Welcome to We Web Hosting

Secure Your Websites From Internet Attacks

Wweb Oy provides FREE DDoS Protection to all customers as a feature of our Web Hosting, VPS, Cloud Servers & Dedicated Servers.

Protect your site

In a DDoS (distributed denial-of-service) attack, an attacker will send thousands of fake requests in an attempt to exceed the bandwidth, flood a server’s resources, and overload the system. By doing this, valid requests can only be processed very slowly or not at all. A massive amount of compromised computers (botnets) are often used to create a gigantic amount of data traffic.

WeHost uses its automated security tools to protect your web applications, websites, servers, and IT infrastructure from this threat. Our automated system recognizes almost all attack patterns in advance, allowing it to block the attacks and effectively thwart the vast majority of them. It uses the latest hardware appliances and sophisticated perimeter security technologies, providing you with first-rate protection against large-scale DDoS attacks.

Managed Hosting

Why Our DDoS Is Good

AUTOMATED RECOGNITION OF ATTACK PATTERNS

In addition to recognizing an attack based on the amount of traffic or the number of packets, we at WeHost will be able to clearly define the actual attack and then to specifically home in on and react to that particular type of attack. For example, a UDP flood with 500k pps is harmless for a server. A 500k SYN packet, however, could pose a problem. Our DDoS protection tools can detect precisely this type of difference.

FILTERING TRAFFIC FOR KNOWN ATTACK PATTERNS

This method allows us to effectively filter out the most commonly known attacks by putting them through traffic scrubbing filters. The method is especially successful at scrubbing out the following types of attacks: DNS reflection, NTP reflection, and UDP floods on port 80.

AUTHENTICATION AND DYNAMIC TRAFFIC FILTERING

In this final layer, we filter out attacks in the form of SYN floods, DNS floods, and invalid packets. We are also able to flexibly adapt to other unique attacks and to reliably mitigate them. The above technologies support a high level of automation, which in turn will continue to be optimized step by step. We can improve the system by analyzing each attack and constantly adjusting our filters and responses.

Need help? Contact our award-winning support team

Our expert team is always on hand to help answer your questions, get you started, and grow your presence online. You can chat or email us at any time! We're always standing by and eager to help.

Contact us now

Copyright © 2020 WeHost All Rights Reserved.