• Skip to primary navigation
  • Skip to main content
Carbon60

Carbon60

Unlock the Endless Power of Cloud

  • Show Search
  • Contact Us
  • Get Started
Hide Search
  • Outcomes
    • StrategyTurn your cloud vision into reality. We assess your IT, craft tailored strategies, and provide actionable recommendations for success.
      • Strategy
      • Cloud Assessment
      • Cloud Advisory
    • TransformationUnlock agility, scalability, and security with our comprehensive transformation services. We handle everything from cloud migration to managing your cloud infrastructure.
      • Transformation
      • Migration Services
      • Managed Infrastructure
        • Dedicated Private Cloud
        • Managed Hosting
        • Azure Operations
        • AWS Operations
        • Azure Virtual Desktop (AVD)
        • Edge Computing
    • ResilienceSafeguard your business with our robust IT resilience solutions. We provide security, compliance, and disaster recovery services to ensure business continuity.
      • Resilience
      • Security
        • Managed Detection & Response
        • Managed Security Awareness
        • Managed Risk
        • Incident Response Retainer
        • Web Application Firewall
        • SIEM
        • Endpoint Protection
        • Penetration Testing
        • Vulnerability Management
      • Compliance
      • Disaster Recovery
  • Services
    • Professional Services
      • Professional Services
      • Cloud Assessment
      • Cloud Advisory
    • Migration Services
    • Managed Infrastructure
      • Managed Infrastructure
      • Dedicated Private Cloud
      • Managed Hosting
      • AWS Operations
      • Azure Operations
      • Azure Virtual Desktop (AVD)
      • Edge Computing
    • Security
      • Security
      • Managed Detection & Response
      • Managed Security Awareness
      • Managed Risk
      • Incident Response Retainer
      • Web Application Firewall
      • SIEM
      • Endpoint Protection
      • Penetration Testing
      • Vulnerability Management
    • Compliance
    • Disaster Recovery
  • Partners
    • AWS
    • Azure
    • Google
    • VMware
  • Industries
    • Financial Services
    • Healthcare
    • Technology
    • Public Sector
  • Insights
    • Blog
    • Resources
    • Events
    • News
  • About
    • Leadership
    • Careers
    • About Carbon60
  • OpsGuru
  • C60 Digital

DDoS Mitigation Service

Denial of Service (DoS) and Distributed Denial of Service (DDoS)

DoS and DDoS attacks are a fact of life on the internet.  No site is immune and all business-critical sites should be proactive and implement the necessary steps to protect itself.  Carbon60 has taken a variety of proactive measures to harden its hosting solutions against the many forms of DoS and DDoS attacks used today.

DDoS Services

Our DoS mitigation strategy begins with a strict AUP that forbids us from hosting high-risk sites (e.g. gaming and adult sites) and high-risk activities (e.g. bulk-mailing).  This is important because living in a better neighborhood can help avoid being side-swiped by attacks.  For the same reason, we engineer significant overhead into our cloud infrastructure.  This overhead allows it to absorb reasonably large attacks without causing resource bottlenecks that can impact other customers.

Although we leverage public clouds, such as Azure and AWS, as part of our C60 cloud-of-clouds hosting infrastructure, our own cloud is semi-private, that is, only shared by a select customer-base.  For customers that require the greatest degree of isolation, we also support fully private cloud infrastructures.

Hardened DNS Services 

Currently, DNS is a favorite target of attackers.  Many organizations use their own DNS service for websites not realizing the associated risk.  Any publicly available DNS service must be specifically hardened to resist DOS attacks such as our own DNS services or the globally distributed DNS services of our partners.

Cloud Proxy Services 

The most effective DoS protection shields your web site/application using a hyper-scale proxy network to filter all requests before they even reach your hosting origin(s).  This shield works in a number of ways:

  • By “cloaking” your origin IPs from public knowledge and, thus, preventing any from direct attacks against your hosting origin(s).
  • By filtering out all non-Http/s requests which eliminates the threat of network-layer DDoS attacks;
  • By allowing you to proactively or reactively deny or redirect http/s requests from and IP or an entire country, or region;
  • And by offloading a high percentage of http/s requests through caching from your origin(s) thus making it more scalable to spikes in legitimate and illegitimate http/s requests.

WAF Services 

By layering on web application firewall (WAF) services onto a global proxy service you get the best DoS protection available.  WAF allows rate limiting policies to be applied to http/s requests.  WAF’s rate control policies can dynamically alert and/or block clients exhibiting excessive request rate behaviors.  These policies can be applied to incoming requests, requests forwarded to your hosting origin(s), or even responses from your origin(s).  WAF can respond to bursts of requests within seconds. Rate controls further protect customers by mitigating Slow POST DDoS attacks. POST requests are not sent to the origin until the POST body completes at the edge.  POST bodies that take too long to complete are terminated.

Detection and Mitigation 

Our network is monitored 24x7x365 for suspicious activity, including DoS attacks.  If proactive anti-DoS measures fail, then reactive measures can be taken to analyze and mitigate the attack.   This can be as simple as adjusting network or application firewall rules or working with its upstream Internet providers to stop an attack by null-routing traffic from the offending IPs or IP blocks.

Learn More

Related Cloud Resources and Insights

CrowdStrike Announcement

Global CrowdStrike Outage Impacting Services Update

July 19, 2024

Carbon60 Named a VMware Cloud Service Provider Pinnacle Tier Partner in the Broadcom Advantage Partner Program

April 3, 2024
International Women's Day

Elevating Women in Tech: Insights from OpsGuru’s Mency Woo

March 8, 2024
Read more blog posts
Carbon60
  • Strategy
    • Cloud Assessment
    • Cloud Advisory
  • Transformation
    • Migration Services
    • Managed Infrastructure
      • — Dedicated Private Cloud
      • — Managed Hosting
      • — Azure Operations
      • — AWS Operations
      • — Azure Virtual Desktop
      • — Edge Computing
  • Resilience
    • Security
      • — Managed Detection & Response
      • — Managed Security Awareness
      • — Managed Risk
      • — Incident Response Retainer
      • — Web Application Firewall
      • — SIEM
      • — Endpoint Protection
      • — Penetration Testing
      • — Vulnerability Management
    • Cloud Security & Compliance
    • Disaster Recovery
  • Industries
    • Financial Services
    • Healthcare
    • Public Sector
    • Technology
Follow us on LinkedIn Follow us on YouTube Follow us on YouTube

© Copyright Carbon60 2025

  • Privacy Policy
  • Terms & Conditions
  • Sustainability
  • Contact Us
Carbon60 uses cookies to provide necessary website functionality, improve your experience and analyze our traffic. By using our website, you agree to our Privacy Policy and our cookies usage.AcceptPrivacy Policy