Distinguishing between “good” traffic and “bad” network traffic has not always been easy, and it has been traditionally difficult to present in visual terms. But when IT security staff can see network intrusions in real-time, they can better defend against them.
It’s hardly surprising that DDoS attacks finally caught the attention of politicians; it was just a matter of time until a DDoS attack affected a government agency. A combination of events has led to more awareness of cyber threats, including DDoS attacks.
When vetting various distributed denial of service (DDoS) mitigation services, enterprises would be wise to determine which kind of protection their business needs, and look for five key characteristics.
Internet service providers are increasingly treated more like public utilities than consumer services; will government regulations require that they block DDoS traffic? That remains to be seen. Ultimately the demands of enterprises and consumers may have more influence than any government regulations. The business landscape may require ISPs to provide DDoS protection, if only to protect themselves from litigation.