Call Us: +90 850 532 5 260 Submit Ticket   Login
Protection Packages

Start Now

NC-Guard-Starter

$4/month $ without discount10
BUY

recommended

NC-Guard-Business

$6/month No discount $16
BUY

NC-Guard-Premium

$9/month No discount $19
BUY

NC-Guard-Platinum

$14/month No discount $24
BUY

Max Site to be Protected

1 Piece

10 Pieces

100 Pieces

Unlimited

Line Capacity

1Gbit's

10Gbit's

100Gbit's

800Gbit's

Package Capacity

100,000

1,000,000,000

10,000,000,000

100,000,000,000

Private IP Address

1 Piece

1 Piece

2 Pieces

3 Pieces

Free SSL Support

Support with Remote Assistance

Web Server Optimization

Database Server Optimization

System Optimization

Script Error Detection

24/7 Monitoring

Script Vulnerability Detection

Daily Max Support Time

5 Minutes

45 Minutes

3 Hours

8 Hours

Why is it difficult to block?

As mentioned above, DDOS attacks are carried out over multiple different IPs today. For this reason, it is not possible to prevent this attack with an IP blocking system. For this reason, instead of blocking IPs, in order to prevent DDOS attacks, checking the content of incoming IP packets and identifying IPs that contain malicious content will allow you to protect yourself from this situation. As mentioned above, all incoming IPs should be subjected to character analysis and different control mechanisms, those containing malicious content should be blocked, and those that comply with all obligations and rules should be allowed without delay. In order to implement such an application, superior performance and technology are needed. Apart from this, different rules and comparative Block/Reject obligations should be defined for each protocol. Thanks to these written rules, secure or insecure request results are obtained.

What is DDoS?

DDOS (Distributed Denial of Service) is a situation that is widely used today and directly affects site owners and internet users in a negative way. It is the data line density that occurs as a result of the same IPs connected to a place and the target site - part or all - receiving the command with the commands given from a certain center. These attacks, which were previously made with the commands given only from a certain center, can later be controlled from multiple different sources with the aim of increasing the damage to be given and increasing the size of the violence by developing and renewing.

Blocking attacks by analyzing requests coming from a single IP address and comparing the protocol, packet contents and incoming request size.

Scanning and blocking the uploading and execution of files containing malicious code to infiltrate the site or server.

Your sites are directed to the private IP address provided by the protection, so those who query your site will not be able to see your server IP address, so your server will not be attacked.

Scanning, analyzing and blocking cookies, requests and header data sent as get/post to form fields on websites.

A gradual blocking system against password finding and login attempts by trying passwords in the admin panels and member login form fields of the sites.

Blocking of spam text content sent to forums or comment areas, detection of bots and permanent blocking.

It prevents fake users/bots from automatically filling out your site's membership form, creating spam memberships.

Blocking the downloading of malicious content to your host, especially in themes and plugins of sites such as WordPress, and the execution of files that allow sites to send spam advertising emails.

Thanks to cache systems, the traffic of your sites will decrease at a rate greater than and you will not experience traffic problems in your hosting/server services.

The real IP address of your server or host is hidden and a different IP address is shown to visitors. A special IP address is provided for each protection and this IP address cannot be pinged. The special IP address provided for site-based protection can be used in SSL, and no additional IP is required for SSL.

Apart from safe bots such as Google, Yahoo, Yandex, MSN, bots that scan your website to obtain information and that may harm your website are blocked and your website is cleaned from unnecessary traffic.

The requests coming to your site's session-free fixed pages are stored in the cache (temporary memory) and displayed to the visitor through the cache before the requests are sent to your server.

If there are SQL injection vulnerabilities on your site, these vulnerabilities will cause your site to be hacked and the codes will be scanned while being sent to your site via requrst methods and malicious codes will be prevented from being sent.

Thanks to the cached files of the sites, your site is guaranteed to open faster because these files are accelerated by at least 10 lines.

Fixed content files such as Image, Js, Css, Xml, Txt, Swf that are frequently used on your site are cached (temporary memory) by the protection system, preventing each visitor from calling these files from your site over and over again, and ensuring that they are displayed to the visitor 50 times faster than RAM.

With more than 1,000 http protocol rules specially created by NettaCompany Web Solutions ©, Header, Post, Get, Cookie, Body information in all Request/Response data is scanned with the tiniest details observed and no harmful requests are sent to your site.

Our system automatically analyzes new types of attacks and blocks them. In addition, the system keeps these new types of attacks in memory and blocks the next similar attack without wasting time learning. In addition, with each blocked attack, our system improves itself by examining the incoming requests and creating additional protection features, even if the attack has been blocked.

In attacks over 1 Gbit/s, our network experts examine the content of the incoming packets and if the source is detected, the attacks are redirected back to destroy and slow down the source of the attack. If the source cannot be detected, the incoming attacks are directed to sites that broadcast against our country.

en_US