We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

DDoS protection technology is far from being "install & forget"

Formal Metadata

Title
DDoS protection technology is far from being "install & forget"
Alternative Title
DDoS protection technology is far from being "install and forget"
Title of Series
Part Number
3
Number of Parts
29
Author
License
CC Attribution 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Each of these techniques can then also be deployed in few different ways. Both, protection techniques and deployment architectures will obviously affect the quality of protection while under attack. Although many organizations are failing with DDoS protection, I would say, that most of today's attacks can be successfully mitigated. But don't get me wrong, an effective mitigation requires good understanding on how the technology operates plus a deep knowledge of your network and the applications traversing it. No matter what vendors and service providers promise, DDoS protection technology is far from being "install & forget". In this presentation I will discuss common mitigation techniques, deployment methods and misconceptions of DDoS protection.