The DDoS Vulnerability GAP
This gap allows damaging DDoS traffic to penetrate the target network, causing system disruption and downtime.
Red Team Vs. Mitigation Vs. RADAR™
|Very high chance of Downtime during attack||YES||48% Chance||NO|
|Testing frequency||About twice a year||N/A||Continuous|
|DDoS attack vectors checked per target||Less than 20||N/A||More than 100|
|How many target IP's tested - Against all attack vectors||Sample - Under 5 IP's||N/A||Complete - Over 1000 IP's|
|Vulnerability gap average||48%||48%||Under 2%|
|Vulnerability reports||Per test||NO||Continuous - Daily|
|Attack response||N/A||Reactive when an attacks happens||Continuous before an attack happens|
|Detection of successful attacks||Sample detection only - At time of test - time of test only||Partial detection - during attack||Full detection - Before an attack & continuous|
|Added costs for Red Team testing - On Demand||YES||N/A||NO|
Enterprise Use Case
Constantly changing and dynamic systems are continuously open to DDoS attacks.
Initial DDoS Risk (% of DDoS vulnerabilities identified on first cycle)
Launched new web applications without aligning with DDoS mitigation configuration
Added new IP addresses and upgraded network equipment
In 2019, the number of DDoS attacks increased by almost 50% over the previous year. The average duration of attacks also increased around 50%.
(Kaspersky Labs report 2019)
Closing the gap
Detecting and Eliminating DDoS Threats Before An Attack
Mitigating Attacks and Threats After They Are Launched