{"id":18653,"date":"2024-02-26T10:21:21","date_gmt":"2024-02-26T09:21:21","guid":{"rendered":"https:\/\/www.transparentedge.eu\/?page_id=18653"},"modified":"2026-05-14T12:58:29","modified_gmt":"2026-05-14T10:58:29","slug":"anti-ddos","status":"publish","type":"page","link":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/","title":{"rendered":"Anti-DDos"},"content":{"rendered":"\r\n\r\n<section id=\"apertura-productos-1-cuadro-91345\" class=\"apertura-productos-1-cuadro apertura-productos-1-cuadro\">\r\n\t\t\t<div class=\"image-deco\" id=\"apr-cdn-image-deco\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/01\/inicio_DDoS.svg\" alt=\"ataque DDoS\" \/>\t\t<\/div>\r\n\t\t<div class=\"container\">\r\n\t\t<div class=\"inner\">\r\n\r\n\t\t\t<div class=\"row-card\" id=\"apr-cdn-row-card\">\r\n\t\t\t\t<div class=\"main-card ancho\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"pre-title\"><p>Mitigate largest and most complex attacks<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<h1>\r\n\t\t\t\t\t\t<p>DDoS protection at the edge<\/p>\n\t\t\t\t\t<\/h1>\r\n\t\t\t\t\t<div class=\"text\">\r\n\t\t\t\t\t\t<p>The scale and sophistication of distributed denial-of-service (DDoS) attacks is growing, in some cases taking on a multi-vector approach. These types of threats expose websites and applications to downtime and\/or reduce the performance of websites and applications to the point of knocking companies of all sizes and nature out of the game.<\/p>\n<p>Anti-DDoS is nowadays a key resource to protect the digital infrastructure of any online business, guarantee high levels of activity even during an attack, avoiding financial losses and reputational damage.<\/p>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"wrapper-button\">\r\n\t\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/contact\/\"  class=\"button white-button with-arrow\">Talk to an expert<\/a>\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"wrapp-image\" id=\"apr-cdn-img-1\">\r\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/02\/Antiddos-scaled.jpg\" alt=\"antiddos\" \/>\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\r\n\r\n\t\t\t<div class=\"row-grid\" id=\"apr-cdn-row-grid\">\r\n\t\t\t\t<div class=\"inner-row-grid\">\r\n\r\n\t\t\t\t\t<div class=\"left\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"figure\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/02\/antiddos2-scaled.jpg\" alt=\"Anti-DDoS\" \/>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t<div class=\"rigth\" id=\"apr-cdn-row-grid-right\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"item-text\">\r\n\t\t\t\t\t\t\t\t<h2>A strong and effective defense<\/h2>\r\n\t\t\t\t\t\t\t\t<div class=\"wrapp-text\">\r\n\t\t\t\t\t\t\t\t\t<p>Our state-of-the-art technology cleans up malicious traffic at the edge, preventing it from getting close to the origin and ensuring that legitimate traffic is not affected.<\/p>\n<p>Transparent Edge successfully solves the challenges posed by Denial-of-Service (DDoS) attacks at layers 3 and 4 in terms of web service disruption. When it comes to in-app attacks, we offer specialized layer 7 capabilities.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\r\n\t\t\t<\/div>\r\n\r\n\r\n\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t<div class=\"popup-image\">\r\n\t\t<span class=\"close\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/themes\/transparent-edge-new\/assets\/img\/close.png\" alt=\"\">\r\n\t\t<\/span>\r\n\t\t<img decoding=\"async\" class=\"img-dash\" src=\"\" alt=\"\">\r\n\t<\/div>\r\n<\/section>\n\n\r\n\r\n<section id=\"certificados-98495\" class=\"certificados certificados\">\r\n\r\n    <div class=\"decor-1\">\r\n        <img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/themes\/transparent-edge-new\/assets\/img\/decorative-security_1.svg\"  alt=\"\">\r\n    <\/div>\r\n\r\n\t<div class=\"container\">\r\n\t\t<div class=\"inner-certificados\">\r\n\t\t\t<div class=\"header-title\">\r\n\t\t\t\t<h2>\r\n\t\t\t\t\tOur Anti-DDoS solutions\n\t\t\t\t<\/h2>\r\n\t\t\t\t\r\n\t\t\t<\/div>\r\n                            <div class=\"wrapp-certificados\">\r\n                                            <div class=\"certificado\">\r\n                            <div class=\"wrapp-image\">\r\n                                                            <\/div>\r\n                            <div class=\"title\">\r\n                                Anti-DDoS in layers 3 &#038; 4                            <\/div>\r\n                            <div class=\"wrapp-text\">\r\n                            <p>Anti-DDoS protection is built into our CDN and is always on. Detects and mitigates attacks in seconds, keeping latency low:<\/p>\n<ul>\n<li>Flood of SSL, UDP, GRE-IP UDP, SYN, TCP RST, TCP CONNECT() and TCP ACK negotiation<\/li>\n<li>Amplificaci\u00f3n de DNS, NTP,<br \/>\nCharGEN, Memcache, SSD, SNMP<\/li>\n<li>Tsunami SYN<\/li>\n<li>Fragmentation and CLDAP attacks<br \/>\nARMS (ARD)<\/li>\n<li>Jenkins<\/li>\n<li>DNS Dropper<\/li>\n<li>CoAP<\/li>\n<li>WS-DD<\/li>\n<li>NetBIOS<\/li>\n<\/ul>\n                            <\/div>\r\n                        <\/div>\r\n                                            <div class=\"certificado\">\r\n                            <div class=\"wrapp-image\">\r\n                                                            <\/div>\r\n                            <div class=\"title\">\r\n                                Anti-DDoS at layer 7                            <\/div>\r\n                            <div class=\"wrapp-text\">\r\n                            <p>This additional functionality helps mitigate volumetry attacks targeting the web service exposed to the internet:<\/p>\n<ul>\n<li>Flood of HTTP\/S, login, session, and content requests<\/li>\n<li>DNS Amplification<\/li>\n<li>Brute Force Attacks<\/li>\n<li>Slowlories<\/li>\n<\/ul>\n                            <\/div>\r\n                        <\/div>\r\n                                    <\/div>\r\n            \t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"tarjetas-icono-titulo-19862\" class=\"tarjetas-icono-titulo\" >\r\n\t<div class=\"full-container\">\r\n\t\t<div class=\"container\">\r\n\t\t\t\t\t\t\t<div class=\"cards grid-to-slider-mobile\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/08\/aqua_icono_21_3x-150x150.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>Customization<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>You can configure real-time rules using VCL to examine and block requests based on any attribute: geographic areas, headers, cookies, IPs, etc. This functionality allows you to tailor the solution to the nature of each website or API.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/08\/aqua_icono_21_3x-150x150.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>Expert Support<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>Keeping up with the evolution of DDoS attacks is complex and time-consuming. At Transparent Edge we deal with hundreds of them and our team of experts is 100% up-to-date. That&#8217;s why they&#8217;re always available to provide a knowledgeable, fast, and effective response.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"card\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon normal\" >\r\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/08\/aqua_icono_20_3x-150x150.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"title\"><p>Real-Time Visibility<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\"><p>Our technology performs a thorough traffic analysis to identify malicious patterns and anomalous behavior, enabling a proactive response to potential threats.<\/p>\n<\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\r\n\r\n\t\t\t\t\t\t\t<div class=\"wrapper-button\">\r\n\t\t\t\t\t<a href=\"https:\/\/www.transparentedge.eu\/en\/contact\/\"  class=\"button with-arrow\">Talk to an expert<\/a>\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\t\r\n\t<\/div>\r\n\t\r\n<\/section>\n\n\r\n\r\n<section id=\"funcionalidades-sin-pestanias-84642\" class=\"funcionalidades-sin-pestanias funcionalidades-sin-pestanias\">\r\n\t<div class=\"image-deco funcionalidades-cdn-img-deco-1\" >\r\n\t<\/div>\r\n\t<div class=\"container\">\r\n\t\t<div class=\"wrapp-funcionalidades\">\r\n\t\t\t<div class=\"main-title\">\r\n\t\t\t\t<h2>\r\n\t\t\t\t\tKey Functionalities\n\t\t\t\t<\/h2>\r\n\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t<div class=\"wrapp-tabs\">\r\n\t\t\t\t\t<div class=\"tab-content\">\r\n\r\n\t\t\t\t\t\t\t<div class=\"item-tab-content\" >\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"right col-1\" style=\"background-image: url(https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2025\/12\/hero-home-bg-mobile.png); \">\r\n\t\t\t\t\t\t\t\t\t<div class=\"right-content\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"title-tab\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"wrapp-lists-functions\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col list-functions\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<ul>\n<li>Real-Time Analytics<\/li>\n<li>Log Delivery<\/li>\n<li>Integrated with our CDN and integrable with others<\/li>\n<li>Configurable via VCL<\/li>\n<li>Machine learning<\/li>\n<li>Sending Custom Notifications<\/li>\n<li>Continuous Optimization<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<h2 class=\"wp-block-heading espacio-header has-text-color has-link-color wp-elements-f3d846ecad3c4def612eb35ecd498bbb\" style=\"color:#00a5a6;font-size:32px;font-style:normal;font-weight:400;text-transform:uppercase\">FAQ<\/h2>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-1&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading has-text-color has-link-color wp-elements-aae567fbf6ef00c3322900bd5d797f85\" style=\"color:#00a5a6;font-style:normal;font-weight:400\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-1-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-1\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Which layers of the network model does anti-DDoS protection cover?<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-1\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-1-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p class=\"has-text-color has-link-color \" style=\"color: #002643; font-size:16px; font-weight:500; line-height:1.5; width: 85%; margin-bottom: 30px;\">It covers layers 3, 4, and 7. At layers 3 and 4, it mitigates volumetric attacks such as SYN floods, UDP floods, DNS amplification, and packet fragmentation. At layer 7, it filters application-level attacks such as HTTP floods, login form attacks, brute-force attacks, and slowloris attacks.\n<\/p>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-2&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading has-text-color has-link-color wp-elements-6b52802d1801444038568b6ef1ceebc8\" style=\"color:#00a5a6;font-style:normal;font-weight:400\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-2-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-2\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">How long does it take for the system to detect and mitigate a DDoS attack?<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-2\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-2-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p class=\"has-text-color has-link-color \" style=\"color: #002643; font-size:16px; font-weight:500; line-height:1.5; width: 85%; margin-bottom: 30px;\">Detection is automatic and occurs in seconds. Volumetric attacks (layers 3 and 4) are mitigated immediately within the Transparent Edge network, before malicious traffic reaches your origin server. Layer 7 attacks require traffic pattern analysis, which also runs in real time.\n<\/p>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-3&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading has-text-color has-link-color wp-elements-1427bf9de3faa650ed2e32c075bb5034\" style=\"color:#00a5a6;font-style:normal;font-weight:400\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-3-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-3\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Does anti-DDoS protection affect site performance when there is no ongoing attack?<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-3\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-3-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p class=\"has-text-color has-link-color \" style=\"color: #002643; font-size:16px; font-weight:500; line-height:1.5; width: 85%; margin-bottom: 30px;\">Legitimate traffic flows normally. Protection is continuously active, but analysis is performed at the edge without adding any perceptible latency. The system only actively intervenes when it detects anomalous patterns, deploying an Under Attack Mode.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-4&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading has-text-color has-link-color wp-elements-03821bda8dfa8112136ed66babae078c\" style=\"color:#00a5a6;font-style:normal;font-weight:400\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-4-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-4\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">What happens if I receive an attack during the night or outside of working hours?<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-4\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-4-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p class=\"has-text-color has-link-color \" style=\"color: #002643; font-size:16px; font-weight:500; line-height:1.5; width: 85%; margin-bottom: 30px;\">Mitigation is automatic and operates 24\/7 without manual intervention. When an attack is detected, Under Attack Mode is automatically activated to filter malicious traffic while maintaining access for legitimate users. You can view incident details, applied actions, and the mitigation status at any time from the control panel.\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\"><\/div>\n<\/div>\n\n\n\r\n\r\n<section id=\"modulo-destacado-descarga-28386\" class=\"modulo-destacado-descarga modulo-destacado-descarga\"  >\r\n\t<div class=\"full-container\">\r\n\t\t<div class=\"inner\">\r\n\t\t\t<div class=\"wrapp-image\">\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.transparentedge.eu\/wp-content\/themes\/transparent-edge-new\/assets\/img\/download-icon.png\" alt=\"download\">\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"data\">\r\n\t\t\t\t<h3>Anti-DDoS solutions that really works<\/h3>\r\n\t\t\t\t<p>\r\n\t\t\t\t\tDownload now the product sheet\t\t\t\t<\/p>\r\n\t\t\t\t<div class=\"wrapper-button\">\r\n\t\t\t\t\t<a href=\"https:\/\/eu1.hubs.ly\/H0gM7jz0\" target=\"_blank\" class=\"button white-button with-arrow\">Download<\/a>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\t\r\n\t<\/div>\r\n<\/section>\r\n\r\n<div class=\"popup\" id=\"download-popup\">\r\n\t<div class=\"inner\">\r\n\t\t<a href=\"#\" class=\"close-popup\"><\/a>\r\n\t\t<div class=\"title\">DESCARGAR DOCUMENTO<\/div>\r\n\t\t<div class=\"text\">\r\n\t\t\tLorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco.\r\n\t\t<\/div>\r\n\t\t<div class=\"wrapper-form\">\r\n\t\t\t<noscript class=\"ninja-forms-noscript-message\">\n\tNotice: JavaScript is required for this content.<\/noscript>\nNo Fields Found.<div id=\"nf-form-3-cont\" class=\"nf-form-cont\" aria-live=\"polite\" aria-labelledby=\"nf-form-title-3\" aria-describedby=\"nf-form-errors-3\" role=\"form\">\n\n    <div class=\"nf-loading-spinner\"><\/div>\n\n<\/div>\n        <!-- That data is being printed as a workaround to page builders reordering the order of the scripts loaded-->\n        <script>var formDisplay=1;var nfForms=nfForms||[];var form=[];form.id='3';form.settings={\"ninjaForms\":\"Ninja Forms\",\"changeEmailErrorMsg\":\"Please enter a valid email address!\",\"changeDateErrorMsg\":\"Please enter a valid date!\",\"confirmFieldErrorMsg\":\"These fields must match!\",\"fieldNumberNumMinError\":\"Number Min Error\",\"fieldNumberNumMaxError\":\"Number Max Error\",\"fieldNumberIncrementBy\":\"Please increment by \",\"fieldTextareaRTEInsertLink\":\"Insert Link\",\"fieldTextareaRTEInsertMedia\":\"Insert Media\",\"fieldTextareaRTESelectAFile\":\"Select a file\",\"formErrorsCorrectErrors\":\"Please correct errors before submitting this form.\",\"formHoneypot\":\"If you are a human seeing this field, please leave it empty.\",\"validateRequiredField\":\"This is a required field.\",\"honeypotHoneypotError\":\"Honeypot Error\",\"fileUploadOldCodeFileUploadInProgress\":\"File Upload in Progress.\",\"fileUploadOldCodeFileUpload\":\"FILE UPLOAD\",\"currencySymbol\":\"&euro;\",\"fieldsMarkedRequired\":\"Fields marked with an <span class=\\\"ninja-forms-req-symbol\\\">*<\\\/span> are required\",\"thousands_sep\":\",\",\"decimal_point\":\".\",\"siteLocale\":\"en_US\",\"dateFormat\":\"d\\\/m\\\/Y\",\"startOfWeek\":\"1\",\"of\":\"of\",\"previousMonth\":\"Previous Month\",\"nextMonth\":\"Next Month\",\"months\":[\"January\",\"February\",\"March\",\"April\",\"May\",\"June\",\"July\",\"August\",\"September\",\"October\",\"November\",\"December\"],\"monthsShort\":[\"Jan\",\"Feb\",\"Mar\",\"Apr\",\"May\",\"Jun\",\"Jul\",\"Aug\",\"Sep\",\"Oct\",\"Nov\",\"Dec\"],\"weekdays\":[\"Sunday\",\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\"],\"weekdaysShort\":[\"Sun\",\"Mon\",\"Tue\",\"Wed\",\"Thu\",\"Fri\",\"Sat\"],\"weekdaysMin\":[\"Su\",\"Mo\",\"Tu\",\"We\",\"Th\",\"Fr\",\"Sa\"],\"recaptchaConsentMissing\":\"reCaptcha validation couldn&#039;t load.\",\"recaptchaMissingCookie\":\"reCaptcha v3 validation couldn&#039;t load the cookie needed to submit the form.\",\"recaptchaConsentEvent\":\"Accept reCaptcha cookies before sending the form.\",\"embed_form\":\"\",\"currency_symbol\":\"\",\"title\":\"\",\"beforeForm\":\"\",\"beforeFields\":\"\",\"afterFields\":\"\",\"afterForm\":\"\"};form.fields=[];nfForms.push(form);<\/script>\n        \t\t<\/div>\r\n\t<\/div>\r\n<\/div>","protected":false},"excerpt":{"rendered":"<p>FAQ<\/p>\n","protected":false},"author":18,"featured_media":18439,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-18653","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anti-DDos - Transparent Edge<\/title>\n<meta name=\"description\" content=\"Transparent Edge successfully solves the challenges posed by Denial-of-Service (DDoS) attacks at layers 3, 4 and 7\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anti-DDos - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"Transparent Edge successfully solves the challenges posed by Denial-of-Service (DDoS) attacks at layers 3, 4 and 7\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-14T10:58:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/02\/antiddos2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/\",\"name\":\"Anti-DDos - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/antiddos2-scaled.jpg\",\"datePublished\":\"2024-02-26T09:21:21+00:00\",\"dateModified\":\"2026-05-14T10:58:29+00:00\",\"description\":\"Transparent Edge successfully solves the challenges posed by Denial-of-Service (DDoS) attacks at layers 3, 4 and 7\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/antiddos2-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/antiddos2-scaled.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"Anti-DDoS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/anti-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anti-DDos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anti-DDos - Transparent Edge","description":"Transparent Edge successfully solves the challenges posed by Denial-of-Service (DDoS) attacks at layers 3, 4 and 7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/","og_locale":"en_US","og_type":"article","og_title":"Anti-DDos - Transparent Edge","og_description":"Transparent Edge successfully solves the challenges posed by Denial-of-Service (DDoS) attacks at layers 3, 4 and 7","og_url":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/","og_site_name":"Transparent Edge","article_modified_time":"2026-05-14T10:58:29+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/02\/antiddos2-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/","url":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/","name":"Anti-DDos - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/02\/antiddos2-scaled.jpg","datePublished":"2024-02-26T09:21:21+00:00","dateModified":"2026-05-14T10:58:29+00:00","description":"Transparent Edge successfully solves the challenges posed by Denial-of-Service (DDoS) attacks at layers 3, 4 and 7","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/en\/anti-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/02\/antiddos2-scaled.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/02\/antiddos2-scaled.jpg","width":2560,"height":1440,"caption":"Anti-DDoS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/en\/anti-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Anti-DDos"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/18653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=18653"}],"version-history":[{"count":9,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/18653\/revisions"}],"predecessor-version":[{"id":23127,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/pages\/18653\/revisions\/23127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/18439"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=18653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}