SlideShare una empresa de Scribd logo
1 de 10
CONFIDENTIALwww.prolexic.com
Planning for and Validating a DDoS Defense Strategy
www.prolexic.com
www.prolexic.com
Planning for and Validating a DDoS Defense
Strategy
• DDoS attacks can cost businesses:
• Sales
• Customer loyalty
• Search engine rankings
• An attack on an unprepared business can result
in several days of downtime
• Having a solid DDoS response plan as part of
your company’s business continuity plan is
essential
2
May 2013 www.prolexic.com
www.prolexic.com
Best Practices for DDoS Mitigation Validation
With the DDoS mitigation service active
• Verify that all applications are performing properly
• Verify all routing and DNS is working
• Generate a few gigabits of controlled traffic to
validate features of the service, including:
• Alerting
• Activation
• Mitigation
3
www.prolexic.com
Best Practices for DDoS Mitigation Validation
• Validate your on-premise monitoring systems
• Test small levels of traffic without scrubbing and
without any DDoS protection
• Identify stress points on your network
• Conduct baseline testing and calibrate systems to
remediate vulnerabilities
• Schedule validation tests on a regular basis
(yearly or quarterly)
• If network issues arise during testing, make
modifications
4
www.prolexic.com
Best Practices for DDoS Mitigation Validation
• Based on the test results, develop a mitigation
playbook as part of an incident response plan
• This plan ensures that everyone in the
organization knows what to do and expect when
a DDoS attack hits
Download the full report from Prolexic for more information
about best practices to ensure your DDoS mitigation service can
protect your business.
5
www.prolexic.com
Estimating the Cost of a DDoS Attack
• Forrester Consulting has
found that an online
company loses an
average of US $220,000
per hour during an
unmitigated DDoS
attack
6
www.prolexic.com
Be Prepared: Test and Validate
• Every company that does business online is vulnerable to
DDoS attacks
• Talk to your DDoS mitigation provider before an attack
happens
• Test and validate your DDoS mitigation service regularly.
Download the full report for more information about how to test
and validate a DDoS defense plan.
7
www.prolexic.com
Create an Operations Plan for DDoS Attacks
• In addition to testing and validating your DDoS
mitigation service, develop a strong
operational plan for activation and
communication in the event of a DDoS attack
8
www.prolexic.com
Download the Free White Paper
• Download the white paper Planning for and Validating a
DDoS Defense at http://www.prolexic.com/planning
• The white paper includes:
• Detailed enterprise case studies that show the
consequences of inadequate preparation
• What to include in your anti-DDoS playbook
• A best-practice case study of DDoS attack readiness
• How to validate your DDoS defense
9
www.prolexic.com
About Prolexic
• Prolexic Technologies is the world’s largest
and most trusted provider of DDoS protection
and mitigation services
• Prolexic has successfully stopped DDoS
attacks for more than a decade
• We stop the largest attacks that exceed the
capabilities of other DDoS mitigation service
providers
10

Más contenido relacionado

Destacado

Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Christophe Mercier
 
MVC Revivial on the Web
MVC Revivial on the WebMVC Revivial on the Web
MVC Revivial on the WebESUG
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeSumant Tambe
 
design wheel for locomotive
design wheel for locomotivedesign wheel for locomotive
design wheel for locomotiveBurhan Awang
 
The Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemThe Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemESUG
 
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 Ken'ichi Matsui
 
How to Calculate Average First Reply Time
How to Calculate Average First Reply TimeHow to Calculate Average First Reply Time
How to Calculate Average First Reply TimeKayako
 
Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)Soh Shing
 
Indian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreIndian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreRao Khola
 
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015MetricNet
 
プログラマのための線形代数再入門
プログラマのための線形代数再入門プログラマのための線形代数再入門
プログラマのための線形代数再入門Taketo Sano
 
Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門樽八 仲川
 
Carat's 10 Trends for 2017
Carat's 10 Trends for 2017Carat's 10 Trends for 2017
Carat's 10 Trends for 2017dentsu
 
Research and Development
Research and DevelopmentResearch and Development
Research and DevelopmentShameem Ali
 

Destacado (18)

Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...
 
Experiencing the Live IIoT
Experiencing the Live IIoTExperiencing the Live IIoT
Experiencing the Live IIoT
 
MVC Revivial on the Web
MVC Revivial on the WebMVC Revivial on the Web
MVC Revivial on the Web
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/Subscribe
 
design wheel for locomotive
design wheel for locomotivedesign wheel for locomotive
design wheel for locomotive
 
Introduction to Replies by Gemma Buckley
Introduction to Replies by Gemma BuckleyIntroduction to Replies by Gemma Buckley
Introduction to Replies by Gemma Buckley
 
The Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemThe Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the Ecosystem
 
Hand book on C&W
Hand book on C&W Hand book on C&W
Hand book on C&W
 
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
 
How to Calculate Average First Reply Time
How to Calculate Average First Reply TimeHow to Calculate Average First Reply Time
How to Calculate Average First Reply Time
 
Norris Portfolio
Norris PortfolioNorris Portfolio
Norris Portfolio
 
Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)
 
Indian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreIndian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care Centre
 
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
 
プログラマのための線形代数再入門
プログラマのための線形代数再入門プログラマのための線形代数再入門
プログラマのための線形代数再入門
 
Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門
 
Carat's 10 Trends for 2017
Carat's 10 Trends for 2017Carat's 10 Trends for 2017
Carat's 10 Trends for 2017
 
Research and Development
Research and DevelopmentResearch and Development
Research and Development
 

Más de State of the Internet

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of the Internet
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterState of the Internet
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicState of the Internet
 
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsQ3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsState of the Internet
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsState of the Internet
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicState of the Internet
 

Más de State of the Internet (8)

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by Quarter
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 Infographic
 
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsQ3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack Statistics
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - Infographic
 
DDoS Attack & Defense Infographic
DDoS Attack & Defense InfographicDDoS Attack & Defense Infographic
DDoS Attack & Defense Infographic
 
Q3 2013 Global DDoS Attack Report
Q3 2013 Global DDoS Attack ReportQ3 2013 Global DDoS Attack Report
Q3 2013 Global DDoS Attack Report
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Knowledge center-white-paper-planning-and-validating-your-ddos-defense

  • 1. CONFIDENTIALwww.prolexic.com Planning for and Validating a DDoS Defense Strategy www.prolexic.com
  • 2. www.prolexic.com Planning for and Validating a DDoS Defense Strategy • DDoS attacks can cost businesses: • Sales • Customer loyalty • Search engine rankings • An attack on an unprepared business can result in several days of downtime • Having a solid DDoS response plan as part of your company’s business continuity plan is essential 2 May 2013 www.prolexic.com
  • 3. www.prolexic.com Best Practices for DDoS Mitigation Validation With the DDoS mitigation service active • Verify that all applications are performing properly • Verify all routing and DNS is working • Generate a few gigabits of controlled traffic to validate features of the service, including: • Alerting • Activation • Mitigation 3
  • 4. www.prolexic.com Best Practices for DDoS Mitigation Validation • Validate your on-premise monitoring systems • Test small levels of traffic without scrubbing and without any DDoS protection • Identify stress points on your network • Conduct baseline testing and calibrate systems to remediate vulnerabilities • Schedule validation tests on a regular basis (yearly or quarterly) • If network issues arise during testing, make modifications 4
  • 5. www.prolexic.com Best Practices for DDoS Mitigation Validation • Based on the test results, develop a mitigation playbook as part of an incident response plan • This plan ensures that everyone in the organization knows what to do and expect when a DDoS attack hits Download the full report from Prolexic for more information about best practices to ensure your DDoS mitigation service can protect your business. 5
  • 6. www.prolexic.com Estimating the Cost of a DDoS Attack • Forrester Consulting has found that an online company loses an average of US $220,000 per hour during an unmitigated DDoS attack 6
  • 7. www.prolexic.com Be Prepared: Test and Validate • Every company that does business online is vulnerable to DDoS attacks • Talk to your DDoS mitigation provider before an attack happens • Test and validate your DDoS mitigation service regularly. Download the full report for more information about how to test and validate a DDoS defense plan. 7
  • 8. www.prolexic.com Create an Operations Plan for DDoS Attacks • In addition to testing and validating your DDoS mitigation service, develop a strong operational plan for activation and communication in the event of a DDoS attack 8
  • 9. www.prolexic.com Download the Free White Paper • Download the white paper Planning for and Validating a DDoS Defense at http://www.prolexic.com/planning • The white paper includes: • Detailed enterprise case studies that show the consequences of inadequate preparation • What to include in your anti-DDoS playbook • A best-practice case study of DDoS attack readiness • How to validate your DDoS defense 9
  • 10. www.prolexic.com About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services • Prolexic has successfully stopped DDoS attacks for more than a decade • We stop the largest attacks that exceed the capabilities of other DDoS mitigation service providers 10