Site Search

DDoS Defense: What You Need to Know

DDoS Attacks Are A Real and Present Danger

Attacks are increasing in number, size and intensity — your organization could be next. DDoS protection must be a key tenant of an organization's overall security posture.

In this webcast, security industry expert Eric Vanderburg along with Michael Kaczmarek, Vice President, Product Management at Neustar, explore the latest DDoS attack vectors, including application and protocol attacks, and explain the most effective defensive strategies, including:

  • Traffic pattern analysis
  • Signature analysis
  • State transition analysis
  • Intrusion detection
  • Response rate limiting
  • Perimeter traffic rules
Related Resources