Knowledge center-white-paper-planning-and-validating-your-ddos-defense

10
CONFIDENTIAL www.prolexic.com Planning for and Validating a DDoS Defense Strategy www.prolexic.com

description

 

Transcript of Knowledge center-white-paper-planning-and-validating-your-ddos-defense

Page 1: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

CONFIDENTIALwww.prolexic.com

Planning for and Validating a DDoS Defense Strategy

www.prolexic.com

Page 2: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

2www.prolexic.com

Planning for and Validating a DDoS Defense Strategy

• DDoS attacks can cost businesses:• Sales• Customer loyalty• Search engine rankings

• An attack on an unprepared business can result in several days of downtime

• Having a solid DDoS response plan as part of your company’s business continuity plan is essential

May 2013 www.prolexic.com

Page 3: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

3www.prolexic.com

Best Practices for DDoS Mitigation Validation

With the DDoS mitigation service active• Verify that all applications are performing properly• Verify all routing and DNS is working• Generate a few gigabits of controlled traffic to

validate features of the service, including: • Alerting• Activation• Mitigation

Page 4: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

4www.prolexic.com

Best Practices for DDoS Mitigation Validation

• Validate your on-premise monitoring systems • Test small levels of traffic without scrubbing and

without any DDoS protection • Identify stress points on your network

• Conduct baseline testing and calibrate systems to remediate vulnerabilities

• Schedule validation tests on a regular basis (yearly or quarterly)

• If network issues arise during testing, make modifications

Page 5: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

5www.prolexic.com

Best Practices for DDoS Mitigation Validation

• Based on the test results, develop a mitigation playbook as part of an incident response plan

• This plan ensures that everyone in the organization knows what to do and expect when a DDoS attack hits

Download the full report from Prolexic for more information about best practices to ensure your DDoS mitigation service can protect your business.

Page 6: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

6www.prolexic.com

Estimating the Cost of a DDoS Attack

• Forrester Consulting has found that an online company loses an average of US $220,000 per hour during an unmitigated DDoS attack

Page 7: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

7www.prolexic.com

Be Prepared: Test and Validate

• Every company that does business online is vulnerable to DDoS attacks

• Talk to your DDoS mitigation provider before an attack happens

• Test and validate your DDoS mitigation service regularly.

Download the full report for more information about how to test and validate a DDoS defense plan.

Page 8: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

8www.prolexic.com

Create an Operations Plan for DDoS Attacks

• In addition to testing and validating your DDoS mitigation service, develop a strong operational plan for activation and communication in the event of a DDoS attack

Page 9: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

9www.prolexic.com

Download the Free White Paper

• Download the white paper Planning for and Validating a DDoS Defense at http://www.prolexic.com/planning

• The white paper includes:• Detailed enterprise case studies that show the

consequences of inadequate preparation• What to include in your anti-DDoS playbook• A best-practice case study of DDoS attack readiness• How to validate your DDoS defense

Page 10: Knowledge center-white-paper-planning-and-validating-your-ddos-defense

10www.prolexic.com

About Prolexic

• Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services

• Prolexic has successfully stopped DDoS attacks for more than a decade

• We stop the largest attacks that exceed the capabilities of other DDoS mitigation service providers