In this IDG webcast, security industry expert Eric Vanderburg along with Michael Kaczmarek, Vice President, Product Management at Neustar, explore the latest DDoS attack vectors, including application and protocol attacks, and explain the most effective defensive strategies, including:
- Traffic pattern analysis
- Signature analysis
- State transition analysis
- Intrusion detection
- Response rate limiting
- Perimeter traffic rules
Attacks are increasing in number, size and intensity -- your organization could be next. DDoS protection must be a key tenant of an organization's overall security posture. Discover what you need to know in this on-demand webinar.