SlideShare une entreprise Scribd logo
1  sur  10
CONFIDENTIALwww.prolexic.com
Planning for and Validating a DDoS Defense Strategy
www.prolexic.com
www.prolexic.com
Planning for and Validating a DDoS Defense
Strategy
• DDoS attacks can cost businesses:
• Sales
• Customer loyalty
• Search engine rankings
• An attack on an unprepared business can result
in several days of downtime
• Having a solid DDoS response plan as part of
your company’s business continuity plan is
essential
2
May 2013 www.prolexic.com
www.prolexic.com
Best Practices for DDoS Mitigation Validation
With the DDoS mitigation service active
• Verify that all applications are performing properly
• Verify all routing and DNS is working
• Generate a few gigabits of controlled traffic to
validate features of the service, including:
• Alerting
• Activation
• Mitigation
3
www.prolexic.com
Best Practices for DDoS Mitigation Validation
• Validate your on-premise monitoring systems
• Test small levels of traffic without scrubbing and
without any DDoS protection
• Identify stress points on your network
• Conduct baseline testing and calibrate systems to
remediate vulnerabilities
• Schedule validation tests on a regular basis
(yearly or quarterly)
• If network issues arise during testing, make
modifications
4
www.prolexic.com
Best Practices for DDoS Mitigation Validation
• Based on the test results, develop a mitigation
playbook as part of an incident response plan
• This plan ensures that everyone in the
organization knows what to do and expect when
a DDoS attack hits
Download the full report from Prolexic for more information
about best practices to ensure your DDoS mitigation service can
protect your business.
5
www.prolexic.com
Estimating the Cost of a DDoS Attack
• Forrester Consulting has
found that an online
company loses an
average of US $220,000
per hour during an
unmitigated DDoS
attack
6
www.prolexic.com
Be Prepared: Test and Validate
• Every company that does business online is vulnerable to
DDoS attacks
• Talk to your DDoS mitigation provider before an attack
happens
• Test and validate your DDoS mitigation service regularly.
Download the full report for more information about how to test
and validate a DDoS defense plan.
7
www.prolexic.com
Create an Operations Plan for DDoS Attacks
• In addition to testing and validating your DDoS
mitigation service, develop a strong
operational plan for activation and
communication in the event of a DDoS attack
8
www.prolexic.com
Download the Free White Paper
• Download the white paper Planning for and Validating a
DDoS Defense at http://www.prolexic.com/planning
• The white paper includes:
• Detailed enterprise case studies that show the
consequences of inadequate preparation
• What to include in your anti-DDoS playbook
• A best-practice case study of DDoS attack readiness
• How to validate your DDoS defense
9
www.prolexic.com
About Prolexic
• Prolexic Technologies is the world’s largest
and most trusted provider of DDoS protection
and mitigation services
• Prolexic has successfully stopped DDoS
attacks for more than a decade
• We stop the largest attacks that exceed the
capabilities of other DDoS mitigation service
providers
10

Contenu connexe

En vedette

Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Christophe Mercier
 
MVC Revivial on the Web
MVC Revivial on the WebMVC Revivial on the Web
MVC Revivial on the WebESUG
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeSumant Tambe
 
design wheel for locomotive
design wheel for locomotivedesign wheel for locomotive
design wheel for locomotiveBurhan Awang
 
The Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemThe Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemESUG
 
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 Ken'ichi Matsui
 
How to Calculate Average First Reply Time
How to Calculate Average First Reply TimeHow to Calculate Average First Reply Time
How to Calculate Average First Reply TimeKayako
 
Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)Soh Shing
 
Indian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreIndian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreRao Khola
 
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015MetricNet
 
プログラマのための線形代数再入門
プログラマのための線形代数再入門プログラマのための線形代数再入門
プログラマのための線形代数再入門Taketo Sano
 
Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門樽八 仲川
 
Carat's 10 Trends for 2017
Carat's 10 Trends for 2017Carat's 10 Trends for 2017
Carat's 10 Trends for 2017dentsu
 
Research and Development
Research and DevelopmentResearch and Development
Research and DevelopmentShameem Ali
 

En vedette (18)

Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...
 
Experiencing the Live IIoT
Experiencing the Live IIoTExperiencing the Live IIoT
Experiencing the Live IIoT
 
MVC Revivial on the Web
MVC Revivial on the WebMVC Revivial on the Web
MVC Revivial on the Web
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/Subscribe
 
design wheel for locomotive
design wheel for locomotivedesign wheel for locomotive
design wheel for locomotive
 
Introduction to Replies by Gemma Buckley
Introduction to Replies by Gemma BuckleyIntroduction to Replies by Gemma Buckley
Introduction to Replies by Gemma Buckley
 
The Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemThe Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the Ecosystem
 
Hand book on C&W
Hand book on C&W Hand book on C&W
Hand book on C&W
 
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
 
How to Calculate Average First Reply Time
How to Calculate Average First Reply TimeHow to Calculate Average First Reply Time
How to Calculate Average First Reply Time
 
Norris Portfolio
Norris PortfolioNorris Portfolio
Norris Portfolio
 
Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)
 
Indian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreIndian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care Centre
 
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
 
プログラマのための線形代数再入門
プログラマのための線形代数再入門プログラマのための線形代数再入門
プログラマのための線形代数再入門
 
Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門
 
Carat's 10 Trends for 2017
Carat's 10 Trends for 2017Carat's 10 Trends for 2017
Carat's 10 Trends for 2017
 
Research and Development
Research and DevelopmentResearch and Development
Research and Development
 

Plus de State of the Internet

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of the Internet
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterState of the Internet
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicState of the Internet
 
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsQ3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsState of the Internet
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsState of the Internet
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicState of the Internet
 

Plus de State of the Internet (8)

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by Quarter
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 Infographic
 
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsQ3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack Statistics
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - Infographic
 
DDoS Attack & Defense Infographic
DDoS Attack & Defense InfographicDDoS Attack & Defense Infographic
DDoS Attack & Defense Infographic
 
Q3 2013 Global DDoS Attack Report
Q3 2013 Global DDoS Attack ReportQ3 2013 Global DDoS Attack Report
Q3 2013 Global DDoS Attack Report
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Knowledge center-white-paper-planning-and-validating-your-ddos-defense

  • 1. CONFIDENTIALwww.prolexic.com Planning for and Validating a DDoS Defense Strategy www.prolexic.com
  • 2. www.prolexic.com Planning for and Validating a DDoS Defense Strategy • DDoS attacks can cost businesses: • Sales • Customer loyalty • Search engine rankings • An attack on an unprepared business can result in several days of downtime • Having a solid DDoS response plan as part of your company’s business continuity plan is essential 2 May 2013 www.prolexic.com
  • 3. www.prolexic.com Best Practices for DDoS Mitigation Validation With the DDoS mitigation service active • Verify that all applications are performing properly • Verify all routing and DNS is working • Generate a few gigabits of controlled traffic to validate features of the service, including: • Alerting • Activation • Mitigation 3
  • 4. www.prolexic.com Best Practices for DDoS Mitigation Validation • Validate your on-premise monitoring systems • Test small levels of traffic without scrubbing and without any DDoS protection • Identify stress points on your network • Conduct baseline testing and calibrate systems to remediate vulnerabilities • Schedule validation tests on a regular basis (yearly or quarterly) • If network issues arise during testing, make modifications 4
  • 5. www.prolexic.com Best Practices for DDoS Mitigation Validation • Based on the test results, develop a mitigation playbook as part of an incident response plan • This plan ensures that everyone in the organization knows what to do and expect when a DDoS attack hits Download the full report from Prolexic for more information about best practices to ensure your DDoS mitigation service can protect your business. 5
  • 6. www.prolexic.com Estimating the Cost of a DDoS Attack • Forrester Consulting has found that an online company loses an average of US $220,000 per hour during an unmitigated DDoS attack 6
  • 7. www.prolexic.com Be Prepared: Test and Validate • Every company that does business online is vulnerable to DDoS attacks • Talk to your DDoS mitigation provider before an attack happens • Test and validate your DDoS mitigation service regularly. Download the full report for more information about how to test and validate a DDoS defense plan. 7
  • 8. www.prolexic.com Create an Operations Plan for DDoS Attacks • In addition to testing and validating your DDoS mitigation service, develop a strong operational plan for activation and communication in the event of a DDoS attack 8
  • 9. www.prolexic.com Download the Free White Paper • Download the white paper Planning for and Validating a DDoS Defense at http://www.prolexic.com/planning • The white paper includes: • Detailed enterprise case studies that show the consequences of inadequate preparation • What to include in your anti-DDoS playbook • A best-practice case study of DDoS attack readiness • How to validate your DDoS defense 9
  • 10. www.prolexic.com About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services • Prolexic has successfully stopped DDoS attacks for more than a decade • We stop the largest attacks that exceed the capabilities of other DDoS mitigation service providers 10