Ampito

RedSpam DDoS Protection by Ampito

RedSpam provides True Dynamic Mitigation™ against Distributed Denial of Service (DDoS) attacks to ensure continuous uptime of online business assets.
employing 30+ different techniques to deliver custom mitigation templates tailored to each client and threat level.
RedSpam offers complete business continuity, aligning your IT strategy with simplified, proven, DDoS protection.

Features

  • We are dedicated to defending organisations from DDoS attacks
  • Use of our own mitigation technologies
  • Use of world class hardware and software solutions
  • true ISP and hosting company agnostic
  • Each PoP is located in safe and secure data centre

Benefits

  • 15 Minute mitigation instigation
  • Multiple Scrubbing ensuring minimal latency and flexible peering
  • Continual monitoring and analytics of traffic and mitigation of attacks
  • Fixed cost with no additional ‘overage’ or hidden extras
  • range of service packages to meet a range of budgets

Pricing

£10000 per megabyte per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

715322077573261

Ampito

Russell Bristow

087031521010

Russell.bristow@ampito.com

Service scope

Service scope
Service constraints Planned Maintenance is performed as and when the system requires it. A minimum of 7 days notice is provided to all effected users.
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our initial response will be within 15 minutes. SLA's will then vary dependant on the type of request.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Redspam provide a 24*7 service over the phone and email. All customers will be allocated a Sales and Technical Account Manager.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Customers are provided with a "on-boarding" document to be completed, which allows us to on-board customers onto the service.

We will work with the customer to complete the documentation and provide remote training on the service.

Customers are provided with a high and low level design document to provide an overview of the solution and the bespoke requirements for that customer.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction No customer data is stored.
End-of-contract process At the end of the contract term the monitoring of the customers network is suspended until the contract is renewed after a 30 day grace period, if the contract is not to be renewed, the customer is removed from the service. If a customer wishes to renew the service after this time, they will need to complete the "on-boarding" process.

Using the service

Using the service
Web browser interface Yes
Using the web interface The RedSpam portal is a read only view in to the service providing customer visability in to the normal day to day traffic seen in and outbound of the network. This gives users the ability to download reports based on traffic, applications, TCP and UDP ports plus much more. Further to this any attacks or alerts see can also be viewed on the portal along with our real-time mitigation page that provides users visability on how attacks are being dealt with live and discover the countermeasures used to block the attack. All reports on the portal can be downloaded for offline viewing. Along with the visability into your own network traffic there is also access in to your threat intelligence feed providing an insight on the attacks going on across the global.
Web interface accessibility standard None or don’t know
How the web interface is accessible The RedSpam portal is a read only view in to the service providing customer visibility in to the normal day to day traffic seen in and outbound of the network. This gives users the ability to download reports based on traffic, applications, TCP and UDP ports plus much more. Further to this any attacks or alerts see can also be viewed on the portal along with our real-time mitigation page that provides users visibility on how attacks are being dealt with live and discover the countermeasures used to block the attack. All reports on the portal can be downloaded for offline viewing. Along with the visibility into your own network traffic there is also access in to your threat intelligence feed providing an insight on the attacks going on across the global.
Web interface accessibility testing The web information has been designed to provide end users visibility in to there network traffic and changes/updates to the portal is tested before being launched and made live to customers.
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Automatic
Independence of resources RedSpam has mechanisms in place to ensure users are not impacted due to other customers being targeted for DDoS attacks. These include moving post DDoS mitigated subnets to 'peace time' ISP links which allows subnets that have been recently attacks and classed as highly likley to be attacked again on a dedicated link. Which allows our primary circuits to be used to scrub active DDoS threats.
Usage notifications Yes
Usage reporting
  • Email
  • Other

Analytics

Analytics
Infrastructure or application metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach RedSpam don’t keep customer payload data only flow meta data. All data is stored on our DDoS appliances access with strict user authentication controls.
Data sanitisation process Yes
Data sanitisation type Hardware containing data is completely destroyed
Equipment disposal approach In-house destruction process

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Network Traffic Statistics
  • Alert database
  • Mitigation database
  • Reports
Backup controls Backups are completed by RedSpam
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability This service is provided on a 24*7 basis, with a 15 minute mitigation response.

At the end of each Service Period, Provider shall provide a Service Level Report to show the actual service level provided during the Service Period concerned compared to the Service Performance Targets. The Service Level Reports shall be exception-based and shall each contain information in the following format:

General Availability Report

• Number of minutes/hours lost due to Unavailability;
• Relevant logs provided
• Percentage of Availability;
• Summary of each Incident causing Unavailability

Major Incident Report

In the event of Severity 1 & 2 Incidents a report will be produced by the owner of the relevant system or process concerned, which must contain the following information:

• Date and time of occurrence of Incident;
• Systems or processes affected;
• Summary of cause;
• Immediate actions taken to rectify; and
• Long term corrective or preventative action proposed, if applicable.
Approach to resilience The Redspam service is hosted across multiple datacentres with full disaster recovery. More details are available upon request.
Outage reporting Any outages are communicated via email.

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels A username and password is provided to customer granting access to our web portal providing visibility and reporting of traffic and attacks.
Access restriction testing frequency At least once a year
Management access authentication Username or password
Devices users manage the service through Dedicated device on a segregated network (providers own provision)

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Redspam are working towards ISO 270001.
Information security policies and processes Redspam are working towards ISO 27001

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Changes can be made by our accredited engineering team once a request has been made in writing and in accordance with our change control procedure.
All changes will be agreed and discuss and any impact this may have on the system or network logged and managed accordingly. Changes can be made to any current network or system configuration.

With Configuration Management, we will perform software configuration tasks on equipment from a remote management centre, thus removing a significant part of the everyday network maintenance burden from the customer.
Vulnerability management type Supplier-defined controls
Vulnerability management approach RedSpam completes various security checks including monthly patch release reviews and half yearly penetration tests of all external services. All external RedSpam services are protected by industry leading firewalls providing unified threat management, working closely with our partners and our own internal threat intelligence sources we ensure all known and protentional threats are blocked. If a critical patch for one of our systems is released a review process is conducted to determine the severity of the threat an emergency maintenance window is planned typically within 24 hours of release.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Immediately after our monitoring service detects a service-affecting event it will begin to diagnosis and attempt to resolve the condition. Within 15 minutes of detecting a fault the customer will be informed and told what action has been taken and whether any further action is required. Where faults occur out of hours we will agree the method of communication with the customer (if a 24 Hour service is provided).
Incident management type Supplier-defined controls
Incident management approach DDoS attack incidents are detected by the monitoring system and proactively handled. The process consists of notifying the customer following high alerts, redirecting the traffic to the RedSpam network and mitigating the attack using a range of mitigation countermeasures. During the mitigation of an attack any impact on legitimate traffic, performance issues or application related issues will be minimised by adjusting the configuration of the countermeasure being used to drop malicious traffic. The incident report outlines the findings of the investigation and the follow-up actions taken to prevent similar incidents from re-occurring in the future and to improve the service.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £10000 per megabyte per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A proof of concept trial is available for 30 calendar days which provides a full demonstration of the service and an insight into the processes and reporting functionality.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑