DDoS Protection for Networks: Divert Traffic Using More Specific Routin

In our previous blog post, we talked about AS (autonomous system) prepending, but sometimes a customer might have restrictions that would not allow them to use AS prepending. If the customer owned more than a less specific prefix, for example /23 prefi… Continue reading DDoS Protection for Networks: Divert Traffic Using More Specific Routin

Key Elements for DDoS Detection, Mitigation and Analysis

Given today’s volatile DDoS threat landscape with attacks ranging from massive volumetric assaults to sophisticated and persistent application level threats, comprehensive protection is a must for online businesses. But what are the most importan… Continue reading Key Elements for DDoS Detection, Mitigation and Analysis

What To Consider When Evaluating DDoS Mitigation Services

In this video, Dileep Mishra, a Radware Sales Engineer, discusses three key factors to consider when evaluating DDoS mitigation services.
The post What To Consider When Evaluating DDoS Mitigation Services appeared first on Radware Blog.
The post What … Continue reading What To Consider When Evaluating DDoS Mitigation Services

Smart Mesh Topology Boosts Capacity and Performance

Recently we introduced our advanced architectural topology for ensuring that traffic inspection and request logs are maintained within the region. This capability is especially beneficial to our customers who need to meet certain regional compliance re… Continue reading Smart Mesh Topology Boosts Capacity and Performance

Deploy a Cloud WAF & DDoS Solution While Complying with Australian Data Sovereignty

Australia has strict data sovereignty laws in place to ensure that personal customer data remains within the country’s borders. However, we often hear about cloud-based WAF vendors being unable to guarantee that data will not be moved across bord… Continue reading Deploy a Cloud WAF & DDoS Solution While Complying with Australian Data Sovereignty

Lift the DDoS Smokescreen: Investigate Underlying Attacks

“Hold out baits to entice the enemy. Feign disorder, and crush him.” ~ Sun Tzu The sophistication of cybercriminals and the attraction of the “Black Hat” cyberspace have grown dramatically over the years. In the past, cyber assa… Continue reading Lift the DDoS Smokescreen: Investigate Underlying Attacks