Our Approach
GQI provides solutions to private and public organisations and helps them achieve their required cyber security outcomes. GQI specialises in reviewing IT Cyber Security and infrastructure, risk analysis, development of Cyber Security strategies and policies to meet your business’ privacy requirements.
Our Value Proposition
GQI’s cyber security services will examine your current environment and make recommendations not only based on industry best practices, but also your own business needs.
DDoS Protection
With the shift towards application layer DDoS and the emergence of IoT botnets and burst attacks we see that there are more failures because of pipe saturation (37% of cases compared to 25% last year), and the second point of failure is indeed the server.
Stateful devices come at third place with an aggregated 27% provoking the need for stateless DDoS mitigation solution at the perimeter.
Another interesting point is that the attacks are more targeted and more successful – more result in a complete outage rather than merely service degradation.
Hybrid Attack Mitigation
DDoS Protection, WAF & SSL Mitigation
Protecting applications hosted at the data center
- On-premise attack mitigation
- Cloud-based DDoS protection for volumetric attacks
- Fully managed service (optional)
Benefits:
- Always-On
- Real-Time Protection
- Lowest Latency
Cloud Security Services
DDoS Protection, WAF & SSL Mitigation in the Cloud
Protecting cloud-based applications
Protecting without on-premise device
- Cloud WAF Service
- Cloud DDoS Protection Services
Benefits:
- Always-On
- Real-Time Protection
- Simple, hassle free
Time-to-mitigate Throughout Attack Campaign
Mitigation provides automated mitigation to nearly all attack vectors. However, this real-time signature creation process can last up to 18 seconds. It takes 10 seconds to automatically create an initial signature to block the attack and an additional eight seconds to optimize it to eliminate false positives.
To protect the organization during this 10-second timespan when no signature is in place to block the attack, we deploy a multilayered approach to eliminate the exposure window and provide zero time to mitigation.