5 minutes reading
How it works
Why the NISPS is so special?
Logs analytics

Every customer gets full Magnifier capabilities for each website.

Log data is a definitive record of what's happening in every business, organization or agency and it's often an untapped resource when it comes to troubleshooting and supporting broader business objectives.

Magnifier allows you to do search among all requests that are passing NISPS network. You will be able to perform search as well as download search results for automated or hand made analysis in JSON format. With NISPS Magnifier it is easy to dig into logs history and find requests that resulted in 404 Not Found response, which is crucial for any e-commerce business. Also you can look for any other response statuses that you are interested in. Like this you will be able to check if your site has 5xx errors and what exactly pages are not working.

We provide detailed graphs on response codes, number of requests, backend reply speed, number of threats and robots activities. Each graph is customizable and you can select any time period for graph generation. It is easy to correlate graphs with each other, as all of them are placed on one page.

With live graphs you will be able to see what is currently happening on your site, instantly get details of your Advertising company and see how traffic of your site is growing. Also in case of updates on your site or deployment new features you will be able to see if site is working fine, or returning error pages to your visitors, and react instantly on problems. Live graphs show last 30 minutes of your website traffic with updates every few seconds, no need to click anything or refresh page. Just open live graphs and enjoy your site traffic growing.

NISPS Tests & Notifications system allows you to do periodic retrospective analysis more easy. We provide two types of reports:

Weekly reports: This report is generated once per week on Monday and doing retrospective look back for period up to 12 weeks. We calculate weekly statistics on your website, based on Apdex index. Apdex (Application Performance Index) is an open standard developed by an alliance of companies. Its purpose is to convert measurements into insights about user satisfaction, by specifying a uniform way to analyze and report on the degree to which measured performance meets user expectations.

Apdex is a measure of response time based against a set threshold. It measures the ratio of satisfactory response times to unsatisfactory response times. The response time is measured from an asset request to completed delivery back to the requestor.

The website owner defines a Apdex target time T. All responses handled in T or less time satisfy the user.

For example, if T is 1.2 seconds and a response completes in 0.5 seconds, then the user is satisfied. All responses greater than 1.2 seconds dissatisfy the user.

You can easily configure Apdex target time in your control panel.

Configurable periodic reports: We do periodic comparison of your latest website statistics with historical data, and if there is significant change - we will notify you. You can configure thresholds and periods of comparison in your control panel for every domain.

This reports can cover backend response speed, HTTP response codes with errors (4xx and 5xx), number of threats stopped by NISPS Membrane, number of requests from search engines.

With NISPS Magnifier you will always be aware on what is happening on your website, how satisfied are your users and in case of problems it will be easy to find them and eliminate.




Bouncer DDoS protection

A Denial-of-Service attack (DoS attack) is a cyber-attack where the criminal seeks to make a website unavailable to its intended users by temporarily or constantly disrupting services of a website. Denial of service is typically accomplished by flooding the targeted machine or resource with huge number of requests in an attempt to overload systems and prevent some or all legitimate requests from being answered.

In a Distributed Denial-of-Service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources.

A DoS or DDoS attack is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations.

NISPS Bouncer DDoS protection is able to detect attack in automated mode and start mitigation in matter of seconds. This helps to keep underlying website under protection from DDoS attack of any size and complexity. NISPS can be used to protect website from attacks of any layer L3-L7: Syn/Ack floods, ICMP, UDP and DNS amplification attacks and any kind of Layer 7 attacks.

We include DDoS protection in all our tariff plans based on flat rate: we believe, that you must not pay for attack traffic, independent on attack size, duration or complexity. With NISPS Bouncer DDoS protection you can concentrate on developing your business and trust protection of your website to professionals.


Attack types:

Connection Attacks: These attacks attempt to use up all the available connections to infrastructure devices such as load-balancers, firewalls and application servers. Even devices capable of maintaining state on millions of connections can be taken down by these attacks. Our multi-layered network is set up to mitigate this attacks in few steps, reducing volume of attack on each step, so your infrastructure is safe when NISPS is connected.

Volumetric Attacks: These attacks attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion. For example if your network has capacity of 10Gbps and attack is 11Gbps - your visitors will not be able to access website. NISPS network has capacity more than 1Tbps, and largest attack in the Internet history reached just 0.6Tbps.

Application Attacks: These attacks attempt to overwhelm a specific aspect of an application or service and can be effective even with very few attacking machines generating a low traffic rate (making them difficult to detect and mitigate). NISPS system detects requests that offend certain rules and may harm your application performance, and then performs additional checks to ensure that legitimate traffic or web spiders are not blocked.

DNS Reflection: By forging a victim's IP address, an attacker can send small requests to a DNS server and ask it to send the victim a large reply. This allows the attacker to have every request from its botnet amplified as much as 70x in size, making it much easier to overwhelm the target. NISPS network is desined to cut this traffic at the origin network level, so we dont even receive such requests in our datacenter.




Membrane Web application firewall

NISPS Membrane is modern Machine Learning based part of infrastructure that we deliver to every our customer.

With Membrane you will be sure that your website is protected from OWASP TOP threats. We apply our knowledge and machine learning to find out and prevent access to your website big variety of automatic scanners, posters and spam bots. Additionally we have carefully crafted number of rules that monitor every request to your website and stop malicious requests before they are able to harm your business or your visitors.

NISPS Membrane prevents such threats as SQL, XSS injections and some other significant threats that may lead to data leaks.

We use machine learning to find suspicious requests and create rule sets for protection of your website.

Additionally with help of Membrane you are able to whitelist/block or challenge any visitor based on his IP, ASN or Country.


Bad actors lockdown
Bad Actor
NISPS
Blocked
Normal visitors meets no interuptions
Lovely Visitor
NISPS
Transparent Access
This site was made on Tilda — a website builder that helps to create a website without any code
Create a website