Skip to content
Managed(Hosted) Firewall

Managed(Hosted) Firewall

Advance your business security

Managed(Hosted) Firewall

Telkom’s hosted security solution secures assets and the business environment for SMEs and corporates.

Scalability

Reduce cost expenditure by moving to an OPEX model as opposed to costly on premise security solutions that require heavy h/w and software capex expenditure.

Cost Cutting

Easily scale security solutions as you grow your human resources and needs

Expertise Management

Incorporate advanced security managment

Cash protection

Less up-front spend.

Features & Benefits

Access control

Inspection and filtering services between the customer and the internet branch networks, partner networks and hosted applications.

Cloud computing.

Frequently asked questions.

is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS attack. The hallmark of DDoS attacks is the distributed nature of the malicious traffic, which typically originates from a botnet—a criminally-controlled network of compromised machines spread around the globe.

  • Volumetric attacks: The classic types of DDoS, these attacks employ methods to generate massive volumes of traffic to completely saturate bandwidth, creating a traffic jam that makes it impossible for legitimate traffic to flow into or out of the targeted site.
  • Protocol attacks: Protocol attacks are designed to eat up the processing capacity of network infrastructure resources like servers, firewalls, and load balancers by targeting Layer 3 and Layer 4 protocol communications with malicious connection requests.
  • Application attacks: Some of the more sophisticated DDoS attacks, these exploit weaknesses in the application layer—Layer 7—by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory.
  • Business competition: In competitive industries a DDoS attack can be used to take down a rival’s website.
  • Extortion: Certain industries, such as e-commerce, are dependent on their online presence and are easy prey for perpetrators extorting money in exchange for keeping a specific website online.
  • Hacktivism: Hacktivists typically target political, media, or corporate websites to protest their actions.
  • Vandalism: Cyber vandals, typically disgruntled users or random offenders, often attack high-profile targets.
Skip to content