Contacts

Head Office (In Riyadh) Location and contacts Olaya, Olaya Str, 2nd Aquaria – 6th floor – office 608, Riyadh 11443, P.O.BOX 10637, Saudi Arabia.37, Saudi Arabia.

Khobar Office Location Al Khobar, King Fahad Road, Al Khobar Mall, 2nd floor – office 328, Riyadh 11443, P.O.BOX 10637, Saudi Arabia.

cs@top.net.sa

+966112151331

bg_l-red direct
bg_l-red direct
bg_l-red direct
bg_l-red direct
bg_l-red direct

Layer 3, 4 and 7 DDoS protection with fast identification and mitigation of attacks.

Behavior-based DDoS protection reacts to any threat without the need for signature files.

Combines IP reputation scoring, Geo-location ACLs, and slow attack mitigation for complete Layer 3, 4, and 7 DDoS attack protection.

• Continuous threat evaluation minimizes risk of “false positive” detections.

DDoS [Solutions]

Layer 3 Flood Mitigation
·         Protocol Floods
·         Fragment Floods
·         Source Floods
·         Destination Floods
·         Dark Address Scans
·         Excessive TCP per Destination
·         Geo-location Access Control Policy (ACP)
 
Layer 4 Flood Mitigation
·         TCP Ports (all)
·         UDP Ports (all)
·         ICMP TCP/Codes (all)
·         Connection Flood
·         SYN Flood
·         Excessive SYN’s/Source/Second
·         Excessive Connection Establishments/Second
·         Zombie Floods
·         Excessive Connections per Source Flood
·         Excessive Connections per Destination Flood
Layer 7 Flood Mitigation
·         Opcode Flood
·         HTTP URL Get Flood
·          User Agent Flood
·         Referrer Flood
·         Cookie Flood
·         Host Flood
·         Associated URL Access
·         Mandatory HTTP Header Parameters
·         Sequential HTTP Access
Flood Prevention Mechanisms
·         SYN Cookie, ACK Cookie,
·         SYN Retransmission
·         Connection Limiting
·         Aggressive Ageing
·         Legitimate IP Address Matching
·         Source Rate Limiting
·         Source Tracking
·         Granular Rate Limiting
Behavioral Monitoring Metrics
·         Packets/Source/Second
·         SYN Packet/Second
·         Connection Establishments/Second
·         SYN Packets/Source/Second
·         Connections/Second
·         Concurrent Connections/Source
·         Concurrent Connections/Destination
·         Packets/Port/Second
·         Fragmented Packets/Second
·         Protocol Packets/Second
·         Same URL/Second
·         Same User-Agent/Host/Referrer/Cookie/Second
·         Same User-Agent, Host, Cookie, Referrer/Second
·         Anti-Spoofing Checks
·         Associated URLs Heuristics
IP Reputation Analysis Behavioral Monitoring Metrics
·         Dynamic IP Reputation Analysis
·         IP Reputation Database Updates
What

TopNet Main [Services]

Connectivity Services

001-vpn

SD-WAN

001-global-network

Internet Services

Cyber Security Services

002-decode

Penetration Testing

003-global

Public Discovery

004-antivirus

Endpoint Security

005-ddos

DDos Protection

006-firewall

WAF As A Service

007-log

Managed SEIM

008-checklist

Security Gap Assessment

009-firewall-1

Next Generation Firewall

010-evaluation

Vulnerability Assessment

011-confidential-email

Email Security

Online Hosting Services

012-website

Domain Hosting

013-web-hosting

Website Hosting

014-email

Email Hosting

Clouding Services From TopNet

015-backup

Disaster Recovery as a Service (DRaaS)

016-backup-file

Backup as a Service (IaaS)

023-server-1

Infrastructure as a Service (IaaS)

Clouding Services From Microsoft

017-office

Microsoft Office 365

018-azure

Microsoft Azure

Co-Location Full Services

019-cage

Full Cage

020-server

Dedicated Rack

021-server-storage

Shared Rackspace

Complete Managed IT Services

022-teamwork

Managed IT Services

Get [Free] Quote

We Will Reply Within Less Than 24 Hours