• Email
  • Telephone
plusserver - Your Managed Cloud Service Provider

DDoS protection for your business

Case Study DDoS

Case Study DDoS

The increasing dangers on and from the internet have encouraged us to arrange for our clients’ data to be protected even more carefully by a specialist. Akamai and the Web Application Protector solution offer precisely the support we were looking for.Thomas Demann, General Manager IT, PrintPlanet.de

Read the whole case study now

Effective protection against DDoS attacks

DDoS (Distributed Denial of Service) mitigation to suit your needs

What is a DDoS attack?

The abbreviation DDoS stands for Distributed Denial of Service. The objective of a DDoS attack is to overload the targeted system by launching a targeted attack from several locations. Unprotected systems – computers, servers or devices networked in the Internet of Things – are also infected with malicious software. In doing so, the infected systems can be remotely controlled to direct a high number of requests to a web environment over a short period of time. There are also intelligent attacks, in which the pattern of the attack is constantly changing in order to permanently avoid the defensive mechanisms of the attacked system.


  • Transparent protection against DDoS attacks
  • Relief of the load on the server platform
  • Operation of the DDoS Mitigation solution by plusserver
  • Reduction of downtime cost and operational risk
  • Increase of accessibility
  • Guaranteed availability of up to 99.95 % (monthly average)

Product portfolio

DNS forwarding solutions

Our DNS forwarding solutions efficiently protect your website or online shop against complex attacks. State-of-the-art filter technologies are used in an external, worldwide security network. In this way your hosting infrastructure is protected against most types of DDoS TCP-and TCP-HTTP-based attacks. In addition, attacks on your application are prevented with the help of a Web Application Firewall (WAF). Moreover, modern analysis methods are automated and applied virtually in real time to all data traffic in order to block harmful traffic.

DDoS mitigation product portfolio

BGP-based solutions

The BGP-based products work with permanent routing of incoming traffic to the Akamai Scrubbing Center. This is followed by forwarding to your hosting infrastructure. In this way the traffic is automatically filtered for DDoS and other attack patterns. Malicious traffic is detected and stopped early on before it reaches your hosted systems. With always-on you benefit from permanent protection of your web servers. Your hosting infrastructure is protected against most types of DDoS TCP-, TCP-HTTP-, UDP- and ICMP-based attacks.

Dedicated hardware

With our dedicated-hardware solutions, even intelligent and complex attacks are successfully fended off. By using the latest filter technology, your hosting infrastructure is protected against most types of DDoS TCP-, TCP-HTTP-, UDP- and ICMP-based attacks. Malicious traffic is blocked in time using modern analysis methods to automatically examine all traffic virtually in real time. The intelligent protection even identifies camouflaged attack patterns based on algorithms and previously detected attacks.

Which DDoS protection for which applications?

Websites / online shops

Web-facing applications that can be accessed via the browser are a popular target for attackers. Our DNS forwarding solutions provide the perfect protection. A Web Application Firewall (WAF) can also be used to prevent attacks on the application level.

Complete infrastructure

BGP-based solutions protect the entire infrastructure (online shop /website/VPN/FTP/e-mail/database) in the subnetworks that you assign. In addition to the website or online shop, these also include the e-mail server, databases and any other application that can be reached via TCP/IP.

DDoS solution finder

The requirements and protection needs of our customers are very different. This is why we offer six DDoS mitigation solutions with different features. Our DDoS solution finder will help you to quickly and easily determine which of our solutions is best for you. We will also be happy to provide personal, tailored advice on the optimal products for your needs.

Websites / online shops
Entire IT infrastructure
Without WAF protection
Incl. WAF protection
Cloud service
In the environment
No streaming services / UDP
Streaming services / UDP
Few expected packets
Many expected packets
loadingSolution finder is loading

Which plusserver application requires DDoS protection?

Do you also need an included WAF to defend against both DDoS attacks and application attacks?

Do you want to use a cloud service (higher protection bandwidth) or a hardware solution in your environment?

Do you run streaming services or do you rely on UDP traffic?

Are you expecting lots of data packets?

DNS Forwarding (+WAF)


Dedicated hardware

  • Akamai Web Application Protector
  • The perfect entry point for protecting your shop.
  • Typical
    application: online shop/
  • Expected traffic:
    < 100 Mbit

  • Akamai Kona Site Defender
  • The optimal protection for your shop with the highest cloud security level.
  • Typical
    application: online shop/
  • Expected traffic:
    > 100 Mbit

  • Business DDoS Mitigation
  • The affordable introduction to DDoS protection for your entire hosting infrastructure.
  • Typical application:
    online shop / website / VPN / FTP / e-mail / database
  • Expected traffic:
    < 100 Mbit

  • Akamai
  • Comprehensive environmental protection that is particularly worthwhile for large infrastructures.
  • Typical application:
    online shop / website / VPN / FTP / e-mail / database
  • Expected traffic:
    > 100 Mbit

  • RioRey
  • Dedicated basic protection for your environment.
  • Typical application:
    online shop / website / VPN / FTP / e-mail / database
  • Expected traffic:
    ~ 1 Gbit

  • RioRey
  • Dedicated premium protection for your environment.
  • Typical application:
    online shop / website / VPN / FTP / e-mail / database
  • Expected traffic:
    ~ 1 Gbit
With DDoS protection from plusserver you protect your website, online shop or other web applications from online attacks. Find the optimal protection against denial of service attacks - whether it is through DNS forwarding or BGP routing. Bernhard Göth, Head of Sales Mid-Market

Let us advise you

Why you need DDoS protection

Figures from the latest “State of the Internet Security Report” from Akamai (Q4 2017 vs. Q4 2016)


DDoS attacks total


Attacks at the infrastructure level


Reflection-based attacks


Attacks at the application level


Total attacks on web applications


SQLi attacks


IPs involved were from Germany


Attacks per target on average

Downtime cost simulator

What is the cost of downtime for your company?

Do you know how much the temporary failure of your infrastructure could actually cost you? Simply enter a few figures and see how an attack on your infrastructure would affect you financially.

An error has occurred. Please check your details.
Lost Sales
Lost Productivity
Downtime cost


Weekly Daily Hourly Elapsed
Revenue 0 0 0 0
Productivity 0 0 0 0
Total Loss 0 0 0 0

We will be pleased to inform you about highly available infrastructures as well as efficient protection against cybercrime.

Free DDoS basic protection from plusserver


As a managed hosting provider, plusserver operates DDoS basic protection in all its data centres. This protects you, as your systems are no longer accessible during attacks on other customers. All types of attacks are detected quickly and appropriate countermeasures are taken.

This solution does not, however, guarantee accessibility to your own systems during an attack. In addition, downtimes caused by DDoS attacks are usually excluded from Service Level Agreements (SLA).

DDoS protection brochure

All of plusserver’s DDoS mitigation solutions at a glance.

DDoS protection brochure

Without DDoS protection companies can face:

Revenue losses

Your customers cannot reach you over the internet during and after an attack, meaning you do not make any sales during this time. If you have started an expensive marketing campaign your expenses may, in the worst case, have been for nothing.

Damaged reputation

Whether your customers are unnerved and go to the competition or even become victims of a breach of data protection during a cyberattack: your reputation will suffer as a result of the attack and it will take you a long time to repair it.

Productivity losses

Your employees cannot work productively if they cannot access important data. Note that cybercriminal attacks can also target applications or databases.

Loss of data

In addition to extortion, cybercriminals have also discovered the theft of corporate and customer data. This can lead to high damage claims and also cause irrevocable damage to the company.

Learn more about DDoS in our free e-book

How does a DDoS attack work, what are the trends and above all: How do you protect your company from it? The free e-book from plusserver and RESMEDIA contains everything you need to know about technical and legal questions.

Download e-book now

CDN: Even more security and faster data

Accelerate the global delivery of your data with a Content Delivery Network (CDN). It also increases your protection against DDoS attacks, as they are distributed across various nodes rather than burdening a single environment.




Border Gateway Protocol. The routing protocol connects individual networks on the internet and ensures that data packets reach their destination. With BGP-based DDoS protection, traffic is sent to be cleaned before it arrives at the target system.


Domain Name System. The DNS is used for name resolution on the internet, i.e. it assigns a domain (example.co.uk) to the correct IP address of the target system. For the DDoS protection solution, a DNS record is adapted to first guide the traffic through a filter infrastructure outside of the target network.


Web Application Firewall. It protects web applications by analysing, filtering and blocking HTTP traffic. The Hypertext Transfer Protocol is used for communication on the internet to retrieve data from a web server.