Unavailability of services is a major risk for any company. More and more DDoS attacks are the cause.

For more than 10 years, we have been protecting our customers' data specifically against these attacks. Benefit from our experience.

aixit offers its customers the Arbor Peakflow SP product line as an efficient protection against DDoS attacks.

By using the Arbor Peakflow platform, aixit is able to offer managed DDoS services to its data center customers.

Arbor Peakflow SP already protects more than 80 percent of the world's Internet service providers from DDoS or worm traffic attacks.

Attack Vectors
Controlled Filtering
Advanced Support

DDoS-Protection by Arbor

Arbor Networks, a leading provider of backbone infrastructure security solutions, uses its threat management systems to protect aixit's Frankfurt Datacenter and our customers from unwanted attacks.

aixit deploys the entire Arbor Peakflow SP product suite for enhanced network security, traffic engineering and managed security services.

By leveraging the Arbor Peakflow platform, aixit is one of the first German provider to offer managed DDoS services to its Datacenter customers.

The Peakflow platform builds on Arbor's years of experience helping ISPs deliver managed security services. Here, the integrated DDoS detection service enables cost-effective DDoS protection and detailed analysis of attacks.

DDoS protection includes a flow sensor component that cost-effectively provides visibility and security across an ISP's or carrier's Internet backbone.

aixit has also implemented the Threat Management System (TMS) component for carrier-grade deep packet inspection, so security threats can be prevented quickly and intelligently. The Peakflow SP platform is distinguished by its ability to detect, analyze and defend against threats across entire ISP networks.


"As the first German hosting company to offer managed security services, aixit is in a fantastic position to use the Peakflow platform to solve its customers' long-term problems and generate new revenue streams."

Michael Tullius, Territory Manager Germany/Switzerland at Arbor

DDoS analysis and defense

For attack detection, the netflow sent by our routers is analyzed in real time. Flow data, SNMP and BGP updates are used to learn the normal network and routing behavior of routers and interfaces. Then, traffic patterns are matched with topology data to create logical data models.

Using this data, the system notifies our staff and customers of any significant changes in the network. These can be DDoS attacks, misconfigurations or device failures, and also include long-term impacts due to changes in data traffic.

Our complete solution, provides detailed information, is scalable and ensures network availability so that threats to network integrity are effectively contained.

To ensure customer satisfaction and the best possible performance of applications such as HTTP, VoIP and DNS, we provide our customers with visibility into key metrics such as jitter, latency, network round-trip time (RTT), delays (DEL) and packet loss.

Defense includes all methods and techniques to mitigate the negative impact of DDoS attacks. For this purpose, the data stream is filtered to allow only desired traffic through.

With this solution, aixit can detect attacks at the network and application level and eliminate attack traffic while maintaining regular traffic.