| | November 20156CIOReviewCopyright © 2015 CIOReview. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.CIOReviewNOVEMBER 20 - 2015Mailing AddressCIOReview44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.402.1463, F:510-894-8405 NOVEMBER 20 - 2015, Volume 04 SE-105 Published by CIOReview To subscribe to CIOReviewVisit www.cioreview.com Managing EditorJeevan GeorgeEditorial StaffSalesT:510.565.7614VisualizersStephen ThomasArun ThomasAlex D' SouzaAnwesha BoseLinda RebeccaRonald Magnus Allwyn JoeJudy CristinPhilip ArcherSandeepa MajumdarDDoS SpecialCIOReviewImmaculate D'souzaimmaculate@cioreview.comBack in 2000, DDoS attacks were a newly emerging menace. When some of the Internet's largest websites including CNN, MSN, Yahoo and others were disrupted by DDoS attacks, the media de-scribed it as 'cyber-attacks battering web heavyweights'. Today, DDoS attacks have gotten to that level and are well-known forms of cyber abuse--with Swiss encrypted webmail provider Proton-Mail being the latest target of a sustained DDoS attack.A DDoS attack is not a sophisticated attack. It's the functional equivalent of a caveman with a club. As the name implies, a DDoS prevents users from accessing a site and services by throwing a mas-sive amount of data against the company's hosting and web services. Some attacks can exceed one TB per second--100,000 times a typical home bandwidth connection directed at one target.The recent data from the ATLAS threat report, a collaborative project between Google Ideas and Arbor Networks, observed over 2,000 denial of service attacks per day. According to a study, deni-al of service attacks cost business between $5,000 and $40,000 per hour in lost revenue. Attackers can be extortionists, competitors, hactivists, or vandalists.The methods and techniques being used for DDoS attacks are continuously evolving, with attackers looking for new ways of `freezing' their victims' operations. Even with a large staff of IT profes-sionals it is almost impossible for companies to handle a serious DDoS attack and recover their services on their own. The most dangerous part is that companies may never learn that they were subjected to DDoS smokescreening.How should businesses and organizations that aren't staffed with professional network experts or a large cash reserve respond to threats of cyber-blackmail and massive denial of service attacks respond?The answer for now lies in being prepared, having knowledge of the attack and quick response. At this crucial point, CIOReview in this edition has come up with a list of `The 20 Most Promising DDoS Solution Providers'. These vendors have innovative solutions that are powerful enough to monitor and thwart the attacks in real time. We hope this list will help you while you formulate strategies for your organization.Jeevan GeorgeManaging Editoreditor@cioreview.comPreventing DDoS: A Continuing Effort Editorial
<
Page 5 |
Page 7 >