Skip to content
Telkom Clean Pipe

Telkom Clean Pipe

Browse throughout with no interruptions.

Telkom Clean Pipe

Telkom Clean Pipe solution is a Managed Secure IP Service that extends our internet security services to guarantee your availability with minimal service disruption due to cyber-attacks like Distributed Denial of Service (DDOS).
Features & Benefits

Predictable Path during DDoS mitigation:

Back to the customer via a known and controlled traffic path

Incoming traffic is diverted to SC within Telkom network

Scrubbing Centres (SC) are located within the Tier 1 Global ISP IP network

Result in predictable traffic performance

To get a comprehensive proposal structured around your exact Clean Pipe requirements, contact our customer service number on

T 0800 200 000 | 020 4600 200 M 200 | - or write to our sales team E corporatecare@telkom.co.ke | corporatesales@telkom.co.ke

Frequently asked questions.

is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS attack. The hallmark of DDoS attacks is the distributed nature of the malicious traffic, which typically originates from a botnet—a criminally-controlled network of compromised machines spread around the globe.

  • Volumetric attacks: The classic types of DDoS, these attacks employ methods to generate massive volumes of traffic to completely saturate bandwidth, creating a traffic jam that makes it impossible for legitimate traffic to flow into or out of the targeted site.
  • Protocol attacks: Protocol attacks are designed to eat up the processing capacity of network infrastructure resources like servers, firewalls, and load balancers by targeting Layer 3 and Layer 4 protocol communications with malicious connection requests.
  • Application attacks: Some of the more sophisticated DDoS attacks, these exploit weaknesses in the application layer—Layer 7—by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory.
  • Business competition: In competitive industries a DDoS attack can be used to take down a rival’s website.
  • Extortion: Certain industries, such as e-commerce, are dependent on their online presence and are easy prey for perpetrators extorting money in exchange for keeping a specific website online.
  • Hacktivism: Hacktivists typically target political, media, or corporate websites to protest their actions.
  • Vandalism: Cyber vandals, typically disgruntled users or random offenders, often attack high-profile targets.
Skip to content