Five Tips for Defending Against a DDoS Attack

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips for Defending Against a DDoS Attack-5 Next

Firewalls and other security products are essential elements of a layered-defense strategy; however, issues they were designed to resolve or mitigate might not not directly relate to DDoS attacks. Firewalls address fundamental network security challenges such as zoning and traffic inspection, but they do not address a fundamental target of DDoS attacks: network availability.

Often, when it comes to protecting against a DDoS attack, many enterprises have a false sense of security. Organizations believe that they have secured their key services against attacks by deploying firewalls in front of their servers; however, the truth is that a multi-layered approach is needed, requiring security controls deployed at various points within the application flow.

There are many things that can be done with existing network infrastructure to protect against network-layer attacks. Network equipment, which is already heavily taxed with production traffic, is vulnerable to minimal increases in traffic, causing availability disruptions. AlgoSec, a leading provider of network security policy management, offers five tips for defending against a DDoS attack.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.