Training

DDoS Protection , Next-Generation Technologies & Secure Development , Security Operations

How to Effectively Mitigate Multi-Layer DDoS Attacks

How to Effectively Mitigate Multi-Layer DDoS Attacks

The size, speed and complexity of DDoS attacks are increasing, and a majority of them are application and web attacks. Research estimates the financial impact of attacks at $2.1 million lost for every four hours down.

As a result, organizations need to focus on building the right DDoS architecture to effectively mitigate more sophisticated multi-layer attacks. Identifying the right technologies for your environment is very challenging.

Attend this webinar to learn more about:

  • The business impact of DDoS;
  • Pros and cons of cloud/hosted services and on-premises defense;
  • Why a hybrid approach may be the best option.

Background

Since 2012, a wave of crippling DDoS attacks has pushed large financial customers and enterprises to redesign their networks to include DDoS protection. While the DDoS threat landscape is constantly evolving F5 has found that attacks continue to fall within four attack types: volumetric, asymmetric, computational and vulnerability-based. These attack categories have the following characteristics:

  • Volumetric - Flood-based attacks that can be at layer 3, 4, or 7;
  • Asymmetric - Attacks designed to invoke timeouts or session-state changes;
  • Computational - Attacks designed to consume CPU and memory;
  • Vulnerability-based - Attacks that exploit software vulnerabilities.

Defensive mechanisms have evolved to deal with these different categories, and today's high-profile organizations have learned to deploy them in specific arrangements to maximize their security posture. By working with these companies and fine-tuning their components, you'll learn how F5 has developed a recommended DDoS mitigation architecture that can accommodate specific data center size and industry requirements.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.