Corona Rescue Package

Cloudflare Pro (Managed)

Cloudflare Pro is a Fully Pro-Active Managed Solution with Built-in Web Application Firewall (WAF), 24x7x365 Service Uptime Monitoring, Role Based Access, Custom Dashboard and Caching.

Check out our Managed Cloudflare Pro Special Package Details, Features and Pricing

What is Fully Pro Active Managed Service?

In Fully Pro Active Managed Service, we will mitigate the DDoS attack and setup custom ruleset on your firewall once our monitoring system detects DDoS Attack without you having to initiate request. We do necessary configuration, setup, follow up on any outages and provide you reports - in short, help your service stay online.

What is Cloudflare Pro (Managed)?

Unlike regular Cloudflare Pro plan, the Managed Plan comes with Fully Pro-Active Managed round-the-clock support and service monitoring. With Cloudflare Enterprise features like Role Based Access, Extensive Reporting and a Custom Dashboard, the Managed Cloudflare Pro plan starts from a monthly price less than retail Cloudflare Pro price!

globe

How many locations does it cover?

The Cloudflare Pro (Managed) comes with CDN having 150+ Point of Presence (PoPs) globally giving your website visitors lowest latency & extensive caching thus enhancing performance.
infinity

How much data transfer is included?

With Unlimited Data Transfer, Cloudflare Pro offers security and performance through its global CDN. You will be billed a flat-rate irrespective of number of visitors on your website.
defense

What types of attacks are mitigated?

Cloudflare Pro (Managed) protects you from a multitude of attacks including OWASP Top 10 Vulnerabilities, Limited Application Layer 7 Attacks and hack attempts.
block

What ports are protected?

In order to keep your website protected and secure, Cloudflare Pro only allows traffic from Port 80 (HTTP) and Port 443 (HTTPS).

Are you under attack? We are here 24x7x365

Why choose Cloudflare Pro (Managed)?

If you're a fan of Cloudflare, then being on the Cloudflare Pro (Managed) Plan should be on your top must-have essentials. You get a host of more features in less price!

  • 24/7/365 Service Uptime Monitoring and Email Alerts
  • 24/7/365 Fully Pro-Active Managed Technical Support over Email & Live Chat
  • Role-Based Access for multiple users with Custom Dashboard & Permissions
  • Unbelievable Price, Even Lesser than Cloudflare Pro Retail [$15/mo in Corona Rescue Plan]

How Cloudflare Pro (Managed) works?

The process is pretty much seamless after you place the order. We'll give you instructions to update your DNS and let you know once your protection is ON and the Proactive Monitoring is Deployed.

  • We ask for your backend server IP and the domain name during order process
  • We provide you Name Servers or DNS Entries (CNAME) to update
  • You make the necessary changes and update us
  • Viola! Your protection is ON and your website is receiving clean traffic
 

Package

Managed CDN

CloudFlare Pro Plan Managed
$15/mo
Order Now
150+ POP Locations
Fully Pro Active Managed Service
Unmetered Data Transfer
Unlimited DDOS Attack Mitigation Capacity
HTTP / HTTPS Supported Protocol Only
80,443 Supported Ports
Protection against All kind of L4 DDOS Attacks
Limited Layer 7 Application DDOS Protection
24/7 Monitoring Included
24/7/365 Technical Support Included
Web Application Firewall
Custom Dashboard
Reporting
Role Base Access
Caching

What are some of the common DDoS Attacks we Protect you from?

Network Layer Attack (Layer 3)

A common type of Network Layer attack is "ICMP Flood" whereby attacker takes down the system through repeated "pings" (ICMP echo requests).

Transport Layer Attack (Layer 4)

The most common attack in Transport Layer is "UDP Flood Attack" which involves a taking down target server with UDP requests from large number of computer systems.

Session (Layer 5) & Presentation Layer Attack (Layer 6)

One of the most common Presentation Layer attack is "SSL exhaustion" whereby a large number of requests are sent to target host to force server to perform resource extensive process for setting up secure sessions.

Application Layer Attack (Layer 7)

A popular Application Layer Attack is "Slowloris" which involves sending a large number of simultaneous requests to target server timed carefully to avoid timeout thereby not leaving room for legitimate requests.

Accepted Payment Methods

Still not convinced?

Read what our current customers have to say about us.

Case Study: Middle East Airlines

A comprehensive case study on how BlockDoS was able to protect Lebanon Airline from complex DDoS attacks.

Download Now

DDoS Protection Overview

Website Performance, Reliability and Availability through Unlimited DDoS Protection

According to a research by CDNetworks, more than 54% of businesses were victim of DDoS Attacks in 2017 and even greater number is at risk in 2018. By leveraging on the vulnerabilities within hundreds and thousands of of insecure IoT (Internet of Things) devices, the creation of botnets and subsequent large-scale volumetric attacks is easier and more impactful than ever before. Besides massive scale DDoS Attacks, the focus of attacks is rapidly moving from network & transport layer to application layer 7 where the attacks are way more complex. This means that taking an application or a website offline would require lesser bandwidth and fewer resources resulting in greater disruption and impact on operations. DDoS attacks are able to hamper standard business operations by negatively affecting website availability and performance, sometimes even completely taking them offline. On average, the hourly cost of downtime due to network infrastructure failure is more than USD 100K/hr. One of the obvious side affect of similar attacks is loss of brand reputation, business and customers. In order to combat these complex, massively disruptive attacks, an intelligent, AI-powered scalable network is required which can combat every new type of attack. BlockDoS achieves this by using a global network with more than 150+ PoPs, data-driven intelligence to combat vulnerabilities and exploits and proven scalable unlimited DDoS protection.

Are you under attack? We are here 24x7x365


DDoS Attack Glossary

A thorough glossary which covers popular DDoS attacks and their mode of action
LAYER 3 - Network
ICMP Flood
ICMP Fragmentation
BGP Hijacking
LAYER 4 - Transport
IPSec Flood
UDP Flood
SYN Flood
LAYER 5 – Session / LAYER 6 - Presentation
SSL Exhaustion
Long Lived TCP sessions
DNS query floods
LAYER 7 - Application
Slowloris
Slow Post
Slow Read
HTTP/S Flood
CVE Attack Vectors
Layer 7 protocol floods (SMTP, DNS, SNMP, FTP, SIP)
Database Connection Pool Exhaustion
Resource Exhaustion
Large Payload POST requests
Mimicked user browsing

Are you under attack? We are here 24x7x365