1 / 10

The Broad Impact od DDoS: It’s More than Just an IT Issue

A description of what DDoS attacks can do and the results of a DDos attack.

prolexicc
Download Presentation

The Broad Impact od DDoS: It’s More than Just an IT Issue

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Broad Impact of DDoS: It’s More Than Just an IT Issue www.prolexic.com

  2. The Broad Impact of DDoS: It’s More Than Just an IT Issue www.prolexic.com • DDoS attacks can bring websites down. • When the website is down, it’s more than just an IT problem. • A DDoS attack can result in: • Lost revenue • Dissatisfied customers and a flood of calls • Negative press coverage • Lower stock prices • Search engine rankings

  3. DDoS Attacks Go Beyond IT • DDoS attacks can disrupt: • Email systems • Call centers • VoIP (Voice over IP) telephone networks • Accessibility for customers and employees • Revenue flow when shopping carts are inaccessible • All departments need to be prepared to take action

  4. Estimating the Cost of a DDoS Attack • Forrester Consulting has found that an online company loses an average of US $220,000 per hour during an unmitigated DDoS attack

  5. What is Your Network’s Weak Link? • DDoS attacks can affect different parts of your network • A malicious attacker will chose the one that will do the most damage to you • Examples: • Application (Layer 7) DDoS attacks wreak havoc on load balancers, apps and databases • SYN floods may stop servers and routers • UDP floods may impair routers only • Content switches can easily be overwhelmed

  6. What You Can Do • It’s not a matter of if, but when • The companies that experience the fastest and most successful DDoS attack mitigation have: • A dedicated DDoS mitigation service • A well-tested, well-rehearsed response plan • Run a simulated DDoS attack to confirm your preparedness

  7. Three Features of a DDoS Mitigation Playbook • A DDoS mitigation playbook is a streamlined response plan for: • Managing communications • Identifying key contact persons • Organizing information for easy, fast access

  8. Minimize the Damage to Your Enterprise • The damage from a DDoS attack can quickly spin out of control • Avoid collateral damage by recognizing the broader impact of DDoS attacks – beyond the IT department

  9. Download the Free White Paper • Download the white paper The Broad Impact of DDoS: It’s More than Just an IT Issue at http://www.prolexic.com/impact • The white paper includes: • Details about a DDoS mitigation playbook and how it can help you ensure a streamlined response in an emergency • Why a practiced response is necessary to limit the damage from a DDoS attack • Case studies of enterprises under attack. • 12 questions to ask when evaluating a DDoS mitigation service provider

  10. About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services • Prolexic has successfully stopped DDoS attacks for more than a decade • We stop the largest attacks that exceed the capabilities of other DDoS mitigation service providers

More Related