Scalable DDoS protection that keeps learning, always protecting.
Storm’s DDoS protection prevents your site from being knocked offline by DDoS attacks. Just set and forget. Or easily add custom protective measures from within the Storm Security Centre for enhanced DDoS mitigation.
- Point-and-click DDoS attack protection
- Includes Web Application Firewall (WAF) for sites and servers
- Supercharge content delivery speeds at the same time
Proactive 24/7 DDoS detection and prevention
With Storm you automatically get premium security features that simplify protection against DDoS and other high-level online threats. Need to customise your online protection? Just point and click.
Web App Firewall
Get supercharged DDoS WAF protection out of the box – just sign up and activate. Adjust your sites’ and servers’ security level in a single click to instantly level up your overall site security without compromising visitor experience. Detailed site and DNS analytics provide visual and report-based overviews of traffic sources.
Tired of dealing with problematic visitors? Easily blacklist IP addresses, IP ranges, or entire countries to keep your sites, data, and other visitors safe. Use the IP address whitelist for trusted hosts and services, and add custom WAF rules for custom security configurations based on your organisational needs. Need to know more? Talk to us about custom hardware security options.
Energised Content Delivery
More security, more speed. WebAccelerate combines CloudFlare’s global CDN technology with Storm infrastructure to deliver up to 200% global content delivery acceleration. CloudFlare’s CDN automatically adds a layer of self-learning DDoS protection to your sites and services for added peace of mind and state-of-the-art DDoS protection.
Skilled Storm engineers deliver 24/7 anomaly detection to mitigate and redirect DDoS attacks. Our hardware and software protection systems are complemented by intelligent data centre DDoS protection protocols. Storm servers are hosted in UK-based Tier 4 ISO 9001, 14001 and 27001 audited and certified data centres which are Public Sector Network(PSN) and N3 compliant.
FAQ: DDoS Protection
Distributed Denial of Service (DDoS) is a type of digital or cyber attack in which a group of compromised computers or servers are used to flood a target system with traffic. These compromised computers or servers are called a “botnet” and can be located anywhere, making such attacks very hard to block. As such, these attacks are often referred to as “distributed”. If the attack is successful, the target system can become overwhelmed, and therefore unresponsive to users.
There are several steps involved in a DDoS attack:
Infection: The first step in DDoS attacks occurs when the attacker identifies and infects vulnerable systems such as computers and servers with malware. Once infected, these systems are known as “zombies” or “bots”. However, the DDoS attack doesn’t begin at the moment of infection. Instead, compromised systems remain dormant initially.
Command and control: These “zombies” or “bots” can be controlled from a remote location. It is from this location where the attacker can issue commands to the network of “bots” and “zombies”.
Attack: DDoS attacks have the greatest effect when all “bots” or “zombies” flood the target system with traffic at the same time. In the “attack” phase, the attacker instructs all compromised systems to send traffic to the target system.
Denial of Service: The target becomes overwhelmed with traffic, which can cause legitimate requests to be dropped. The target becomes slow or, in a worst case scenario, entirely unresponsive.
Hardening systems and networks against DDoS attacks requires several different approaches designed to reduce overall vulnerability and increase resilience. Here are some of the key measures Storm employs to keep you safe:
24/7/365 Monitoring: The entire Storm infrastructure is carefully monitored 24/7/365 by our data centre partners and our internal security specialists to ensure early detection and mitigation of DDoS attacks.
System and network hardening: All Storm hardware is secured from the ground up, then regularly patched and maintained throughout the entire lifecycle. We only use cutting-edge servers and networking equipment which are regularly audited to ensure maximum security and performance.
Data centre protection: All Storm’s UK servers are hosted in Tier 4 ISO 9001, 14001 and 27001 audited and certified data centres which are Public Sector Network(PSN) and N3 compliant. Storm’s extensive DDoS mitigation infrastructure is complemented by our data centre partners’ own proprietary security measures, ensuring multi-layer DDoS protection for optimal continuity.
Anti-DDoS architecture: Storm employs extensive state-of-the-art anti-DDoS architecture throughout our network to ensure that your sites and servers remain protected 24/7. Some of these include:
- Load balancers – Designed to distribute network traffic across multiple servers. This ensures that no single point on a network becomes overwhelmed.
- Proxies and firewalls – Proxies and firewalls are employed to make infrastructure harder to detect, filter out and block unwanted traffic, assume load-balancing tasks, and cache static content (among other things) – all of which can further protect against DDoS attacks.
- Redundancy and Failovers: Storm employs redundant infrastructure to eliminate single points of failure. This means that, if one server or node is attacked or down for any reason, there are others to take its place to ensure uninterrupted continuity.
Anti-DDoS tools: In addition to ant-DDoS architecture, Storm also employs various tools to detect and protect against system exploits. These include intrusion detection and prevention systems, web application firewalls (WAFs), and DDoS scrubbing technologies.
There are three main types of DDoS attacks employed by attackers. These include:
Volume-based Attacks: The premise behind a volume-based DDoS attack is to flood a target network with so much traffic that legitimate traffic can’t access resources and services. Types of volume-based DDoS attacks include UDP floods (ports on the target host are flooded with data packets containing the UDP protocol), DNS amplification (redirecting high amounts of DNS requests to the target), and ICMP floods (a target’s network bandwidth is overloaded with ICMP traffic).
Protocol Attacks: With a protocol attack an attacker targets part of the network infrastructure by exploiting protocol weaknesses. Examples include Ping of Death (an attacker freezes or crashes a target with oversized data packets), SYN flood (a target system is brought down with a high volume of incomplete TCP handshakes), and Smurf DDoS (uses malware to create an infinite loop of data packets), among others. The intensity of these attacks is typically measured in packets per second (Pps).
Application Layer Attacks: These attacks target a specific application with traffic that seems legitimate. The purpose is to exhaust a server’s resources by overwhelming the server with requests or exploiting weaknesses in the application. Examples include HTTP floods, Slowloris attacks, and DNS query floods. These attacks are measured in requests per second (rps).
Don’t just take our word for it
Over 14,000 happy retailers & brands use Storm Internet
From the offset, Storm took the time to understand our problems and gave us confidence they could provide solutions to our issues. We've not been disappointed. Read More
Elliot Price - Elizabeth Shaw
Storm made us as the customer feel like we were valued. I think they are one of the best managed hosting companies out there! I have recommended Storm to several other people who have also been very pleased. Read More
Chris Palmer - Mystery Shoppers
The Storm guys rectified any issues quickly and without needing any prompting from us. Being able to contact the MD is a real bonus, it's good to know that you have the right person's ear for what is critical to us. Read More
Bob Baker - Signum International
We had several issues with previous hosting providers including their communication, support and performance. With Storm Internet any issues have been resolved immediately and the support system is really easy to use. Read More
Sim Sekhon - Legal4Landlords
If you need a responsive company to help with your web needs, then you can do no better than to call Storm Internet. Their dedicated team will help out in the most pressing of circumstances. Read More
Anna Stefaniak - YKK Europe
We rely on Storm, 5 years and counting. They elevate managed hosting to a whole new level and speak our language. Read More
Mike Bowen - Channel and Mobile Solutions
We need a website that is up and running at all times, and Storm delivers. They go the extra mile. Read More
Michael Saracevas - Cool Milk
Storm designed and proposed a dedicated Private Cloud infrastructure that not only met our needs for current business IT operations but also allowed for future growth. Read More
Theo Constantinides - Synbiotix Solutions Ltd
Whatever challenges you throw at them, Storm is always up to the task. Having them onboard is like having a complete tech team on duty 24/7 Read More
David Allaway - Mandon Software
Our needs had to be precisely matched and, unlike AWS or Google, Storm could do it Read More
Matteo Marcolini - Jayex Technology
The support guys have been brilliant in sorting every issue, the support provided and the price that we pay is far better than what other hosting providers had quoted us Read More
Justin Smith - Breakerlink
Storm Internet offered everything we needed. The support is there 24/7 and it is on a personal level. We feel like a business partner. Storm have helped us to optimise our server and keep everything running smoothly Read More
Omar Farra - Nitrotek
Storm Internet wins Best Hosted Provider at 22nd ISPA Awards
Over the years Storm Internet has collected a number of awards. They reflect a core methodology by which we empower our clients by providing them with the technology and tools they need to accomplish their goals efficiently.Read More