Kentik - Network Observability

DDoS Detection & Network Security

Detect DDoS. Neutralize attacks. Analyze and respond to incidents.

TAKE A TOUR

Detect DDoS attacks accurately and automate mitigation for ongoing DDoS protection. Find hosts compromised by botnets. Analyze attacks, breaches, and threats in real time and from historic data. Integrate with incident response tools to send alerts and initiate workflows.

GET A DEMO

DDoS protection and detection with Kentik

DDoS was the primary driver for selecting Kentik, and their integration into our DDoS automation solution has been exceptional. We’ve also benefited from Kentik in understanding our international traffic flows and security.

Rick Carter, Head of Networks
Superloop

Use case details

Mitigate DDoS attacks

Minimize customer impact and reduce operational burden. Automatically detect and neutralize DDoS attacks. Fine-tune rules to catch early signs of traffic spikes or anomalous traffic behavior. Use your own infrastructure to mitigate attacks via RTBH/Flowspec or integrate with threat mitigation providers like Cloudflare, Radware, and A10.

Mitigate DDoS attacks

Protect against botnets

Detect connections to known botnet command and control hosts on the internet. Analyze botnet traffic characteristics and trends over time. Alert on significant changes in threat traffic volume, routes and source geo-locations.

Protect against botnets

Analyze incidents in real time

Understand incident details and causes. Drill down into forensic analytics in real time or retroactively using months or years of granular network traffic data to gain understanding of the impact and attack profile. Maintain a strong security posture with a continuously updated multi-source threat database.

Analyze incidents in real time

Identify compromised hosts

Protect resources and data. Detect hosts using unexpected servers or services. Use historical data to see points of ingress and lateral movement of threats.

Identify compromised hosts

Keep routes safe

Secure BGP routing by instrumenting and tracking RPKI to validate secure traffic routes, detect leaks, and prevent BGP hijacking. Understand the impact of rejecting RPKI-invalids on traffic and fix issues before enablement.

Keep routes safe

Get network observability from Kentik.

We use cookies to deliver our services.
By using our website, you agree to the use of cookies as described in our Privacy Policy.