Home / Industry

Protecting Your Business from DDoS Attacks: Advice from Neustar

Point of Sale recently spoke with Ted Swearingen, Director of Security Operations at Neustar, to hear more about DDoS attacks, and to find out how businesses can protect their websites and web-based services.

"DDoS attacks can occur up to 7000 times a day, and the number is continuing to escalate each year," Ted explains. "This is largely due to how easy it has become for someone to launch these attacks." Tools created for launching DDoS attacks have become common, meaning that one person can launch an attack, where it used to typically require more of an orchestrated effort to accomplish. DDoS attacks have also become larger and take a much greater toll than they used to.

Whether it's due to angry customers, social protests, competitors, or other entities, more and more businesses are being affected by DDoS attacks. In just the last year, 3 out of 4 businesses have experienced an attack. Although companies can lessen their chances of becoming a target by refraining from making bold statements or other actions that could cause offense, it is probably wise for companies to think in terms of "when" and not "if" when it comes to DDoS attacks.

In light of this, Ted talks about the options a business should consider for protecting themselves from DDoS attacks. He gives several options to consider, and recommends choosing a solution to fit your business and needs.

Option one: Consider building your own DDoS protection solution in-house. Factoring in the expertise it would take to do this, this option tends to be costly and management intensive.

Option two: Check with your cloud provider, ISP, or external hosting provider. Some of these companies have solutions for protection from DDoS attacks, and some do not. Those that do usually vary in levels of cost and effectiveness, so it may help to explore your options. Keep in mind that though some of these providers can offer a level of protection, they may not always specialize in DDoS protection. Therefore, if you get attacked a number of times, you could end up becoming a liability to them.

Option three: Work with a 3rd party such as Neustar, that has a whole department that is specialized in DDoS attack protection and cyber-security. The benefits of Neustar is that it is cloud based and what Ted calls "vendor agnostic." That means that it doesn't matter what host, ISP, or type of website you have. It is easy to implement and switch over to, and you won't need experts on your own staff to deal with these challenges since you'll have a team of experts managing your security 24/7, with full customer support.

Neustar can tailor solutions to any company, small to large. They offer 2 specific solutions to meet the needs of online businesses today, UltraDNS and SiteProtect. Neustar UltraDNS is a managed domain name systems (DNS) service, handling over 25% of Internet traffic and offering secure and reliable DNS for organizations.

Neustar SiteProtect protects a company's online functions or website from DDoS attacks. It gives customers control over costs by letting them decide when to activate SiteProtect. When they choose to activate it, SiteProtect uses a DNS or BGP (Border Gateway Protocol) to redirect all of the Internet traffic through Neustar's cloud, filtering out the bad traffic and only letting the legitimate traffic through to the site. Neustar SiteProtect offers a defense for websites, email, VOIP, APIs, and more.

Both Neustar solutions combined offer a comprehensive solution to defend against DDoS attacks.

About Neustar

Neustar

NeuStar provides market-leading and innovative services that enable trusted communication across networks, applications, and enterprises around the world. (Learn More)

Related topics: Cyberattack, DDoS, DNS, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

Nominum Announces Future Ready DNS

New from Verisign Labs - Measuring Privacy Disclosures in URL Query Strings

DotConnectAfrica Delegates Attend the Kenya Internet Governance Forum

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Continuing to Work in the Public Interest

Verisign Named to the OTA's 2014 Online Trust Honor Roll

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

Dyn Acquires Internet Intelligence Company, Renesys

Tips to Address New FFIEC DDoS Requirements

Smokescreening: Data Theft Makes DDoS More Dangerous

Introducing getdns: a Modern, Extensible, Open Source API for the DNS

Why We Decided to Stop Offering Free Accounts

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

Tony Kirsch Announced As Head of Global Consulting of ARI Registry Services

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

Dyn Acquires Managed DNS Provider Nettica

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Why Managed DNS Means Secure DNS

SPECIAL: Video Interviews from NamesCon 2014 in Las Vegas

Sponsored Topics