DDOS Protection as a Service
Node4's Service offers robust defence against Distributed Denial of Service attacks, ensuring business continuity. Featuring automated, scalable mitigation, that intelligently distinguishing between legitimate and malicious traffic. This always-on service is offered for a fixed monthly fee, providing transparent, expertly managed protection against both volumetric and application-layer attacks.
Features
- Automated, always-on service identifying and discarding malicious traffic effectively
- Scalable mitigation for diverse DDoS attack sizes and complexities
- Maintains accessibility for legitimate traffic during DDoS attack mitigation
- Transparent, fixed monthly fee offering with no hidden costs
- Expert management by a team of cybersecurity specialists
- Traffic 'scrubbing' redirects 'dirty' traffic, ensuring only 'clean' traffic flows
- Reactively managed based on intelligent network analytics detecting abnormal loads
- Protects against both volumetric and sophisticated application-layer attacks
- Proactively monitors traffic patterns for early detection of anomalies
- Blocks potentially harmful traffic before it reaches host systems
Benefits
- Ensures continuous business operations, even during DDoS attack scenarios
- Minimises risk of productivity loss due to network disruptions
- Protects against reputational damage from compromised website or service accessibility
- Prevents potential financial losses associated with DDoS-induced downtime
- Offers peace of mind with comprehensive, expert-managed cybersecurity solution
- Reduces the need for in-house DDoS mitigation resource investment
- Enhances stakeholder trust through reliable and secure network performance
- Adapts to evolving cyber threats with scalable protection measures
- Safeguards sensitive data from being compromised during DDoS attacks.
- Facilitates swift recovery and normal operation post-attack without user impact
Pricing
£85.04 to £2,379.43 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 6 1 2 2 4 3 0 8 9 3 2 6 6 6
Contact
Node4
David Cheetham
Telephone: 0345 123 2222
Email: bidmanagement@node4.co.uk
Service scope
- Service constraints
- DDoS protection solutions can’t ensure total security, and some attacks may require profile adjustments for optimal protection. If false positives occur, service profiles may need temporary modification to monitoring mode. If an attack threatens network integrity and can’t be prevented, we may need to discard traffic to the targeted IP addresses to mitigate the attack and prevent disruption to other IPs. Node4 strives to conduct essential planned works during periods of low traffic, providing at least 5 days’ notice. In emergencies or service-affecting incidents, Node4 will give as much notice as feasible.
- System requirements
-
- Complements public facing internet connectivity, provisioned by Node4
- Service capacity need to match that of the underlying connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Node4 shall prioritise all Service Tickets based on its reasonable assessment of the Priority level (P1 to P4); and respond to all Service Tickets in accordance with the initial response times specified below:
Response Acknowledgement - P1=30 Mins, P2=1 Hour, P3=2 Hours, P4=4 Hours
Commencement – P1=1 Hour, P2=2 Hours, P3=4 Hours, P4=N/A
Frequency of Updates – P1=1 Hour, P2=2 Hours, P3 and P4 =12 Hours if Resolve / Target to Fix exceeded
Resolve / Target to Fix – P1=4 Hours, P2=8 Hours, P3=12 Hours, P4=36 Hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Standard testing with accessibility software.
- Onsite support
- Yes, at extra cost
- Support levels
-
Support level options are as follows: -
Business Hours
Standard business hours support 9am to 5:30pm weekdays, excluding bank and national holidays
24 x 7
Priority 1 and 2 – Support hours 24/7
Priority 3, 4 and Service Request – Support hours between 9am and 5.30pm weekdays, excluding bank and national holidays. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Client need only to specify which public facing Node4 service they wish DDoS protection to be enabled on.
The service can be either procured alongside new connectivity, or else retro fitted to existing connectivity. - Service documentation
- No
- End-of-contract data extraction
- N/A
- End-of-contract process
- N/A
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- We provide our clients with premium bandwidth on DDoS Protection services, ensuring the clean traffic Committed Information Rate (CIR) is always available to the client. We manage capacity across our core network to ensure sufficient capacity for all connectivity, increasing capacity where necessary to meet utilisation demands.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Network
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Separate VRF routing domains across our core network, with network segmentation firewalls implemented to segregate traffic between different domains where reachability is required.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Separate VRF routing domains across our core network, with network segmentation firewalls implemented to segregate traffic between different domains where reachability is required.
Availability and resilience
- Guaranteed availability
- The service availability objectives of this service is 99.95%
- Approach to resilience
- Node4 core network has a fully resilient, and geo resilient architecture.
- Outage reporting
-
We monitor key product/service attributes grouped by availability, throughput, utilisation, latency and errors.
Alerts trigger service tickets into the service desk for proactive management
Client receives email alerts from the ticketing platform to alert them of issues and actions.
Additionally client can view or service status page: https://www.n4status.co.uk/
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is only granted to those that require access. Access can only be provided by those with the correct permission to authenticate. Management networks are isolated.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 29/03/2022
- What the ISO/IEC 27001 doesn’t cover
- All aspects are covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- ClaraNet Ltd
- PCI DSS accreditation date
- 12/08/2023
- What the PCI DSS doesn’t cover
- PCI controls 2d, 2e, 3, 4, 5, 6, 7, 8, 10, 11
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Node4 operates an Information Security Management System (ISMS) which conforms to ISO27001. The purpose of the ISMS is to assess and manage risk and to protect the organisation’s information assets from all threats, whether internal or external, deliberate or accidental. The CEO has approved the information security policy. The Information Security Objectives of Node4 are to: -
Protect information against unauthorised access
Assure the confidentiality of information
Maintain the integrity of the information
Ensure the availability of information as required by the business processes
Meet all regulatory and legislative requirements
Implement, maintain and test DR / BC plans in line with the security policy
Train all staff on information security
Continually review and improve the ISMS
Additional policies and procedures exist to support the Information Security Policy. These include, but are not limited to, physical and logical access controls, network security, malware controls, vulnerability management and business continuity.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All changes are assessed for their potential security impact through the Change Advisory Board. A Low-Risk change is one which has a possibility of causing up to a Priority 3 or 4 Incident. A High-Risk change is one which has a possibility of causing a Priority 1 or 2 Incident or a large amount of Priority 3 and 4 Incidents for multiple customers.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Vulnerability testing is performed monthly using internal and external tool sets. Vulnerabilities are assessed and remediation actions performed depending on risk. Information about potential threats is provided by the vulnerability scanning tools.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Protective monitoring is performed by the SIEM tool and monitored by the Security Operations Centre. The SIEM provides real-time alerts of any potential compromises and a process of detect, analyse and response is followed with 1 hour.
- Incident management type
- Undisclosed
- Incident management approach
-
The following approach in used for incident management to ensure the objectives are achieved
Incident Resolution is achieved in the most effective manner
All Incidents are identified promptly and correctly
All Incidents are evaluated, categorised, and prioritised correctly
Communication is maintained with all Stakeholders throughout the lifecycle of all Incidents
All Incidents are constantly monitored throughout their lifecycle
Incident are handled as outlined in the Incident Management Schedule Document here: -
https://node4.co.uk/app/uploads/2022/07/Schedule-Incident-Management-07.04.2021-release.pdf
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
In our commitment to fighting climate change, we take a holistic approach that encompasses reducing carbon emissions, enhancing energy efficiency, and promoting sustainable practices in the delivery of our cloud hosting and software services. Our strategies include:
Energy Efficiency: We optimise our datacentres and cloud infrastructure to be as energy-efficient as possible, employing the latest in green technology and design principles. This reduces our overall energy consumption and minimises our carbon footprint.
Renewable Energy: Where feasible, we power our operations with renewable energy sources, such as solar and wind, to reduce reliance on fossil fuels. This commitment extends to encouraging our suppliers and partners to also adopt renewable energy.
Carbon Offsetting: We invest in carbon offset projects, including reforestation and renewable energy projects, to compensate for our unavoidable emissions. These efforts contribute to global carbon reduction initiatives.
Sustainable Practices: We advocate for and implement sustainable practices within our organisation, including reducing waste, promoting recycling, and encouraging the digitalisation of processes to minimise paper use.
Client Engagement: We work with our clients to understand and minimise the environmental impact of their cloud and software service choices. This includes offering guidance on how to use cloud resources more efficiently and sustainably.
Innovation: We continuously explore innovative ways to reduce the environmental impact of our services, including the development of more energy-efficient software and the utilisation of AI to optimise resource usage.
Our aim is to lead by example in the fight against climate change, demonstrating that it is possible to deliver high-quality cloud services while also making a positive impact on the environment. Through these actions, we not only contribute to the sustainability of our planet but also offer our clients the opportunity to engage with a provider that aligns with their values on environmental responsibility.Covid-19 recovery
In our efforts to support COVID-19 recovery, we're committed to leveraging our cloud hosting and software services to aid businesses, communities, and public sector organisations in navigating the challenges posed by the pandemic and its aftermath. Our strategies include:
Remote Work Solutions: We provide robust cloud solutions that enable seamless remote work, ensuring that organisations can continue their operations without interruption. This includes secure access to critical applications, collaboration tools, and data storage solutions, facilitating productivity and connectivity among dispersed teams.
Digital Transformation Acceleration: Recognising the increased need for digital services, we assist organisations in accelerating their digital transformation journeys. This involves migrating traditional services to the cloud, enabling them to offer their own customers more flexible and resilient services.
Educational Support: To address the surge in demand for online learning, we offer cloud-based learning platforms and tools that educational institutions can leverage to deliver high-quality education remotely. This includes solutions for virtual classrooms, online assessments, and resource sharing.
Healthcare Support: We support healthcare providers by offering cloud solutions that enhance their ability to deliver telehealth services, manage patient data securely, and scale their resources in response to fluctuating demands.
Economic Resilience: We're committed to supporting economic resilience by offering flexible pricing models and financial assistance programs for businesses affected by the pandemic, helping them to maintain their cloud services without financial strain.
Community Engagement: We engage with communities and non-profit organisations, providing technology resources and expertise to support recovery efforts, including initiatives aimed at bridging the digital divide and supporting vulnerable populations.
Our goal is to be a proactive partner in COVID-19 recovery, providing technology solutions that not only help organisations adapt to the new normal but also contribute to building a more resilient and inclusive future.Tackling economic inequality
In addressing economic inequality, we are committed to leveraging our cloud hosting and software services as tools for empowerment and opportunity creation. Our approach is centered on making technology accessible and beneficial for all segments of society, particularly those who are most vulnerable or have been traditionally underserved. Here’s how we contribute:
Accessibility and Affordability: We strive to ensure our services are accessible and affordable, offering scalable solutions that cater to the needs of small and medium-sized enterprises (SMEs), non-profits, and educational institutions. This includes flexible pricing models for qualifying organisations, enabling them to leverage technology to drive their missions forward.
Skills Development and Training: Recognising the importance of digital literacy in the modern economy, we offer training programs and resources aimed at developing the digital skills of individuals from disadvantaged backgrounds. By partnering with educational institutions and community organisations, we aim to close the skills gap and open up new opportunities for employment and entrepreneurship in the tech industry.
Supporting Social Enterprises: We actively support social enterprises and organisations working to tackle economic inequality through preferential access to our cloud and software services. This support extends to collaboration on projects that leverage technology to address social issues, such as unemployment, education, and access to healthcare.
Innovation for Inclusion: We invest in developing innovative solutions that address barriers to economic participation. This includes technologies that enhance financial inclusion, support remote work and education, and enable access to essential services for underserved populations.
Economic Opportunity Creation: Through our ecosystem of partners, customers, and suppliers, we seek to create economic opportunities by prioritising diversity and inclusion in our procurement processes and by fostering an environment where small and diverse businesses can thrive.Equal opportunity
Our dedication to promoting equal opportunity is woven into the fabric of our operations, services, and community engagements. We believe that technology has the power to level the playing field, providing access to information, resources, and opportunities that can transform lives regardless of background, location, or circumstance. Here’s our approach:
Diverse and Inclusive Hiring Practices: We are committed to fostering a diverse and inclusive workforce by implementing fair hiring practices that actively seek out and welcome candidates from a variety of backgrounds, including underrepresented groups. This diversity enriches our team with a wide range of perspectives and ideas, driving innovation and understanding of the diverse needs of our clients.
Workplace Equality: We ensure that all employees have equal access to opportunities for growth, development, and advancement. This includes creating a supportive work environment that respects and values each individual's contributions, and implementing policies that promote work-life balance, fair compensation, and professional development.
Technology Accessibility: Our cloud hosting and software services are designed with accessibility in mind, ensuring that individuals with disabilities have equal access to our technologies. This includes adherence to accessibility standards and guidelines, and providing tools and features that enhance usability for all users.
Community Programmes and Partnerships: We engage in community programmes and partnerships aimed at promoting equal opportunity in the technology sector and beyond. This includes supporting educational initiatives that provide technology access and digital literacy training to underserved communities, and collaborating with organisations that work towards social inclusion.
Supplier Diversity: We are committed to supplier diversity by ensuring that small and minority-owned businesses are given fair opportunities to participate in our procurement processes. This not only supports economic inclusion but also enriches our supply chain with a diversity of ideas and products.Wellbeing
In addressing wellbeing, we recognise the critical importance of mental and physical health, particularly in today’s fast-paced and often stressful work environments. Our approach to wellbeing is holistic, focusing on creating a supportive and healthy work culture for our employees, and extending this ethos to our clients and the communities we serve. Here’s how we contribute:
Employee Wellbeing Programmes: We implement comprehensive wellbeing programmes that support the mental, physical, and emotional health of our employees. These include access to mental health resources, such as counselling services and stress management workshops, as well as initiatives promoting physical health, like fitness classes and ergonomic workplace assessments. We believe that a healthy team is more engaged, productive, and innovative.
Flexible Working Arrangements: Recognising the diverse needs of our workforce, we offer flexible working arrangements to help employees balance their professional and personal lives. This flexibility includes options for remote work, flexible hours, and the provision for necessary breaks to recharge, contributing to a more sustainable work-life balance.
Healthy Work Environment: We strive to create a work environment that promotes wellbeing, including safe and comfortable physical spaces, a positive and inclusive culture, and opportunities for social connection and community building among employees.
Client and Community Support: Beyond our internal initiatives, we extend our commitment to wellbeing through the services and support we provide to clients and the wider community. This includes offering products and services that encourage healthy work practices and partnering with organisations focused on mental health and wellbeing.
Continuous Learning and Development: We believe in the wellbeing benefits of lifelong learning and professional development. Our programmes are designed to support continuous growth and development, reducing the risk of burnout and increasing job satisfaction by providing meaningful opportunities for advancement and skill enhancement.
Pricing
- Price
- £85.04 to £2,379.43 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No