A glance at the interface reveals the strength of your DDoS protection.

The Dashboard for DDoS protection via DNS forwarding provides customers with individual insight into the real-time analysis of the data traffic. It furthermore shows DDoS attacks that have been fended off and their origin, the server availability, and measurement results concerning current server response times. Moreover, individual countries can be blocked in the Dashboard.
Link11 WebGUI

Reporting

The reports enable the scheduled generation of customized reports in a management overview. The reports can automatically be sent at regular intervals. All settings configured by the administrators in the user interface can be tracked and corrected ad hoc.

Alert Function

An alert function can notify the user about urgent threats by means of text messages. For every blocked connection, the blocking list indicates the reason for the filtering, the place of origin, and the duration of the connection. In this blocking list, blocked connections can also be unblocked for future connection attempts.

Diagnosis Dashboard

The Diagnosis Dashboard features general DDoS information and draws attention to current threats. Additionally, a DDoS alert system and a DDoS traffic display provide a quick overview of the current security status. The settings area enables the adjustment of the granularity of the smart DDoS filter and the configuration of settings for approved and unwanted access by means of blacklists and whitelists.

Whitelist

The whitelist makes it possible to setup permanent access for systems whose behavior deviates greatly from that of a normal user. For example, approved Internet crawlers are identified, and the compatibility with standard search engines, approved advertising bots, and administrators is guaranteed. 

How can we help you?

We would be pleased to provide you with advice and assist you in identifying the best solution for your enterprise.

DDoS in Detail - Cyber-Weapons in Action

Systematic attacks via hijacked computers and servers aim at smothering the target's unprotected infrastructure. The resulting downtime damages the reputation and the business. Some attacks even serve as a distraction while a major data theft is under way.

Protection from such attacks plays a significant role and is usually readily available.

DDoS attacks are capable of paralyzing web servers or entire networks. Unlike simple denial-of-service (DoS) attacks, distributed denial-of-service (DDoS) have an enormous impact. With this method, multiple computers attack a web page or an entire network infrastructure concurrently and as an array (bot networks).

This can quickly cause a server outage. Typical DDoS attacks aim at overloading the access link, the firewall resources, and the web and database servers.

Immediate protection in the event of an attack

At the customer's request, all unwanted traffic variants, such as UDP or ICMP, can be blocked. In the event of an attack, the Link11 Security Operation Center informs you immediately and initiates all required protection measures. If an enterprise opts for the always-on variant via BGP, Link11 offers 24/7 support and detects and acts automatically in the event of an attack.

DDoS protection of IT infrastructures

Larger enterprise networks with an IP network can be protected with the border gateway protocol (BGP). BGP protection is available as hot standby or permanent variant. In this way, the normal data flow continues until an attack occurs. When an attack occurs, the traffic is redirected via the Link11 filter center, where it is analyzed. The filtered data packets are then forwarded to the corporate infrastructure through a tunnel connection. The customer is free to decide whether to reroute all traffic or only parts of it.

Alternatively, enterprises can connect their entire IT infrastructure to Link11 via the BGP permanent variant and thus benefit from 24/7 protection.