DDoS (Distributed Denial of Service) Attack



Your army against their army

You don’t need to have enemies to fall vulnerable to Distributed Denial of service (DDoS) attacks. A recent survey from McAfee states that 80% of respondents, who represented different organizations across the world, said that they have faced a DDoS attack.

What is DDoS?

Distributed Denial of Services:

  • Goal: make a service unusable
  • How: overload a server, router, network link
  • Focus: bandwidth attacks

Increased Frequency:

  • 35% of responded see 10 or more DDoS attack per month compared to 18% in 2009

Here’s a snapshot of that survey:

DDoS - Distributed Denial of Service
Distributed Denial of Service attacks cost an average enterprise $6.3M for a 24-hour outage 

Reality check

Are your systems protected against?

  • Unavailability of network / applications
  • Business loss
  • Brand impact if network/application is customer facing
  • Bandwidth usage shoots up
  • Hardware failures (servers, routers, firewalls, etc.)
    MDDoS in Action
  • DDoS attack

    MDDoS coverage and benefits include

    • Comprehensive and reliable DDoS defense
    • Network visibility and application insight
    • Detection and defense against attacks on bandwidth and infrastructure
    • Application layer intelligence and protection
    • Baseline enforcement
    • Detection and defense against targeted attacks on critical applications.
    • Dedicated bandwidth scrubbing of upto 1 Gbps
    • Global attack intelligence, active threat feed and fingerprinting
    This service is backed by industry leading SLAs to provide a powerful service to counter threats and attacks on the IT infrastructure of its customers.

    Compare and choose the right MDDoS package

    MDDoS is offered in three off-the-shelf packages – Basic, Advanced and Comprehensive apart from custom solution that can be developed based on your requirement. Here is what each of them have to offer:
     BronzeSilverGold
    DDoS attack detection and mitigationYYY
    Advanced Reporting YY
    Limit on number of mitigationsLimitedLimitedUnlimited
    Mitigation CapacitySharedSharedDedicated
    Web Portal Access  Y
Protect Your Business visit : RED ZONE DIGITAL SECURITIES

Comments

Popular posts from this blog

AntiCloud Trojan Reverse Engineering Analysis

SQL Injection: The Equal Opportunity Vulnerability

Secure Sockets Layer (SSL)