Protection Packages
Start Now
NC-Guard-Starter
$4/month $ without discount10
BUY
NC-Guard-Premium
$9/month No discount $19
BUY
NC-Guard-Platinum
$14/month No discount $24
BUY
Max Site to be Protected
1 Piece
10 Pieces
100 Pieces
Unlimited
Line Capacity
1Gbit's
10Gbit's
100Gbit's
800Gbit's
Package Capacity
100,000
1,000,000,000
10,000,000,000
100,000,000,000
Private IP Address
1 Piece
1 Piece
2 Pieces
3 Pieces
Free SSL Support
Support with Remote Assistance
Web Server Optimization
Database Server Optimization
System Optimization
Script Error Detection
24/7 Monitoring
Script Vulnerability Detection
Daily Max Support Time
5 Minutes
45 Minutes
3 Hours
8 Hours
Why is it difficult to block?
As mentioned above, DDOS attacks are carried out over multiple different IPs today. For this reason, it is not possible to prevent this attack with an IP blocking system. For this reason, instead of blocking IPs, in order to prevent DDOS attacks, checking the content of incoming IP packets and identifying IPs that contain malicious content will allow you to protect yourself from this situation. As mentioned above, all incoming IPs should be subjected to character analysis and different control mechanisms, those containing malicious content should be blocked, and those that comply with all obligations and rules should be allowed without delay. In order to implement such an application, superior performance and technology are needed. Apart from this, different rules and comparative Block/Reject obligations should be defined for each protocol. Thanks to these written rules, secure or insecure request results are obtained.
What is DDoS?
DDOS (Distributed Denial of Service) is a situation that is widely used today and directly affects site owners and internet users in a negative way. It is the data line density that occurs as a result of the same IPs connected to a place and the target site - part or all - receiving the command with the commands given from a certain center. These attacks, which were previously made with the commands given only from a certain center, can later be controlled from multiple different sources with the aim of increasing the damage to be given and increasing the size of the violence by developing and renewing.
Blocking attacks by analyzing requests coming from a single IP address and comparing the protocol, packet contents and incoming request size.
Scanning and blocking the uploading and execution of files containing malicious code to infiltrate the site or server.
Your sites are directed to the private IP address provided by the protection, so those who query your site will not be able to see your server IP address, so your server will not be attacked.
Scanning, analyzing and blocking cookies, requests and header data sent as get/post to form fields on websites.
A gradual blocking system against password finding and login attempts by trying passwords in the admin panels and member login form fields of the sites.
Blocking of spam text content sent to forums or comment areas, detection of bots and permanent blocking.
It prevents fake users/bots from automatically filling out your site's membership form, creating spam memberships.
Blocking the downloading of malicious content to your host, especially in themes and plugins of sites such as WordPress, and the execution of files that allow sites to send spam advertising emails.
Thanks to cache systems, the traffic of your sites will decrease at a rate greater than and you will not experience traffic problems in your hosting/server services.
The real IP address of your server or host is hidden and a different IP address is shown to visitors. A special IP address is provided for each protection and this IP address cannot be pinged. The special IP address provided for site-based protection can be used in SSL, and no additional IP is required for SSL.
Apart from safe bots such as Google, Yahoo, Yandex, MSN, bots that scan your website to obtain information and that may harm your website are blocked and your website is cleaned from unnecessary traffic.
The requests coming to your site's session-free fixed pages are stored in the cache (temporary memory) and displayed to the visitor through the cache before the requests are sent to your server.
If there are SQL injection vulnerabilities on your site, these vulnerabilities will cause your site to be hacked and the codes will be scanned while being sent to your site via requrst methods and malicious codes will be prevented from being sent.
Thanks to the cached files of the sites, your site is guaranteed to open faster because these files are accelerated by at least 10 lines.
Fixed content files such as Image, Js, Css, Xml, Txt, Swf that are frequently used on your site are cached (temporary memory) by the protection system, preventing each visitor from calling these files from your site over and over again, and ensuring that they are displayed to the visitor 50 times faster than RAM.
With more than 1,000 http protocol rules specially created by NettaCompany Web Solutions ©, Header, Post, Get, Cookie, Body information in all Request/Response data is scanned with the tiniest details observed and no harmful requests are sent to your site.
Our system automatically analyzes new types of attacks and blocks them. In addition, the system keeps these new types of attacks in memory and blocks the next similar attack without wasting time learning. In addition, with each blocked attack, our system improves itself by examining the incoming requests and creating additional protection features, even if the attack has been blocked.
In attacks over 1 Gbit/s, our network experts examine the content of the incoming packets and if the source is detected, the attacks are redirected back to destroy and slow down the source of the attack. If the source cannot be detected, the incoming attacks are directed to sites that broadcast against our country.