malicious Layer 7 requests are blocked by Myra on average per customer per year.
Service Level Agreement (SLA) for service availability.
of organisations expect serious damage from DDoS attacks.¹
Key features
Myra DDoS Protection can block suspicious clients based on GeoIP information like region, country, or other IP characteristics.
Determine the number of web requests conspicuous IP addresses are allowed to make within a specified period.
In the event of an attack, have Myra automatically inform you based on your predefined escalation and notification levels.
After the DDoS mitigation, receive individual reporting on the duration, type, and strength of the attack.
Myra monitors your upstream 24/7 and automatically notifies you of any communication issues with the origin server.
Issue automated SSL/TLS certificates and keep track of everything with a centralized management system.
Enjoy the benefits of a continuously updated SSL/TLS configuration based on the latest security standards.
Get seamless integration with Myra. We support modern web technologies such as HTTP/2, WebP, ChaCha20, WebSocket, and WebRTC.
Get the encrypted forwarding of clean traffic for increased security requirements with this optional Myra feature.
Anti-DDoS Spotlight
Our comprehensive security solutions protect your business from the latest threats.
Get the solution that is perfectly tailored to your needs.
You can expect a response within 24 hours.
Our cloud approach means our products can be set up in no time.
Newsticker DDoS
Public sector under DDoS attacks: According to the German Federal Criminal Police Office's report “Bundeslagebild Cybercrime 2023”, the number of recorded cybercrimes remains at a “high level”. The number of cybercrime offenses committed from abroad increased by 28%. Public administrations and authorities are increasingly in the focus of DDoS attacks and other threats.
DDoS attack wave hits French administration: After organizations from Switzerland, Finland, Sweden and Germany have already been affected by waves of attacks in recent months, cyber criminals have now targeted French government websites.
DDoS shuts down communication of Bielefeld city and fire department: An attack on the city of Bielefeld caused widespread failures in telephone communication systems. The fire department was also affected.
App and website of railroad company in Belgium (SNCB) down: A largescale cyber attack caused outages at SNCB. Digital ticket sales were also paralyzed for several hours.
German government websites as well as the transportation, logistics and financial sectors under attack: The latest attack campaign by the cyber group NoName057 appears to be targeting German organizations.
Cybercriminals shut down the website of a US court: Unknown attackers managed to bring down several administrative and service portals of the Administrative Office of Pennsylvania Courts.
DDoS protection (also known as anti-DDoS) refers to systems for defending against or mitigating cyberattacks by means of distributed denial of service. DDoS aims to cause delays and outages of websites and IT infrastructures via artificial requests. DDoS protection solutions are available either as a hardware appliance for implementation in your own data center or as a security-as-a-service solution via the cloud. Cloud-based DDoS protection can be used without additional hardware or software and therefore requires less effort to implement. The IT security provider takes care of the configuration and operation of the DDoS protection. DDoS protection as a hardware appliance, on the other hand, requires a high level of expertise to efficiently implement and configure the protection solution in your own data center. On-premises services, where the DDoS protection is installed and operated by the protection service provider itself in the customer's data center, are a middle ground.
The cost of DDoS protection varies depending on the desired deployment model (cloud, hardware or on-premises) and the required traffic bandwidth and number of domains to be protected. As a rule, security-as-a-service models as an anti-DDoS solution are cheaper for most companies than the in-house variant in their own data center. Full-service operators take on the initial implementation, continuous operation and configuration adjustments of security systems. Continuous monitoring of the secured systems is also included in order to ward off attacks as quickly as possible. The recruitment of cyber security experts in particular is a major obstacle and often significantly slows down the commissioning of hardware appliances. According to Bitkom, there are 137,000 vacancies for IT experts across all sectors in Germany (as of Nov. 2022). On average, it takes seven months to find suitable candidates for vacancies.
After the first step - recognizing DDoS - DDoS protection diverts harmful traffic flows in order to free up capacity on the web servers for regular user traffic. Modern protection systems automatically initiate DDoS mitigation within a few seconds as soon as an impact on the affected servers becomes apparent. By filtering incoming traffic at various levels and using intelligent load balancing, DDoS protection solutions ensure that sufficient bandwidth is available for the affected websites even in the event of an acute attack, until the attackers abort their attack without success.
DDoS protection for dedicated protection against attacks on the application layer (layer 7) relies on multi-layer granular filtering methods that include fingerprinting, blocklisting and request limiting. This enables DDoS protection to effectively identify and fend off harmful traffic in the shortest possible time. In contrast to attacks on layer 3/4, attacks on layer 7 are based on already established connections of services and protocols such as HTTP, HTTPS, FTP or SMTP. For this reason, such attacks are very difficult to distinguish from regular traffic using conventional anti-DDoS solutions, such as those supplied as standard by most hosters. Without dedicated DDoS protection to defend against layer 7 attacks, the targeted systems are at acute risk of failure.
Protection solutions for defending against distributed denial of service (DDoS) attacks also protect against denial of service (DoS) attacks, as the attacks use the same methods. In both cases, malicious traffic is directed to a web resource via an attack tool with the aim of overloading the affected web servers. However, while in a DoS attack the attack originates from a single system, cyber criminals use distributed botnets consisting of hundreds or thousands of systems for DDoS attacks. As such botnets are becoming increasingly easy for criminals to access via illegal marketplaces on the darknet, the more powerful DDoS attacks are increasingly replacing conventional DoS attacks. On the part of the affected organizations, this trend makes anti-DDoS defense immensely more difficult – dedicated protection solutions as DoS/DDoS protection are therefore a prerequisite for successful defense.
In principle, DDoS protection (also known as denial-of-service protection or anti-DDoS) is not able to prevent attacks. However, such DDoS protection ensures that the attacks do not have a negative impact on the affected web servers. So while attackers "waste" their resources on attacks, the target system remains protected - the website remains available for visitors and works as usual in terms of performance. In addition, by using a CDN-based DDoS protection service, companies can hide their web infrastructure from attackers – a direct attack on the organization's web servers is no longer possible.