Level 3® DDoS Mitigation

Stay Up and Running. No Matter What.

Downtime is no longer an inconvenience. It can do serious harm to your brand, your productivity and your bottom line. Every minute your network is down is a minute you can’t connect with colleagues, customers or partners.

That’s why distributed denial of service (DDoS) attacks must be prevented. And Level 3 can help.

With Level 3 DDoS Mitigation, we provide network-based, "always-on" and on-demand protection with 24 x 7 monitoring.

Why Level 3 for Anti DDoS Protection

Scrubbing center mitigation techniques alone are not designed to manage today’s highly sophisticated and distributed attacks. You need to deploy a multi-layered security approach backed by extensive threat research to defend against a variety of attack types.

Only network-based DDoS mitigation solutions can provide realistic protection to enterprise resources. Let Level 3 help you quickly identify and mitigate the latest threats, so you stay connected – no matter what.

*Under Attack?

Existing Level 3 customers please call the Security Operations Center at 1.877.4LEVEL3.

Legacy Black Lotus U.S customers please call 1.800.789.1977. International legacy Black Lotus customers call 1.213.354.9000.  

New and/or future Level 3 customers can contact our Security Sales Teams at emergencyDDoS@level3.com.

Level 3 DDoS Mitigation Benefits

  • Rest easier. Level 3 has used DDoS mitigation scrubbing since 2008. And with around-the-clock monitoring and mitigation of your network, you can worry less and work more.
  • Leverage our Threat Intelligence. Level 3’s global IP, CDN and DNS networks allow for extensive visibility into attack traffic and advancing threats.
  • Simplify operations. Our network-based, carrier agnostic service provides DDoS mitigation with a single point of contact for handling the resolution of threats.

Level 3 DDoS Mitigation Details

  • 4.5 Tbps of attack ingestion capacity
  • Re-route and scrub all Internet connections, not just Level 3 on-net capacity
  • Generic route encapsulation (GRE) protocol, direct and proxy clean path returns
  • Robust application layer protection
  • Advanced behavioral analytics technology
  • Flow-based monitoring 
  • Host Level re-routing and IP filtering
  • Real-time attack and peacetime reporting
  • Emergency mitigation available
  • Customer Initiated Mitigation using BGP route control