A link to "Protect your business from cyber attacks with Comcast Threat Management Service™ " will be sent via email.
We hate spam. The information you've entered will not be shared or sold.
Threat mitigation functionality is available as an add-on with Comcast Business Ethernet Dedicated Internet (EDI) services. Comcast Threat Management Service™ is a subscription-based offering that proactively detects Distributed Denial of Service (DDoS) attacks and alerts customers when an attack is under way, and enables the means to mitigate attacks.
If you have a Single-Incident or Multi-Incident Comcast Threat Management Service subscription, you will receive an email and/or SMS alert if a DDoS attack is under way and that you should call Comcast Security Assurance to begin mitigation to thwart the attack. If you have an Unlimited subscription, you will receive an email or SMS notification and mitigation will begin as soon as a detected DDoS attack begins.
During mitigation, Comcast Business diverts traffic directed at the customer's IPs, including DDoS attack traffic, to cloud-based scrubbing centers distributed across the United States. The resulting clean and legitimate traffic is simultaneously forwarded to the network and servers. Comcast Threat Management operates 24x7x365, and helps provide businesses with continued uptime while under a DDoS attack.
After signing in to your account, active DDoS alerts will display in a red banner at the top of the home page. Select View Threats.
If there is no active threat, select Ethernet from the Manage Services menu to view threat records.
View the following information in the Threat Management section:
The number of Active High Severity Threats (if applicable)
The number of Mitigated Threats the service handled this month
The number of Mitigation Incidents Used in the span of a month
Select Details to see your EDI and subscription details.
To view threat records, scroll down to DDoS Threat Records.
Select Filters to expand your search options. You can search for threat records by entering data in the Search field, by entering a range of dates or by excluding records by severity. After setting your search criteria, select Update Results to see the records displayed according to your search parameters.
To see more details about a high severity threat, select the Expand icon to the right of the record.
You can also download a PDF, Excel or CSV file of your filtered results.
Thank you! We've received your information.
An overview of Ethernet (Virtual) Private Line Service, Ethernet Network Service and Ethernet Dedicated Internet Service.
Get information from our Business Ethernet FAQ guide, which covers support numbers, finding network information and more.
Symantec, the Symantec Logo, the Checkmark Logo, and Norton, Norton 360 and Norton by Symantec are registered trademarks of Symantec Corporation ©2014 Symantec Corporation. All rights reserved. Microsoft product names and logos are trademarks or registered trademarks of Microsoft Corporation. All other trademarks are the property of their respective owners.