Improved protection | Basic protection | |
---|---|---|
On-demand | Always-on | |
Payment | Paid | Paid |
How soon it recognizes an attack (maximum time) | 2 minutes | 5 seconds |
What attacks it protects from | • Standard amplification attacks • Attacks from fake IP addresses • Attacks using flows or volumetric attacks (L3) • Attacks to establish a connection (L4) | • Standard amplification attacks • Attacks from fake IP addresses • Attacks using flows or volumetric attacks (L3) • Attacks to establish a connection (L4) • Attacks at the application layer (L5-L7) |
Protection mechanism | 1. Attack detected 2. Traffic is redirected to TMS 3. TMS cleans up traffic 4. TMS sends cleaned traffic to the server | 1. All traffic passes through TMS 2. When attacked, TMS immediately cleans up the traffic 3. TMS sends cleaned traffic to the server |
What cases it is suitable for | • You are rarely attacked • You are not attacked at the application layer (L7) • The server does not host a critical business application | • You are attacked from 2 to 3 times a day • You are attacked at the application layer (L7) • The server hosts a critical business application |