The Broad Impact of DDoS: It’s More than Just an IT Issue
Upcoming SlideShare
Loading in...5
×
 

The Broad Impact of DDoS: It’s More than Just an IT Issue

on

  • 389 views

A description of what DDoS attacks can do and the results of a DDos attack.

A description of what DDoS attacks can do and the results of a DDos attack.

Statistics

Views

Total Views
389
Views on SlideShare
389
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The Broad Impact of DDoS: It’s More than Just an IT Issue The Broad Impact of DDoS: It’s More than Just an IT Issue Presentation Transcript

  • CONFIDENTIALwww.prolexic.comThe Broad Impact of DDoS: It’s More Than Just an IT Issuewww.prolexic.com
  • www.prolexic.comThe Broad Impact of DDoS: It’s More Than Justan IT Issue• DDoS attacks can bring websites down.• When the website is down, it’s more than just anIT problem.• A DDoS attack can result in:• Lost revenue• Dissatisfied customers and a flood of calls• Negative press coverage• Lower stock prices• Search engine rankings2May 2013 www.prolexic.com
  • www.prolexic.comDDoS Attacks Go Beyond IT• DDoS attacks can disrupt:• Email systems• Call centers• VoIP (Voice over IP) telephone networks• Accessibility for customers and employees• Revenue flow when shopping carts are inaccessible• All departments need to be prepared to takeaction3
  • www.prolexic.comEstimating the Cost of a DDoS Attack• Forrester Consulting hasfound that an onlinecompany loses anaverage of US $220,000per hour during anunmitigated DDoSattack4
  • www.prolexic.comWhat is Your Network’s Weak Link?• DDoS attacks can affect different parts of yournetwork• A malicious attacker will chose the one that willdo the most damage to you• Examples:• Application (Layer 7) DDoS attacks wreak havoc onload balancers, apps and databases• SYN floods may stop servers and routers• UDP floods may impair routers only• Content switches can easily be overwhelmed5
  • www.prolexic.comWhat You Can Do• It’s not a matter of if, but when• The companies that experience the fastestand most successful DDoS attack mitigationhave:• A dedicated DDoS mitigation service• A well-tested, well-rehearsed response plan• Run a simulated DDoS attack to confirm yourpreparedness6
  • www.prolexic.comThree Features of a DDoS Mitigation PlaybookA DDoS mitigation playbook is a streamlinedresponse plan for:• Managing communications• Identifying key contact persons• Organizing information for easy, fast access7
  • www.prolexic.comMinimize the Damage to Your Enterprise• The damage from a DDoS attack can quicklyspin out of control• Avoid collateral damage by recognizing thebroader impact of DDoS attacks – beyond theIT department8
  • www.prolexic.comDownload the Free White Paper• Download the white paper The Broad Impact of DDoS: It’sMore than Just an IT Issue athttp://www.prolexic.com/impact• The white paper includes:• Details about a DDoS mitigation playbook and how itcan help you ensure a streamlined response in anemergency• Why a practiced response is necessary to limit thedamage from a DDoS attack• Case studies of enterprises under attack.• 12 questions to ask when evaluating a DDoS mitigationservice provider9
  • www.prolexic.comAbout Prolexic• Prolexic Technologies is the world’s largestand most trusted provider of DDoS protectionand mitigation services• Prolexic has successfully stopped DDoSattacks for more than a decade• We stop the largest attacks that exceed thecapabilities of other DDoS mitigation serviceproviders10