SlideShare a Scribd company logo
1 of 18
© 2015 Neustar, Inc. All Rights Reserved.
A RESPONDER’S GUIDE TO
SEEING CLEARLY THROUGH THE SMOKE
DDoS ATTACKS
MOST BUSINESSES ARE AWARE
THAT THE DDOS THREAT IS REAL.
of responders view DDoS attacks as
A GROWING THREAT TO THEIR ORGANIZATION.
report that their organization is
INVESTING MORE OF ITS ANNUAL BUDGET
TO DEFEND AGAINST DDOS ATTACKS.
RECOGNIZING RISK
40%
51%
© 2015 Neustar, Inc. All Rights Reserved.
SECURITY AWARENESS
DDoS attacks are occurring more frequently
and defense spending is growing.
OVER 40% are investing more in
DDoS protection versus last year.
NEARLY 51%
say their investment
should be larger.
© 2015 Neustar, Inc. All Rights Reserved.
“The use of website stressor services, which
lets anyone take down a website for as little
as six dollars an hour—has become a major
source of irritant attacks, with the sizes
jumping during 2014. Increasing mitigation
capacity alone simply isn’t enough, and in
fact will only encourage larger attacks.
We have to become more strategic.”
Rodney Joffe
Senior Vice President, Neustar
© 2015 Neustar, Inc. All Rights Reserved.
FREQUENCY AND COST
FREQUENCY OF ATTACKS:
88% of companies are hit multiple
times, with 39% attacked over
10 times annually.
Attack frequency:
• Once 12%
• 2-5 times 36%
• 6-10 times 13%
• About every month 18%
• About every week 9%
• Lost count 12%
COST OF ATTACKS:
1 in 3 companies (32%) would
lose over $100k-$250k of revenue
per hour.
• Less than $25K 18%
• $29K-$49K 5%
• $50K-$99K 6%
• $100K-$249K 8%
• $250K-$499K 6%
• $500K-$1M 7%
• $1M+ 11%
• Don’t know 39%
© 2015 Neustar, Inc. All Rights Reserved.
40% of those who were attacked in 2014
REPORT THAT MORE THAN 10 STAFF WOULD
BE INVOLVED IN MITIGATION.
DIVERSE ATTACKS, LABOR INTENSE MITIGATION
DDoS attacks come in a wide variety of bandwidth sizes,
FROM 500 MBPS TO MORE THAN 100 GBPS.
© 2015 Neustar, Inc. All Rights Reserved.
“The reputation of the business is at risk. Having the
availability or performance of a highly visible service or
resource impacted by a DDoS attack suggests that the
company is not prepared from a security perspective
and that the lack of preparation may extend into other
security-related areas such as their customers’
personally identifiable information (PII) or their own
intellectual property (IP).”
Bryant Rump
Senior Sales Engineer, Neustar
© 2015 Neustar, Inc. All Rights Reserved.
ATTACK SIZE IN BANDWIDTH
• 500-999 Mbps 22%
• 1-4.9 Gbps 20%
• 5-9.9 Gbps 16%
• 10-19.9 Gbps 11%
• 20-49.9 Gbps 8%
• 50-100 Gbps 5%
• 100+ Gbps 1%
• Don’t know 11%
IS YOUR COMPANY PREPARED TO
FEND OFF ATTACKS OF ALL SIZES?
© 2015 Neustar, Inc. All Rights Reserved.
THE REAL IMPACT
of those who experienced a
DDoS attack in 2014 report
they suffered a loss of
customer trust and damage
to their brand.
say the most common area
of business affected by an
outage from a DDoS attack is
customer support.
say attacks caused
brand damage and eroded
customer trust
31%
51%
40%
Other impacted areas include:
• Online marketing 18%
• Revenue 18%
• Data theft 12%
• Other 28%
© 2015 Neustar, Inc. All Rights Reserved.
Amit Yoran
RSA president
“No matter how high or smart the walls, focused adversaries
will find ways over, under, around, and through.You must
understand what matters to your business and what is
mission critical [and] defend it with everything you have.”
© 2015 Neustar, Inc. All Rights Reserved.
CURRENT PROTECTION IS NOT ENOUGH
SECURITY METHOD:
61% use a traditional firewall, 51%
use switches and routers, and 49%
use a DDoS mitigation service.
• Traditional firewall
ISP-based 61%
• WAF, switches and routers 51%
• DDoS mitigation service 49%
• Hybrid protection 31%
• DDoS mitigation appliance 26%
• WAF 20%
• CDN 14%
• No protection 3%
RESPONSE TIME:
41% took more than an hour to
detect it; 45% took more than an
hour to respond once they
detected the attack.
Response time after detection:
• Less than an hour 59%
• 1-2 hours 24%
• 3-5 hours 8%
• 6-12 hours 4%
• 12-24 hours 3%
• More than a day 2%
© 2015 Neustar, Inc. All Rights Reserved.
3 KEYS TO
PREVENTING
AND MITIGATING
DDoS ATTACKS
© 2015 Neustar, Inc. All Rights Reserved.
RECOGNIZE DDoS AS A THREAT
Of the directors and managers who are buyers,
65% BELIEVE DDoS IS A SERIOUS ISSUE.
Ensure buy-in on increasing security measures
from the CMO and other C-suite executives.
More organizations are demanding DDoS
mitigation solutions.
1
© 2015 Neustar, Inc. All Rights Reserved.
INCREASE YOUR SECURITY INVESTMENTS
Over 50% are INVESTING MORE IN PROTECTION
than a year ago.
Review your current investment and gauge how much
you need to increase in order to be better protected.
2
© 2015 Neustar, Inc. All Rights Reserved.
ADOPT A HYBRID STRATEGY
Over 30% of companies have
ADOPTED A HYBRID DEFENSE.
With always on, on-premises
hardware blocking attacks
instantly, plus cloud-based
traffic-scrubbing to handle
larger strikes, hybrid solutions
offer the best of both worlds.
3
“As DDoS attack characteristics
become more complex,
organizations are finding value
in ‘hybrid’ DDoS mitigation
strategies, driving new alliances
and acquisitions among
complementary DDoS
mitigation solution providers.”
– Gartner Research, Competitive
Landscape: DDoS Mitigation Solutions,
October 20 14
© 2015 Neustar, Inc. All Rights Reserved.
THE BOTTOM LINE
Even if you don’t see super-sized attacks, your business
is still impacted across its operations—respond by
investing in layered DDoS defenses.
In a sector where large attacks derail online
promotions, technology companies need to spend more
to protect their marketing investments.
Faced with recurring attacks and substantial revenue
to protect, retailers must adopt hybrid solutions at a
brisk clip.
1.
2.
3.
© 2015 Neustar, Inc. All Rights Reserved.
To mitigate DDoS attacks, Neustar blends expertise, proven
responses, and diverse technologies.
Neustar SiteProtect, our DDoS mitigation service, offers
options to meet your level of risk, budget, and technical
environment: cloud-based protection; on-premise, always-on
hardware; or a hybrid of both, fully managed by us.
SiteProtect is backed by the Neustar Security Operations
Center, whose experts bring years of experience to blocking
every attack.
*All data contained in this report is from US companies in 2014
Learn more about DDoS protection at
http://www.neustar.biz.
© 2015 Neustar, Inc. All Rights Reserved.
ABOUT NEUSTAR
Neustar, Inc. (NYSE:NSR) is the first real-time provider of
cloud-based information services and data analytics,
enabling marketing and IT security professionals to promote
and protect their businesses. With a commitment to privacy
and neutrality, Neustar operates complex data registries and
uses its expertise to deliver actionable, data-driven insights
that help clients make high-value business decisions in real
time, one customer interaction at a time.
© 2015 Neustar, Inc. All Rights Reserved.

More Related Content

What's hot

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 ReportFortis
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricRahul Neel Mani
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltdos
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain OpenDNS
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...OK2OK
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantHaltdos
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataArmor
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...NetworkCollaborators
 

What's hot (20)

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
DDoS Hurts Everyone
DDoS Hurts EveryoneDDoS Hurts Everyone
DDoS Hurts Everyone
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 

Similar to A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke

Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS ProvidersNeil Hinton
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Hope Frank
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationCorero Network Security
 
The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFDominik Suter
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security PresentationIdeba
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDosGCC Computers
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...Aggregage
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsAPNIC
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...MazeBolt Technologies
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threatsPedro Espinosa
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationR. Blake Martin
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxTheWalkerGroup1
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – DataFujitsu Middle East
 

Similar to A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke (20)

Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS Providers
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
 
The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDos
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report Highlights
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docx
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 

More from Neustar, Inc.

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler InsightsNeustar, Inc.
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceNeustar, Inc.
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsNeustar, Inc.
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Neustar, Inc.
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra ExperienceNeustar, Inc.
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..Neustar, Inc.
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedNeustar, Inc.
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The CloudNeustar, Inc.
 
The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsNeustar, Inc.
 

More from Neustar, Inc. (11)

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experience
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
 
Adweek and Neustar
Adweek and NeustarAdweek and Neustar
Adweek and Neustar
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research Topics
 

Recently uploaded

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 

Recently uploaded (20)

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 

A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke

  • 1. © 2015 Neustar, Inc. All Rights Reserved. A RESPONDER’S GUIDE TO SEEING CLEARLY THROUGH THE SMOKE DDoS ATTACKS
  • 2. MOST BUSINESSES ARE AWARE THAT THE DDOS THREAT IS REAL. of responders view DDoS attacks as A GROWING THREAT TO THEIR ORGANIZATION. report that their organization is INVESTING MORE OF ITS ANNUAL BUDGET TO DEFEND AGAINST DDOS ATTACKS. RECOGNIZING RISK 40% 51% © 2015 Neustar, Inc. All Rights Reserved.
  • 3. SECURITY AWARENESS DDoS attacks are occurring more frequently and defense spending is growing. OVER 40% are investing more in DDoS protection versus last year. NEARLY 51% say their investment should be larger. © 2015 Neustar, Inc. All Rights Reserved.
  • 4. “The use of website stressor services, which lets anyone take down a website for as little as six dollars an hour—has become a major source of irritant attacks, with the sizes jumping during 2014. Increasing mitigation capacity alone simply isn’t enough, and in fact will only encourage larger attacks. We have to become more strategic.” Rodney Joffe Senior Vice President, Neustar © 2015 Neustar, Inc. All Rights Reserved.
  • 5. FREQUENCY AND COST FREQUENCY OF ATTACKS: 88% of companies are hit multiple times, with 39% attacked over 10 times annually. Attack frequency: • Once 12% • 2-5 times 36% • 6-10 times 13% • About every month 18% • About every week 9% • Lost count 12% COST OF ATTACKS: 1 in 3 companies (32%) would lose over $100k-$250k of revenue per hour. • Less than $25K 18% • $29K-$49K 5% • $50K-$99K 6% • $100K-$249K 8% • $250K-$499K 6% • $500K-$1M 7% • $1M+ 11% • Don’t know 39% © 2015 Neustar, Inc. All Rights Reserved.
  • 6. 40% of those who were attacked in 2014 REPORT THAT MORE THAN 10 STAFF WOULD BE INVOLVED IN MITIGATION. DIVERSE ATTACKS, LABOR INTENSE MITIGATION DDoS attacks come in a wide variety of bandwidth sizes, FROM 500 MBPS TO MORE THAN 100 GBPS. © 2015 Neustar, Inc. All Rights Reserved.
  • 7. “The reputation of the business is at risk. Having the availability or performance of a highly visible service or resource impacted by a DDoS attack suggests that the company is not prepared from a security perspective and that the lack of preparation may extend into other security-related areas such as their customers’ personally identifiable information (PII) or their own intellectual property (IP).” Bryant Rump Senior Sales Engineer, Neustar © 2015 Neustar, Inc. All Rights Reserved.
  • 8. ATTACK SIZE IN BANDWIDTH • 500-999 Mbps 22% • 1-4.9 Gbps 20% • 5-9.9 Gbps 16% • 10-19.9 Gbps 11% • 20-49.9 Gbps 8% • 50-100 Gbps 5% • 100+ Gbps 1% • Don’t know 11% IS YOUR COMPANY PREPARED TO FEND OFF ATTACKS OF ALL SIZES? © 2015 Neustar, Inc. All Rights Reserved.
  • 9. THE REAL IMPACT of those who experienced a DDoS attack in 2014 report they suffered a loss of customer trust and damage to their brand. say the most common area of business affected by an outage from a DDoS attack is customer support. say attacks caused brand damage and eroded customer trust 31% 51% 40% Other impacted areas include: • Online marketing 18% • Revenue 18% • Data theft 12% • Other 28% © 2015 Neustar, Inc. All Rights Reserved.
  • 10. Amit Yoran RSA president “No matter how high or smart the walls, focused adversaries will find ways over, under, around, and through.You must understand what matters to your business and what is mission critical [and] defend it with everything you have.” © 2015 Neustar, Inc. All Rights Reserved.
  • 11. CURRENT PROTECTION IS NOT ENOUGH SECURITY METHOD: 61% use a traditional firewall, 51% use switches and routers, and 49% use a DDoS mitigation service. • Traditional firewall ISP-based 61% • WAF, switches and routers 51% • DDoS mitigation service 49% • Hybrid protection 31% • DDoS mitigation appliance 26% • WAF 20% • CDN 14% • No protection 3% RESPONSE TIME: 41% took more than an hour to detect it; 45% took more than an hour to respond once they detected the attack. Response time after detection: • Less than an hour 59% • 1-2 hours 24% • 3-5 hours 8% • 6-12 hours 4% • 12-24 hours 3% • More than a day 2% © 2015 Neustar, Inc. All Rights Reserved.
  • 12. 3 KEYS TO PREVENTING AND MITIGATING DDoS ATTACKS © 2015 Neustar, Inc. All Rights Reserved.
  • 13. RECOGNIZE DDoS AS A THREAT Of the directors and managers who are buyers, 65% BELIEVE DDoS IS A SERIOUS ISSUE. Ensure buy-in on increasing security measures from the CMO and other C-suite executives. More organizations are demanding DDoS mitigation solutions. 1 © 2015 Neustar, Inc. All Rights Reserved.
  • 14. INCREASE YOUR SECURITY INVESTMENTS Over 50% are INVESTING MORE IN PROTECTION than a year ago. Review your current investment and gauge how much you need to increase in order to be better protected. 2 © 2015 Neustar, Inc. All Rights Reserved.
  • 15. ADOPT A HYBRID STRATEGY Over 30% of companies have ADOPTED A HYBRID DEFENSE. With always on, on-premises hardware blocking attacks instantly, plus cloud-based traffic-scrubbing to handle larger strikes, hybrid solutions offer the best of both worlds. 3 “As DDoS attack characteristics become more complex, organizations are finding value in ‘hybrid’ DDoS mitigation strategies, driving new alliances and acquisitions among complementary DDoS mitigation solution providers.” – Gartner Research, Competitive Landscape: DDoS Mitigation Solutions, October 20 14 © 2015 Neustar, Inc. All Rights Reserved.
  • 16. THE BOTTOM LINE Even if you don’t see super-sized attacks, your business is still impacted across its operations—respond by investing in layered DDoS defenses. In a sector where large attacks derail online promotions, technology companies need to spend more to protect their marketing investments. Faced with recurring attacks and substantial revenue to protect, retailers must adopt hybrid solutions at a brisk clip. 1. 2. 3. © 2015 Neustar, Inc. All Rights Reserved.
  • 17. To mitigate DDoS attacks, Neustar blends expertise, proven responses, and diverse technologies. Neustar SiteProtect, our DDoS mitigation service, offers options to meet your level of risk, budget, and technical environment: cloud-based protection; on-premise, always-on hardware; or a hybrid of both, fully managed by us. SiteProtect is backed by the Neustar Security Operations Center, whose experts bring years of experience to blocking every attack. *All data contained in this report is from US companies in 2014 Learn more about DDoS protection at http://www.neustar.biz. © 2015 Neustar, Inc. All Rights Reserved.
  • 18. ABOUT NEUSTAR Neustar, Inc. (NYSE:NSR) is the first real-time provider of cloud-based information services and data analytics, enabling marketing and IT security professionals to promote and protect their businesses. With a commitment to privacy and neutrality, Neustar operates complex data registries and uses its expertise to deliver actionable, data-driven insights that help clients make high-value business decisions in real time, one customer interaction at a time. © 2015 Neustar, Inc. All Rights Reserved.