Conventional wisdom says to always follow best security practices, but even with all the wisdom in the world, if you build it they will come... and try to break it and you. Whether in attempts to destroy your reputation, waste your time or inconvenience your visitors, this must come to an end, expeditiously.
DOS/DDOS attacks are becoming rampant and growing exponentially. With the advent of even faster connections and more devices than ever in this digital age, can only mean with more good apples, comes bad ones too.
When it comes to your business, personal website and web applications, it's important to stay online. We help you do exactly that to ensure continuity even when being maliciously attacked. Our super efficient platform blocks attackers at the perimeter, leveraging Cloudflares Edge, blocking out bad actors on the spot within seconds.
Our software is best demonstrated during on-going live attacks to understand its true power and effectiveness, so if you are being attacked right now, simply download our software and create a Custom Cloudflare API token and plug it into Blackmirror Firewall, and your force-field will be instantly activated.
Your attackers will however look for other ways to attack you such as seeking your origin server to attack you from the back. Our software covers that too, using Windows Firewall along with Cloudflare. However we think it is best security practices to block all incoming traffic and using Cloudflares Tunnels instead which only needs 4 outbound connections to their edge (or more if you want by deploying more CFT instances). By doing so, you are directly connected to Cloudflares edge, while the front, back and sides are all protected, hence protecting you at the perimeter. This direct connection also lowers latency giving you a faster, more responsive site.
We have streamlined our solution to be fast and easy, working right out-of-the-box, which means our software doesn't really need configuration. With Cloudflare Tunnels in place, Blackmirror Firewall protects against all layers because the only way in is through port 80/443 or any ports you designate with a tunnel. This means your whole Protection Zone is militarized. Think of it as of thousands of enemy combatants breaching your perimeter, and they are then all shot down at machine gun speeds. You cannot get hurt if they cannot get in! You should have a hardware firewall in place on your origin server side, so your network card is not exposed directly. Inquire with your host in that case. We can only protect you from within your perimeter, at lightning speeds in your zone.