Equinix Metal got you down? We are not going anywhere

./lsh-for-ddos

Stop people from stopping you

Protect your infrastructure without compromise

When attacks happen, your app can't afford downtime. Latitude.sh's enterprise-grade DDoS protection doesn't just detect threats — it eliminates them without impacting your performance.

It's nice to have a partner who's present, reliable, and can work with all over the world.

Introducing unmetered, highly available DDoS mitigation

Routing is not mitigating

Providers that don't have enough capacity will often change routes when you're suffering an attack. Instead of routing, Latitude.sh will mitigate, meaning no increase in latency for you.

No attack is too big

With 7 Tbps of capacity, Latitude.sh's scrubbing centers are equipped to handle any distributed attack, no matter its shape or form.

Included (and extensible)

All Latitude.sh servers offer mitigation of DDoS attacks at no extra cost, so you'll always be protected.

No matter the attack, we can handle it

Network level

  • TCP Flood
  • UDP Flood
  • ICMP Flood

Specially crafted packet

  • Stack
  • Protocol
  • Buffer

Fragmented packet

  • Overlapping
  • Missing
  • Too many

Reflective/amplified

  • DNS Flood
  • NTP Flood
  • SNMP Flood
  • SSDP Flood

Application layer

  • Repetitive GET
  • Slowloris
  • SlowRead

./managed-defense-mechanisms

Defend your apps, without lifting a finger

Our DDoS Protection service is fully managed. On top of traditional management features such as IP blocking, ACLs, null routes, blackholes, and unused ports disabling, it goes further with complete protection of layers 3, 4, and 7.

Per-packet protection

Protocol Analysis

  • Protocol validation per packet against RFC compliance

Access Control Lists

  • Layer 4 ACL GeoIP rules
  • RegEx Rules URL ACL
  • L7 keyword filtering

Trust Lists

  • Static white/black list
  • Dynamic trust list

Event Triggered protection

Layer 3/4 Flood Mitigation

  • Algorithm- based authentication
  • TCP stack connection authentication
  • Fragmentation

Layer 7 Flood Mitigation

  • Algorithm- based authentication
  • HTTPs protection
  • Advanced pattern matching
  • Watermark

Rate Limiting

  • IP behaviour control
  • Traffic control by IP port protocol

Ready to defend your infrastructure?