MITIGATOR Description

MITIGATOR is a tool against modern DDoS attacks at the L3-L7 levels. It is used to protect infrastructure and individual services of financial, gaming, telecom operators, hostings, and enterprise.

MITIGATOR is the best choice for companies that recognize the problems in their security system but are not satisfied with the service provided either by MSSP or their current DDoS protection.

Features of MITIGATOR

Protection of both symmetric and asymmetric traffic with -TCP
-TLS protection with traffic decryption
-Web Server log analysis via Syslog
-Programmable filter usage; WAF integration options; application protection using Mitigator Challenge Response; ISN Synchronization
Traffic redirection via BGP. You can send and receive BGP flowspec for traffic filtering
-Flexible deployment schemes: Inline, On-a-stick, L2 transparency, L3 router
Support for geo-distributed clustering
Support for optional Flow Collector
-Automatic traffic dump collection

Pricing

Pricing Information:
Depends on bandwidth
Free Trial:
Yes

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
BIFIT
Year Founded:
2008
Headquarters:
Russian Federation
Website:
mitigator.ru/en.html
Update This Listing

Media

MITIGATOR Screenshot 1
Recommended Products
Auth for GenAI | Auth0 Icon
Auth for GenAI | Auth0

Enable AI agents to securely access tools, workflows, and data with fine-grained control and just a few lines of code.

Easily implement secure login experiences for AI Agents - from interactive chatbots to background workers with Auth0. Auth for GenAI is now available in Developer Preview
Try free now

Product Details

Platforms
Linux
On-Premises
Types of Training
Training Docs
Live Training (Online)
Webinars
Customer Support
Live Rep (24/7)
Online Support

MITIGATOR Features and Options

DDoS Protection Service

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

MITIGATOR Lists

MITIGATOR User Reviews

Write a Review
  • Previous
  • Next