DDoS Protection

VEQTOR Africa Security

DDoS Protection

VEQTOR Africa services are delivered with security and resilience in mind. Where applicable, our infrastructure benefits from upstream anti-DDoS protections provided through underlying infrastructure partners such as OVHcloud.

Last updated: 11 April 2026

1. Overview

Distributed Denial of Service (“DDoS”) attacks are designed to overwhelm a server, network, service or application with malicious traffic in an attempt to degrade performance, exhaust resources, or make the target unavailable.

VEQTOR Africa takes service resilience seriously. While VEQTOR Africa does not operate its own independent global anti-DDoS mitigation backbone, certain VEQTOR Africa services are delivered on infrastructure that benefits from upstream anti-DDoS capabilities provided by underlying infrastructure partners, including OVHcloud where applicable.

2. Infrastructure Position

VEQTOR Africa may provision services using professional infrastructure providers and datacentre environments in multiple regions. Where services are hosted on or delivered through OVHcloud-backed infrastructure, they may benefit from OVHcloud’s anti-DDoS systems and related network protections as part of the underlying service environment.

This means VEQTOR Africa can transparently state that anti-DDoS protection exists in the upstream delivery path for relevant services, while also making it clear that the mitigation platform itself is not owned or directly operated by VEQTOR Africa.

3. What OVHcloud Publicly States

OVHcloud publicly states that its Anti-DDoS infrastructure is enabled by default on its products and combines edge, backbone and datacentre network logic. OVHcloud also describes automatic mitigation and scrubbing processes intended to remove malicious traffic while allowing legitimate traffic to pass.

OVHcloud’s public materials also reference significant mitigation capacity and ongoing investment in anti-DDoS capability, although exact scope, effectiveness and available protections can vary by product and service context.

4. What This Means for VEQTOR Africa Customers

Where applicable to the relevant hosting or infrastructure product, VEQTOR Africa customers may benefit from upstream anti-DDoS filtering, attack detection, traffic scrubbing, and network-level mitigation features provided through the underlying infrastructure environment.

In practical terms, this may help reduce the impact of common network-layer DDoS attacks, including attempts to flood or disrupt services at Layers 3 and 4. Some specialised environments may also support more advanced profiles or application-specific protections through the underlying provider’s platform, but this depends on the service type and environment in use.

VEQTOR Africa may also apply its own operational responses where necessary, including service isolation, access restriction, traffic review, escalation to upstream providers, abuse handling, and security-related support actions.

5. Scope of Protection

DDoS mitigation is not a one-size-fits-all shield. Protection scope can vary depending on the service ordered, the infrastructure location, the network path, the type of traffic involved, the protocol under attack, and the protection features available in the relevant upstream environment.

VEQTOR Africa therefore does not represent that every service receives identical protection characteristics or that every type of application-layer attack will be filtered in the same way across all services.

6. What DDoS Protection Does Not Mean

Anti-DDoS protection does not mean absolute immunity from attack, guaranteed zero downtime, guaranteed zero packet loss, or guaranteed uninterrupted availability under all circumstances.

A severe, novel, application-specific or highly distributed attack may still affect service quality, latency, routing, connectivity or availability, even where mitigation systems are active. Any provider who tells you otherwise is either guessing, bluffing, or selling magic beans.

7. VEQTOR Africa Operational Approach

In addition to the protections available through the underlying infrastructure, VEQTOR Africa may take operational steps to help protect service stability and customer environments. Depending on the situation, this may include:

  • reviewing service-impact incidents and attack reports;
  • escalating relevant incidents to the upstream infrastructure provider;
  • applying temporary service restrictions or isolation where necessary;
  • reviewing firewall or network controls where appropriate;
  • coordinating with customers on service suitability, hardening and architecture choices;
  • recommending migration to more suitable infrastructure where workloads require it.

These measures do not replace the upstream provider’s mitigation systems, but they help support a practical and responsible response when service stability is under pressure.

8. Service Suitability and Customer Responsibility

Customers remain responsible for selecting services that are appropriate for their technical profile, business risk, traffic pattern and application design. A small shared hosting plan is not the same thing as a hardened, high-risk edge deployment. That should not need saying, but here we are.

Customers are also responsible for maintaining secure applications, patching vulnerable software, managing authentication properly, and avoiding deployment patterns that increase exposure to avoidable abuse or compromise. DDoS protection helps with one class of threat; it does not cure bad architecture, poor coding, weak passwords, or exposed admin panels.

9. Geographic Reach

VEQTOR Africa may use infrastructure environments that are located in different regions, depending on the selected service and available provider options. OVHcloud publicly states that it operates infrastructure across multiple global regions, including Europe, North America and Asia-Pacific.

The existence of multi-region infrastructure does not mean every VEQTOR Africa service is deployed in every region. Availability remains dependent on the service offering, infrastructure design, and deployment choices applicable at the time.

10. Transparency and Fair Representation

VEQTOR Africa believes in saying what is true, not what sounds impressive in a sales brochure. For that reason, this page is intended to make a clear distinction between:

  • protections available through upstream infrastructure providers;
  • security and operational measures controlled directly by VEQTOR Africa; and
  • the limits of what any anti-DDoS service can realistically guarantee.

That is the honest way to present this issue to customers.

11. Further Information

Customers who want more detail about VEQTOR Africa’s service posture should also review our Security Statement, Terms and Conditions, Acceptable Use Policy and Privacy Policy.

For more information about the underlying anti-DDoS systems described by OVHcloud, you can review OVHcloud’s publicly available anti-DDoS and security information on its official website.

Need a More Resilient Hosting Environment?

Speak to VEQTOR Africa about the right service fit for your traffic profile, performance needs and security posture.