When links are attacked…
DDoS (Distributed Denial of Service) attacks are a problem that gets a lot of press coverage, especially from a press corps that doesn’t know what it is, or the techniques used to detect and thwart this type of interruption to a working business.
There are many ways that the “black-hat” attackers can kick these attacks off, with the smallest security flaw being able to compromise innocuous equipment in your network (think, the Mirai code that brought down a DNS provider called Dyn.
Hundreds or thousands of devices on the Internet sending traffic (some legitimate, some not) to a few machines to overwhelm them, causing full comms links and crashed software, resulting in business interruption, data theft and worse.
When protecting yourself or your customers from DDoS attacks, there can be a high risk of false-positives. So, in trying to protect against an attack, one wrong move means that your risk of filtering out legitimate traffic and kicking an “own goal” and inflicting a DDoS on yourself.
So, it pays to try out a new solution with testing in a Proof-of-Concept trial to gain some practical experience.
The Investment dilemma
Making investments in new technology is complex
because data sheet statistics only tell part of the story.
For quantifiable data on how a technology will actually work
in their particular network, organizations must test at scale
with real-world application traffic and security attacks.”
Sashi Jeyaretnam | Director of Product Management, Ixia
For companies trialling a new protection system, there can be a lot of work in doing a Proof of concept (PoC). In fact, we have seen over the years that, in many cases, there is often no clarity in the concept is everyone is trying to prove!
The result of a trial can be very subjective – the participants end up without reaching a common goal or understanding of the problem. A professional partner can add practical experience to extracting a valuable outcome.
Platform evaluation – an example
Evaluating difficult technical platforms can be an enormous challenge, so helpful resources are always welcome.
For telelecom carriers and service providers that are trying to protect customers from DDoS attack, fast detection and automated responses can be vital for service reliability and protecting customers’ reputation.
RedFig has great skills in operational integration and deployment of this class of carrier equipment, integration and operational management.