{"id":91,"date":"2019-03-08T22:22:31","date_gmt":"2019-03-08T20:22:31","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=91"},"modified":"2020-05-31T01:40:21","modified_gmt":"2020-05-30T23:40:21","slug":"top-10-ddos-protection-companies","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/","title":{"rendered":"Top 10 DDoS Protection Companies"},"content":{"rendered":"<p style=\"text-align: justify;\">Distributed Denial of Service (DDoS) is a type of attack that involves using multiple compromised networks to target a single website. Hackers execute\u00a0DDoS attacks by hijacking unprotected computers and installing malware. By using thousands of these &#8220;bots&#8221; or &#8220;zombie computers,&#8221; hackers target a single web-based application or website, flooding it with a huge volume of traffic and causing the target to become unavailable to legitimate users.<\/p>\n<p style=\"text-align: justify;\">Recently,\u00a0<strong>DDoS protection<\/strong>\u00a0has become increasingly difficult as\u00a0DDoS attacks have now become sophisticated.\u00a0<strong>DDoS attackers<\/strong>have moved their focus from the network and transport layers to the application layer, where\u00a0DDoS protection\u00a0is difficult to maintain. Exponential growth is seen in the size of attacks, and most enterprises lack the capital resources to scale their security programs to provide suitable\u00a0DDoS protection.<\/p>\n<p style=\"text-align: justify;\"><strong>Let\u2019s look at the top 10 companies providing\u00a0DDoS protection:<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>1.Comodo cWatch<\/strong><br \/>\ncWatch is a\u00a0<strong>Managed Security Service<\/strong>\u00a0for web applications and websites \u2013 which means they handle all the security measures on your behalf. As the most affordable on our list, it is available with a Web Application Firewall (WAF) provisioned over a\u00a0<strong>Secure Content Delivery Network (CDN)<\/strong>. If your website is affected by a\u00a0<strong>DDoS attack<\/strong>,\u00a0<strong>Comodo<\/strong>\u00a0will know it even before you do. cWatch\u2019s team of cyber experts monitor your website 24\/7. Should an attack occur, Comodo\u2019s\u00a0<strong>Cyber Security Operation Center<\/strong>(CSOC) team leverages cyber technology and immediately acts to prevent the attack, while providing you with a detailed post-event forensic report. They leverage its\u00a0<strong>WAF\u2019s<\/strong>\u00a0virtual patching and hardening engines to offer real-time threat mitigation without impacting your site. Their\u00a0<strong>free plan<\/strong>\u00a0offers lite\u00a0<strong>DDoS protection<\/strong>\u00a0using its complimentary CDN service.<\/p>\n<p style=\"text-align: justify;\">\n<strong>2.Verisign\u00a0DDoS Protection\u00a0Services<\/strong><br \/>\nWhen a\u00a0DDoS attack\u00a0is detected by Verisign, support personnel instantly notify customers about it and recommend an ideal mitigation strategy. Besides the monitoring feature, Verisign also offers on-demand mitigation. It comprises Open Hybrid API that allows organizations to use their existing security systems to send threat information to Verisign\u2019s cloud-based service for possible mitigation.<\/p>\n<p style=\"text-align: justify;\">\n<strong>3.Akamai DDoS mitigation<\/strong><br \/>\nAkamai&#8217;s DDoS mitigation solution includes\u00a0<strong>CDN-based<\/strong>,\u00a0<strong>DDoS scrubbing<\/strong>, and DNS components, based on each customer&#8217;s requirements. Akamai mitigates DNS-based\u00a0DDoS attacks, besides safeguarding DNS services from\u00a0DDoS attacks. It includes automated rate controls, monitoring tools, custom web application firewall (<strong>WAF<\/strong>) rules, traffic profiles, and workflows that prevent unnecessary mitigation actions.<\/p>\n<p style=\"text-align: justify;\">\n<strong>4.SiteLock<\/strong><br \/>\nThis\u00a0website security\u00a0company offers its clients a choice of automatic &#8220;always on&#8221; DDoS mitigation vs. &#8220;on demand.&#8221; Both offerings are a paid service, prices vary, and the &#8220;always on&#8221; solution, the company\u2019s technology claims to handle &#8220;hit and run&#8221;\u00a0DDoS attacks. These attacks comprise short bursts of traffic at interval levels over a long period. With automatic detection and activation, SiteLock takes complete responsibility for both detection and mitigation of the attack.<\/p>\n<p style=\"text-align: justify;\">\n<strong>5.Cloudflare\u00a0DDoS Protection<\/strong><br \/>\nThe cloud-based\u00a0DDoS protection\u00a0system offered by this company can deal with layer-seven attacks as well as layer-four and layer-three attacks. Instead of employing dedicated anti-DDoS hardware, all machines in its global network take part in DDoS mitigation. It has more than 15 Tbps of capacity.<\/p>\n<p style=\"text-align: justify;\">\n<strong>6.Arbor Networks APS<\/strong><br \/>\nArbor Networks protect against all types of\u00a0<strong>DDoS threats<\/strong>\u00a0by employing hybrid, multi-layer defenses. Arbor&#8217;s APS delivers on-premises protection and addresses application-layer and TCP state-exhaustion attacks. It applies its detection and mitigation technology for automatic, fast blocking of attacks.<\/p>\n<p style=\"text-align: justify;\">\n<strong>7.Neustar SiteProtect NG<\/strong><br \/>\nNeustar SiteProtect NG provides\u00a0DDoS protection\u00a0with hybrid and cloud-based options for scrubbing malicious traffic\u2014with capabilities to implement countermeasures to protect a site&#8217;s uptime, limit exposure, and provide\u00a0<strong>automated mitigation<\/strong>\u00a0across multiple attack vectors.<\/p>\n<p style=\"text-align: justify;\">\n<strong>8.Radware\u00a0DDoS Protection<\/strong><br \/>\nThis company provides integrated application and network security. The Attack Mitigation Solution from this company is a hybrid\u00a0DDoS protection\u00a0solution that is available with \u2018always-on\u2019 detection and mitigation with cloud-based volumetric\u00a0DDoS attackprevention, scrubbing, and\u00a0<strong>24&#215;7 cyberattack<\/strong>\u00a0and DDoS security.<\/p>\n<p style=\"text-align: justify;\">\n<strong>9.DOSarrest\u00a0DDoS Protection<\/strong><br \/>\nBesides protecting websites, DOSarrest also focuses on\u00a0<strong>HTTP\/HTTPs<\/strong>. Protection is also provided for APIs and mobile application servers on TCP ports 443 and 80. It offers cloud-based security that comprises\u00a0DDoS protection, a web application firewall, a CDN for improved performance, website monitoring and support.<\/p>\n<p style=\"text-align: justify;\">\n<strong>10.F5\u00a0DDoS Protection<\/strong><br \/>\nF5 protects against DDoS traffic targeting the networks, cloud, and applications, including DNS attacks. It can analyze network layers 3-7. F5&#8217;s DDoS Hybrid Defender is capable of addressing sophisticated application attacks and blended network attacks while enabling anti-bot capabilities, SSL decryption, and advanced detection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed Denial of Service (DDoS) is a type of attack that involves using multiple compromised networks to target a single website. Hackers execute\u00a0DDoS attacks by hijacking unprotected computers and installing malware. By using thousands of these &#8220;bots&#8221; or &#8220;zombie computers,&#8221; hackers target a single web-based application or website, flooding it with a huge volume of traffic and causing the target to become unavailable to legitimate users. Recently,\u00a0DDoS protection\u00a0has become increasingly difficult as\u00a0DDoS attacks have now become sophisticated.\u00a0DDoS attackershave moved their focus from the network and transport layers to the application layer, where\u00a0DDoS protection\u00a0is difficult to maintain. Exponential growth is seen\u2026<\/p>\n","protected":false},"author":3,"featured_media":92,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-91","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 10 DDoS Protection Companies - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 DDoS Protection Companies - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"Distributed Denial of Service (DDoS) is a type of attack that involves using multiple compromised networks to target a single website. Hackers execute\u00a0DDoS attacks by hijacking unprotected computers and installing malware. By using thousands of these &#8220;bots&#8221; or &#8220;zombie computers,&#8221; hackers target a single web-based application or website, flooding it with a huge volume of traffic and causing the target to become unavailable to legitimate users. Recently,\u00a0DDoS protection\u00a0has become increasingly difficult as\u00a0DDoS attacks have now become sophisticated.\u00a0DDoS attackershave moved their focus from the network and transport layers to the application layer, where\u00a0DDoS protection\u00a0is difficult to maintain. Exponential growth is seen\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T20:22:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:40:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/ddos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"Top 10 DDoS Protection Companies\",\"datePublished\":\"2019-03-08T20:22:31+00:00\",\"dateModified\":\"2020-05-30T23:40:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/\"},\"wordCount\":738,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ddos.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/\",\"name\":\"Top 10 DDoS Protection Companies - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ddos.jpg\",\"datePublished\":\"2019-03-08T20:22:31+00:00\",\"dateModified\":\"2020-05-30T23:40:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ddos.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ddos.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/top-10-ddos-protection-companies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 DDoS Protection Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 10 DDoS Protection Companies - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 DDoS Protection Companies - MozDomains Blog","og_description":"Distributed Denial of Service (DDoS) is a type of attack that involves using multiple compromised networks to target a single website. Hackers execute\u00a0DDoS attacks by hijacking unprotected computers and installing malware. By using thousands of these &#8220;bots&#8221; or &#8220;zombie computers,&#8221; hackers target a single web-based application or website, flooding it with a huge volume of traffic and causing the target to become unavailable to legitimate users. Recently,\u00a0DDoS protection\u00a0has become increasingly difficult as\u00a0DDoS attacks have now become sophisticated.\u00a0DDoS attackershave moved their focus from the network and transport layers to the application layer, where\u00a0DDoS protection\u00a0is difficult to maintain. Exponential growth is seen\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-08T20:22:31+00:00","article_modified_time":"2020-05-30T23:40:21+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/ddos.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"Top 10 DDoS Protection Companies","datePublished":"2019-03-08T20:22:31+00:00","dateModified":"2020-05-30T23:40:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/"},"wordCount":738,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/ddos.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/","name":"Top 10 DDoS Protection Companies - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/ddos.jpg","datePublished":"2019-03-08T20:22:31+00:00","dateModified":"2020-05-30T23:40:21+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/ddos.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/ddos.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Top 10 DDoS Protection Companies"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/91","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=91"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/91\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/92"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=91"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=91"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=91"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}