Table of Contents
- Compliance Measures
- Firewall
- TLS Fingerprints
- Access Control
- SAML SSO
- HTTPS/SSL
- Open System Interconnection (OSI) Model
- Layer 3 DDoS
- Layer 4 DDoS
- Layer 7 DDoS
- What to do in case of a DDoS attack
- Bypass System-level Mitigations
- Billing for DDoS
- Contact Us
Compliance Measures
Epycbyte ensures compliance with industry standards and regulations to provide secure solutions for your business needs.
Firewall
The firewall acts as a barrier between trusted internal networks and untrusted external networks, protecting against unauthorized access.
TLS Fingerprints
TLS fingerprinting is used to identify malicious traffic by comparing server certificates to known legitimate ones.
Access Control
Strict access control ensures that only authorized users can access sensitive data or resources.
SAML SSO
Single Sign-On (SSO) simplifies user authentication across multiple systems, reducing the need for multiple passwords.
HTTPS/SSL
Secure Sockets Layer (SSL) encrypts data during transmission to protect it from being intercepted.
Open System Interconnection (OSI) Model
The OSI model defines seven layers of networking: physical, data link, network, session, presentation, and application.
Layer 3 DDoS
Layer 3 attacks target the data link layer, flooding the network with traffic to cause congestion.
Layer 4 DDoS
Layer 4 attacks involve the transport layer, overwhelming servers with too many connections.
Layer 7 DDoS
Layer 7 attacks target the application layer, overwhelming servers with requests.
What to do in case of a DDoS attack
- Monitor traffic for unusual patterns.
- Use DDoS protection tools.
- Engage with security teams to analyze and mitigate threats.
- Update systems with patches to prevent vulnerabilities.
Bypass System-level Mitigations
To disable automatic mitigations temporarily:
- Click the menu button in the Firewall tab.
- Select "Disable System Mitigations."
- Confirm in the dialog box for 24 hours.
Billing for DDoS
Epycbyte automatically mitigates L3, L4, and L7 DDoS attacks at no extra cost. You are billed for legitimate traffic and any illegitimate traffic that bypasses mitigation.
Contact Us
For support or questions, visit the Epycbyte website or contact their customer service team.