Feature | On-demand (Advanced protection) | Always-on (Advanced protection) | Basic protection |
---|---|---|---|
Pricing model | Paid | Paid | Free |
Maximum time to recognize an attack | 2 minutes | 5 seconds | 3 minutes |
Attacks it protects from | • Common amplification attacks • IP spoofing attacks • Attacks using flows or volumetric attacks (L3) • Attacks to establish connection (L4) | • Common amplification attacks • IP spoofing attacks • Attacks using flows or volumetric attacks (L3) • Attacks to establish a connection (L4) • Attacks at the application layer (L5-L7) | • Common amplification attacks • IP spoofing attacks |
Protection technology | 1. The attack is detected. 2. Traffic is redirected to TMS. 3. TMS filters the traffic. 4. TMS sends legitimate traffic to the server. | 1. All traffic passes through TMS. 2. In case of an attack, TMS immediately filters the traffic. 3. TMS sends legitimate traffic to the server. | 1. Attack is detected. 2. The attacked IP is blocked for a while. |
Use cases | • Your server is rarely attacked • Your server is not attacked at the application layer (L7) • Your server doesn’t host any critical business applications | • Your server is attacked more than 2-3 times a day • Your server is attacked at the application layer (L7) • Your server hosts a critical business application | • Your server is hardly ever attacked • Your server doesn’t host any critical business applications |