Home Presentations 10 Steps for Combating DDoS in Real Time
Placeholder

10 Steps for Combating DDoS in Real Time

$0.00

Category:

Description

Alain Tshal – Territory Manager Sub-Sahara Africa

  • Verify the attack
  • Contact team leads
  • Triage Applications
  • Protect partners and remote users
  • Identify the attack
  • Evaluate source address mitigation options
  • Mitigate specific application attacks
  • Increase application-level security posture
  • Constrain resources
  • Manage Public Relations
Do you have a story that you think would interest our readers?
Write to us editorial@cio.co.ke

Reviews

There are no reviews yet.

Be the first to review “10 Steps for Combating DDoS in Real Time”

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.