Sicurezza

6 Must-Have Metrics in Your SLA

Pubblicato il

Your Service Level Agreement (SLA) is a crucial component of DDoS defenses. It is your contractual guarantee outlining what your DDoS mitigation provider will deliver and their obligation to remedy in case they do not meet those guarantees. Many vendors make expansive marketing claims about mitigation capabilities, but when it comes to making contractual commitments […]

Sicurezza

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

Pubblicato il

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational tax on nearly every employed individual throughout the world. Amazingly enough, attackers have reached a level of […]

Sicurezza

Choosing the Right DDoS Solution – Part IV: Hybrid Protection

Pubblicato il

This is the last part of the blog series exploring the various alternatives for protection against DDoS attacks, and how to choose the optimal solution for you. The first part of this series covered premise-based hardware solutions, the second part discussed on-demand cloud solutions, and the third part covered always-on cloud solutions. This final piece […]

Sicurezza

Choosing the Right DDoS Solution – Part III: Always-On Cloud Service

Pubblicato il

This blog series dives into the different DDoS protection models, in order to help customers choose the optimal protection for their particular use-case. The first parts of this series covered premise-based appliances and on-demand cloud services. This installment will cover always-on cloud DDoS protection deployments, its advantages and drawbacks, and what use-cases are best for […]

Sicurezza

SIP Protection: What Your SIP Security Solution Should Have

Pubblicato il

SIP-enabled devices have gained widespread use in recent times. With more and more VoIP applications that use SIP as their signalling protocol being developed these days, the industry should put greater emphasis on safeguarding SIP assets against undesirable exploitations that may either degrade the quality of VoIP services or promote cyber-crime. In converged network architecture, […]

Sicurezza

Choosing the Right DDoS Solution – Part II: On-Demand Cloud Service

Pubblicato il

This blog series explores the various options for DDoS protection and help organizations choose the optimal solution for themselves. The first part of this series covered the premise-based DDoS mitigation appliance. This installment will provide an overview of on-demand cloud-based solutions. Subsequent chapters will also cover always-on and hybrid solutions. Advantages of moving to the […]

Sicurezza

Putinstresser.eu, a Simple and Powerful Booter and Stresser Service

Pubblicato il

Let’s take a journey through a real-life booter and stresser service to better understand the tools, the trade and pricing behind DDoS-as-a-Service. Putinstresser.eu is a fairly recent player, an addition to the growing number of low-priced DDoS-as-a-Service, commonly known as booters and stressers, services. The site illustrates the maturity and the ease of access these […]

Sicurezza

The Evolution of a Threat Intelligence Feed

Pubblicato il

I do declare, I do not know; if this guest be friend or foe… Wouldn’t it be nice to be able to turn away malicious network guests before they create havoc and bring all their evil friends to visit your applications, without having to worry about blocking legitimate guests from access to your applications? The […]

Sicurezza

Choosing the Right DDoS Solution – Part I: On-Prem Appliance

Pubblicato il

As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect themselves against attacks. However, DDoS protection is not a one-size-fits-all fixed menu; rather, it is an a-la-carte buffet of multiple choices. Each option has its unique advantages and drawbacks, and it is up to the […]

Sicurezza

Cloud vs DDoS, the Seven Layers of Complexity

Pubblicato il

A question that I’ve encountered many times in the field of late is what are the impacts of DDoS attacks on cloud compute environments?  The primary benefit of cloud is that it elastically scales to meet variable demand, scale up instantly, scale down when demand subsides – in seconds…  So layman’s logic might say that […]