Five Tips for Defending Against a DDoS Attack

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips for Defending Against a DDoS Attack-5 Next

Firewalls and other security products are essential elements of a layered-defense strategy; however, issues they were designed to resolve or mitigate might not not directly relate to DDoS attacks. Firewalls address fundamental network security challenges such as zoning and traffic inspection, but they do not address a fundamental target of DDoS attacks: network availability.

Often, when it comes to protecting against a DDoS attack, many enterprises have a false sense of security. Organizations believe that they have secured their key services against attacks by deploying firewalls in front of their servers; however, the truth is that a multi-layered approach is needed, requiring security controls deployed at various points within the application flow.

There are many things that can be done with existing network infrastructure to protect against network-layer attacks. Network equipment, which is already heavily taxed with production traffic, is vulnerable to minimal increases in traffic, causing availability disruptions. AlgoSec, a leading provider of network security policy management, offers five tips for defending against a DDoS attack.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.