Buying or Selling IPv4 Addresses?

Watch this video to discover how ACCELR/8, a transformative trading platform developed by industry veterans Marc Lindsey and Janine Goodman, enables organizations to buy or sell IPv4 blocks as small as /20s.

Avenue4 LLCRead Message Promoted Post

Home / Industry

Protecting Your Business from DDoS Attacks: Advice from Neustar

Point of Sale recently spoke with Ted Swearingen, Director of Security Operations at Neustar, to hear more about DDoS attacks, and to find out how businesses can protect their websites and web-based services.

"DDoS attacks can occur up to 7000 times a day, and the number is continuing to escalate each year," Ted explains. "This is largely due to how easy it has become for someone to launch these attacks." Tools created for launching DDoS attacks have become common, meaning that one person can launch an attack, where it used to typically require more of an orchestrated effort to accomplish. DDoS attacks have also become larger and take a much greater toll than they used to.

Whether it's due to angry customers, social protests, competitors, or other entities, more and more businesses are being affected by DDoS attacks. In just the last year, 3 out of 4 businesses have experienced an attack. Although companies can lessen their chances of becoming a target by refraining from making bold statements or other actions that could cause offense, it is probably wise for companies to think in terms of "when" and not "if" when it comes to DDoS attacks.

In light of this, Ted talks about the options a business should consider for protecting themselves from DDoS attacks. He gives several options to consider, and recommends choosing a solution to fit your business and needs.

Option one: Consider building your own DDoS protection solution in-house. Factoring in the expertise it would take to do this, this option tends to be costly and management intensive.

Option two: Check with your cloud provider, ISP, or external hosting provider. Some of these companies have solutions for protection from DDoS attacks, and some do not. Those that do usually vary in levels of cost and effectiveness, so it may help to explore your options. Keep in mind that though some of these providers can offer a level of protection, they may not always specialize in DDoS protection. Therefore, if you get attacked a number of times, you could end up becoming a liability to them.

Option three: Work with a 3rd party such as Neustar, that has a whole department that is specialized in DDoS attack protection and cyber-security. The benefits of Neustar is that it is cloud based and what Ted calls "vendor agnostic." That means that it doesn't matter what host, ISP, or type of website you have. It is easy to implement and switch over to, and you won't need experts on your own staff to deal with these challenges since you'll have a team of experts managing your security 24/7, with full customer support.

Neustar can tailor solutions to any company, small to large. They offer 2 specific solutions to meet the needs of online businesses today, UltraDNS and SiteProtect. Neustar UltraDNS is a managed domain name systems (DNS) service, handling over 25% of Internet traffic and offering secure and reliable DNS for organizations.

Neustar SiteProtect protects a company's online functions or website from DDoS attacks. It gives customers control over costs by letting them decide when to activate SiteProtect. When they choose to activate it, SiteProtect uses a DNS or BGP (Border Gateway Protocol) to redirect all of the Internet traffic through Neustar's cloud, filtering out the bad traffic and only letting the legitimate traffic through to the site. Neustar SiteProtect offers a defense for websites, email, VOIP, APIs, and more.

Both Neustar solutions combined offer a comprehensive solution to defend against DDoS attacks.

Neustar

About Neustar – Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. Visit Page

Related topics: Cyberattack, Cybersecurity, DDoS, DNS
SHARE THIS POST

If you are pressed for time ...

... this is for you. More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Vinton Cerf, Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Mobile Internet

Sponsored byAfilias

DNS Security

Sponsored byAfilias

IP Addressing

Sponsored byAvenue4 LLC

Cybersecurity

Sponsored byVerisign

Promoted Post

Buying or Selling IPv4 Addresses?

Watch this video to discover how ACCELR/8, a transformative trading platform developed by industry veterans Marc Lindsey and Janine Goodman, enables organizations to buy or sell IPv4 blocks as small as /20s.