Security Solutions

WAF Protection

Online threats are on the increase, is your business protected?
Get peace of mind by protecting your business from online based threats.
Our security solutions protect your business from compromised websites and malicious downloads, and enable you to control, monitor and enforce web based policies with minimal latency.

Source-Code Disclosure

Source code disclosure vulnerability is an involuntary disclosure of source code. It is the exposure of the website code allowing the hacker to check it for vulnerabilities to deface the website.

DOS Attacks

The advanced DoS prevention features are designed to prevent DoS techniques, such as Botnet, Slow POST Attacks and others from succeeding.

SQL Injection

Code injection technique, used to gain access to the website database and update or extract content.

Buffer Overflows

Attacker can send requests to the website to block the memory, or buffer, and thus cause the site to stop working.

Anti-Defacement Feature

Monitoring for defacement on website files, in case the WAF detects a change, it can automatically reverse the damage by restoring original files.

Cross-Site Scripting

Type of computer security vulnerability typically found in web applications. It enables attackers to inject scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls and deface the website.


Any malicious computer program which is used to hack into a web site.

Security Solutions


Operating telecom networks since 1996, GDS has always provided its customers a seamless protection solution and uninterrupted service being at the frontline of Cyber Defense. With the penetration testing service, GDS is putting at the disposal of its customers the same techniques and expertise used to assess the resilience of its own network.

Security Solutions
  • Our Approach
  • Understand your requirements through a technical meeting to determine the penetration test scope.
  • Present a proposal based on the information gathered from the requirements stage.
  • Perform the penetration testing remotely or on-site and coordinate with you during the process execution.
  • Provide a detailed report of the findings and rating the discovered vulnerabilities including general recommendations.
  • Why a Pentest?
  • Prevent breaches by assessing the existing vulnerabilities in the pentest target.
  • Provide compliance in case it is required as part of a regulatory environment.
  • Assess the performance of existing security controls.
  • Assess the security of applications and systems.
  • Assess the security team’s operational response (performance) to incidents.
  • Get an overall score on your security stance.
  • Security Assessment Penetration Testing
Download Datasheet

DDOS Security

IDM implemented the well-known solution of Arbor DDOS mitigation at the international level to mitigate all type of attacks from layer1 to layer7 (Volumetric, slow and low, application...) Arbor has one of the world’s largest deployments of DDOS detection and mitigation capabilities. During the attack, only malicious traffic is blocked-legitimate traffic continues to flow through so client’s network and applications remain available to legitimate users.

Managed FIREWALL Service

The surge in Internet, Intranet and Extranet technologies has provided users the convenience of connecting into a standards-based protocol network to transmit data or access applications. The widespread adoption of these technologies has also given rise to security threats and the ability to eavesdrop, impersonate, infiltrate networks and distribute computer viruses. To detect and mitigate these risks, firewalls and unified threat management devices have become an important part of any corporate security program, and should be looked upon as the foundation of internetwork security.

Our Managed Firewall Service provides a highly functional layer of security to your networks. The service is a fully managed solution, which includes all hardware and software components, configuration, installation, day to day management and maintenance, as well as expert customer support and proactive network monitoring.

In addition, the Managed Firewall Service provides 24/7/365 reliable, cost-effective installation, configuration, monitoring, and management of firewalls.

click here for details