• Technologies
    • Black Lotus Labs
    • Cloud
    • Edge Compute
    • Collaboration
    • Managed Services
    • Network
    • Security
  • Business Advice
    • 4th Industrial Revolution
    • Business Continuity & Disaster Recovery
    • Customer Experience
    • Data Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Healthcare
    • Gaming
    • Manufacturing
    • Media and Entertainment
    • Pharmaceutical
    • Public Sector
    • Retail
    • Technology
  • About Us
    • Leadership Perspectives
    • NewsRoom
    • LATAM Blog
  • Technologies
    • Black Lotus Labs
    • Cloud
    • Edge Compute
    • Collaboration
    • Managed Services
    • Network
    • Security
  • Business Advice
    • 4th Industrial Revolution
    • Business Continuity & Disaster Recovery
    • Customer Experience
    • Data Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Healthcare
    • Gaming
    • Manufacturing
    • Media and Entertainment
    • Pharmaceutical
    • Public Sector
    • Retail
    • Technology
  • About Us
    • Leadership Perspectives
    • NewsRoom
    • LATAM Blog

7 Questions to Ask a Potential DDoS Mitigation Provider

LumenLumen Posted On May 30, 2019
0


0
Shares
  • Share On Facebook
  • Tweet It

63vEQrZjKNFG9FmM11cM-xA8

Distributed denial of service (DDoS) attacks are a CIO’s nightmare. Launched by hacktivists and online extortionists, they can bring a network to its knees. DDoS mitigation services offer peace of mind by detecting and dealing with attacks, but they are not all created equal. Here are some questions to ask potential service providers.

What is your deployment model?

Ensure that your prospective DDoS mitigation provider’s deployment model makes sense for you. There are three approaches:

Cloud-based. Mitigate DDoS attacks via scrubbing centers that catch traffic before it reaches your network. It requires no installation of on-site hardware.

On-site. An on-site appliance examines traffic as it reaches your network. It can be better at detecting stealthy “low and slow” attacks.

Hybrid. Mix cloud and on-premises approaches for the best of both worlds. The on-site appliance can signal the cloud component to take over if it becomes overwhelmed.

Your deployment model will depend on your appetite for on-site installations, your risk profile, and the expected attack type.

Which attack types can you protect against?

There are many kinds of DDoS attacks, spanning different layers of the technology stack. Each attack type carries its own threats and mitigation techniques.

Your DDoS provider should be able to mitigate attacks at layers three and four, where attackers can flood a network switch with data packets. It should also be able to handle attacks at layers further up the stack, which use more protocols such as ICMP, TCP, and UDP. Some higher-layer attacks use compression and encryption protocols such as SSL to tunnel HTTPS attacks against the server. Layer seven (application layer) attackers can even use HTTP GET and POST requests to choke server traffic. Pick a provider that can easily deal with all of these.

How much network visibility and control do you have?

A provider that owns a backbone network with many peering points can identify and neutralize DDoS traffic early, even if it originates in many places. A service provider that doesn’t control its own network either won’t have the same network visibility or must rely on a core network infrastructure owner. Pick a company that has sufficient scrubbing centers and which controls its own backbone network, ideally spanning multiple continents. A company that can support multi-carrier circuits will also provide you with more flexibility as your enterprise wide-area networking strategy evolves.

What is your network capacity?

Your service provider should have the network capacity to absorb such attacks. Capacity involves more than network throughput. Ask your would-be DDoS mitigation provider about its processing capability. How quickly can its scrubbing centers analyze and forward network packets? It should give you this figure in millions of packets per second. This is a key factor in determining traffic latency in a cloud-based traffic scrubbing solution.

What is your response time?

When a DDoS attack hits, you want to recover as quickly as possible. Ask your provider how quickly it detects an attack and diverts incoming traffic to its DDoS protection service.

What will you need from us?

The less time and effort you need to spend setting up the solution, the better. Talk to your potential DDoS provider about the onboarding process. Will you need to change your ISP or alter your configurations with your existing service provider? Will you need to install hardware on your own premises, and if so, how difficult will this be to set up? How long will it take to begin service after signing the contract?

What is your pricing structure?

DDoS mitigation pricing models vary, with some companies focusing on the time or bandwidth spent repelling each attack, and others charging a flat monthly fee. Examine your own risk profile to see what makes most sense for you. A high-profile company that is constantly under attack from hacktivists or online extortionists may find a flat fee more appropriate, for example. Just be sure that your DDoS mitigation provider offers simple, flexible pricing options that match your business needs.

These questions will prepare you for conversations with your potential DDoS service provider. There are no right or wrong providers, but there are services that make the most sense for your company. Consider a provider that offers multilayered DDoS services, combining network mitigation with threat intelligence so that it understands specific DDoS attackers’ modus operandi. Also, ensure that your DDoS mitigation provider offers extra intelligence in the form of detailed traffic analytics, and flow-based monitoring services that give you a comprehensive picture of what is happening on your network.

For more information about how to choose a DDoS mitigation service, download this excerpt of the IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Assessment.

Read More

This blog is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. CenturyLink does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user.

Related posts:

  1. Don’t Miss out on these 5 Data Protection Steps
  2. How to Prepare Your Midsize Business for 4 Emerging Cybersecurity Threats
  3. Anatomy of a Nation State Hack
  4. Do Collaboration Tools Create Security Risks for Your Business?
0
Shares
  • Share On Facebook
  • Tweet It


AdviceCybersecurityDDoS


Lumen
Author

Lumen

Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure global platform for applications and data to help businesses, government and communities deliver amazing experiences.

Trending Now
Banking and Financial Services: Trends to Look Out For in 2021
Emily Lyons February 24, 2021
It’s Time for the Next Generation of 9-1-1
Michael Zody February 18, 2021
You may also like
How to Get More out of Your WAF with an Integrated Approach
February 18, 2021
New Year’s Resolutions: Exercise, Eat Healthy… Protect Your Data
January 22, 2021
The Reemergence of Ransom-based Distributed Denial of Service (RDDoS) Attacks
January 14, 2021
The Latest in Innovation in the SD-WAN Managed Services Market
Read Next

The Latest in Innovation in the SD-WAN Managed Services Market

  • Categories

    Adaptive Networking

    Connected Security

    Hybrid Cloud

    Communications and Collaboration

    Edge Computing


  • Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences.

Services not available everywhere. ©2021 Lumen Technologies. All Rights Reserved.
Press enter/return to begin your search