CloudDC proudly offers telecommunication services specially selected for quick and reliable work with our cloud infrastructure.
With guaranteed bandwidth, this option is perfect for the clients who need a specific amount of internet bandwidth set aside exclusively for their needs. CloudDC guarantees the amount of bandwidth stipulated in the contract where the client specified his particular limits.
For clients who don’t need bandwidth 100% reserved for their needs, we also offer unguaranteed bandwidth, which is much less financially demanding than its guaranteed twin.
Access to the traffic exchange point (MSK IX or other IXs) and other operators.
Management of a separate channel to the traffic exchange point/ISP
Clients win big here because traffic to the internet plus the cost of a channel to an IX is cheaper than traffic on a remote point of presence, and the connectivity is light-years ahead.
Cooperation with RIPE NCC, IPv4/v6 Address Space Registration, Automated Systems (AS) and Their Support
CloudDC holds LIR status in RIPE NCC, so we are thus authorized to represent the interests of our clients in this organization, including to query resources, and account for and support the client’s existing resources in their current state. This service is perfect for anyone who wants to launch his own AS and public address space, but doesn’t have the ability/resources to do so independently.
DDoS protection protects client resources from DDoS attacks
BGP FlowSpec is great for clients who are familiar working with the FlowSpec protocol. An expanded BGP protocol that blocks ip:port combinations on networks ranking higher than the providers successfully prevents malicious traffic from entering the client’s network and helps avoid channel overloads.
The DDoS Qrator protection service is the best possible option for clients who need their resources to be under constant protection. All traffic up to the protected resource must go through Qrator’s filtering center.
The DDos Kaspersky protection service is very much similar to Qrator. The biggest difference is that its traffic typically does not pass through the filtering center. First, a special sensor spots the start of an attack, then the flow of traffic is transferred to the filtering center.
Network Infrastructure (Safety) Audit
Audits are used to detect the vulnerabilities, errors and rights of entry in software and hardware settings that open up the system to intrusion, emergency and information theft risks. With this method, we can evaluate the current state of the client’s infrastructure and make an informed decision on the most pressing safety policy and modernization issues. Clients seek this service if they want to assess the quality of their network infrastructure, but they either don’t have the ability/resources to do it themselves, or they want the opinion of an independent company.