GATEKEEPER CONSULTANCY

We offer the implementation of a DDoS protection service, which involves the deployment of Gatekeeper and Grantor servers, in addition to the configuration of tools and network policies specific to the customer's environment.

How can we help you with Gatekeeper

Requirements Analysis for Implementation

  • Number of Servers: We determine the ideal number of servers needed to meet the client's specific needs.
  • Memory and CPU Sizing: We evaluate and recommend adequate memory and CPU capacity to ensure optimal server performance.
  • Network Interfaces: We identify and configure the network interfaces necessary for efficient communication between servers and the client's infrastructure.

Implementation
of Gatekeeper and Grantor servers

  • We install and configure the Gatekeeper and Grantor servers, which are essential for protection against DDoS attacks.
  • If direct access to the servers is not possible, we provide detailed documentation with all the steps necessary for installation and configuration.

Gatekeeper Network Policy Development

  • We create a custom network policy based on the customer-supplied network addressing profile. This policy defines the rules that servers will follow to identify and block DDoS attacks.

Policy Testing and Approval

  • We perform thorough testing of network policy to ensure its effectiveness in identifying and mitigating DDoS attacks.
  • We adjust the approval process according to the customer's infrastructure. Ideally, the customer will provide a block of IP addresses that are not in use in production to perform these tests without impacting operations.

Gatekeeper Log Exporter and Visualization Dashboard Implementation

  • We configured the log export system for Gatekeeper, allowing the monitoring and analysis of security events.
  • We implemented a visualization dashboard that provides a clear and intuitive view of log data and DDoS mitigation activities.

Complete Implementation Documentation

  • We provide comprehensive documentation that includes the policy script, all installation and configuration steps, and instructions. This documentation is essential for maintenance and future expansions of the protection system.

COMPLETE IMPLEMENTATION AND ROBUST DDoS SECURITY

This set of services ensures that the DDoS protection solution is fully implemented, tested and documented, offering the customer robust and reliable security against cyber attacks.

INVESTMENT START FROM US$ 10,000.00

PoC environment

CONTACT

Digirati - Gatekeeper Consultancy

  • Please add country code

FAQ

Scroll to Top