SlideShare ist ein Scribd-Unternehmen logo
1 von 10
CONFIDENTIALwww.prolexic.com
Planning for and Validating a DDoS Defense Strategy
www.prolexic.com
www.prolexic.com
Planning for and Validating a DDoS Defense
Strategy
• DDoS attacks can cost businesses:
• Sales
• Customer loyalty
• Search engine rankings
• An attack on an unprepared business can result
in several days of downtime
• Having a solid DDoS response plan as part of
your company’s business continuity plan is
essential
2
May 2013 www.prolexic.com
www.prolexic.com
Best Practices for DDoS Mitigation Validation
With the DDoS mitigation service active
• Verify that all applications are performing properly
• Verify all routing and DNS is working
• Generate a few gigabits of controlled traffic to
validate features of the service, including:
• Alerting
• Activation
• Mitigation
3
www.prolexic.com
Best Practices for DDoS Mitigation Validation
• Validate your on-premise monitoring systems
• Test small levels of traffic without scrubbing and
without any DDoS protection
• Identify stress points on your network
• Conduct baseline testing and calibrate systems to
remediate vulnerabilities
• Schedule validation tests on a regular basis
(yearly or quarterly)
• If network issues arise during testing, make
modifications
4
www.prolexic.com
Best Practices for DDoS Mitigation Validation
• Based on the test results, develop a mitigation
playbook as part of an incident response plan
• This plan ensures that everyone in the
organization knows what to do and expect when
a DDoS attack hits
Download the full report from Prolexic for more information
about best practices to ensure your DDoS mitigation service can
protect your business.
5
www.prolexic.com
Estimating the Cost of a DDoS Attack
• Forrester Consulting has
found that an online
company loses an
average of US $220,000
per hour during an
unmitigated DDoS
attack
6
www.prolexic.com
Be Prepared: Test and Validate
• Every company that does business online is vulnerable to
DDoS attacks
• Talk to your DDoS mitigation provider before an attack
happens
• Test and validate your DDoS mitigation service regularly.
Download the full report for more information about how to test
and validate a DDoS defense plan.
7
www.prolexic.com
Create an Operations Plan for DDoS Attacks
• In addition to testing and validating your DDoS
mitigation service, develop a strong
operational plan for activation and
communication in the event of a DDoS attack
8
www.prolexic.com
Download the Free White Paper
• Download the white paper Planning for and Validating a
DDoS Defense at http://www.prolexic.com/planning
• The white paper includes:
• Detailed enterprise case studies that show the
consequences of inadequate preparation
• What to include in your anti-DDoS playbook
• A best-practice case study of DDoS attack readiness
• How to validate your DDoS defense
9
www.prolexic.com
About Prolexic
• Prolexic Technologies is the world’s largest
and most trusted provider of DDoS protection
and mitigation services
• Prolexic has successfully stopped DDoS
attacks for more than a decade
• We stop the largest attacks that exceed the
capabilities of other DDoS mitigation service
providers
10

Weitere ähnliche Inhalte

Andere mochten auch

Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Christophe Mercier
 
MVC Revivial on the Web
MVC Revivial on the WebMVC Revivial on the Web
MVC Revivial on the WebESUG
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeSumant Tambe
 
design wheel for locomotive
design wheel for locomotivedesign wheel for locomotive
design wheel for locomotiveBurhan Awang
 
The Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemThe Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemESUG
 
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 Ken'ichi Matsui
 
How to Calculate Average First Reply Time
How to Calculate Average First Reply TimeHow to Calculate Average First Reply Time
How to Calculate Average First Reply TimeKayako
 
Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)Soh Shing
 
Indian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreIndian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreRao Khola
 
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015MetricNet
 
プログラマのための線形代数再入門
プログラマのための線形代数再入門プログラマのための線形代数再入門
プログラマのための線形代数再入門Taketo Sano
 
Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門樽八 仲川
 
Carat's 10 Trends for 2017
Carat's 10 Trends for 2017Carat's 10 Trends for 2017
Carat's 10 Trends for 2017dentsu
 
Research and Development
Research and DevelopmentResearch and Development
Research and DevelopmentShameem Ali
 

Andere mochten auch (18)

Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...Characterisation of the properties use of paper by topographical analysis of ...
Characterisation of the properties use of paper by topographical analysis of ...
 
Experiencing the Live IIoT
Experiencing the Live IIoTExperiencing the Live IIoT
Experiencing the Live IIoT
 
MVC Revivial on the Web
MVC Revivial on the WebMVC Revivial on the Web
MVC Revivial on the Web
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/Subscribe
 
design wheel for locomotive
design wheel for locomotivedesign wheel for locomotive
design wheel for locomotive
 
Introduction to Replies by Gemma Buckley
Introduction to Replies by Gemma BuckleyIntroduction to Replies by Gemma Buckley
Introduction to Replies by Gemma Buckley
 
The Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the EcosystemThe Object Repository - Pulling Objects out of the Ecosystem
The Object Repository - Pulling Objects out of the Ecosystem
 
Hand book on C&W
Hand book on C&W Hand book on C&W
Hand book on C&W
 
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料 「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
「内積が見えると統計学も見える」第5回 プログラマのための数学勉強会 発表資料
 
How to Calculate Average First Reply Time
How to Calculate Average First Reply TimeHow to Calculate Average First Reply Time
How to Calculate Average First Reply Time
 
Norris Portfolio
Norris PortfolioNorris Portfolio
Norris Portfolio
 
Building construction-report (1)
Building construction-report (1)Building construction-report (1)
Building construction-report (1)
 
Indian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care CentreIndian Railways Training on Coach Care Centre
Indian Railways Training on Coach Care Centre
 
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015Benchmark 2014 | Global Results for Desktop Support | HDI 2015
Benchmark 2014 | Global Results for Desktop Support | HDI 2015
 
プログラマのための線形代数再入門
プログラマのための線形代数再入門プログラマのための線形代数再入門
プログラマのための線形代数再入門
 
Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門Webアプリケーション負荷試験実践入門
Webアプリケーション負荷試験実践入門
 
Carat's 10 Trends for 2017
Carat's 10 Trends for 2017Carat's 10 Trends for 2017
Carat's 10 Trends for 2017
 
Research and Development
Research and DevelopmentResearch and Development
Research and Development
 

Mehr von State of the Internet

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of the Internet
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterState of the Internet
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicState of the Internet
 
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsQ3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsState of the Internet
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsState of the Internet
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicState of the Internet
 

Mehr von State of the Internet (8)

State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentationState of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
State of-the-internet-web-security-threat-advisory-blackshades-rat-presentation
 
Largest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by QuarterLargest 2013 DDoS Attacks Mitigated by Quarter
Largest 2013 DDoS Attacks Mitigated by Quarter
 
Top 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 InfographicTop 10 DDoS Trends for 2013 Infographic
Top 10 DDoS Trends for 2013 Infographic
 
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack StatisticsQ3 2013 Global DDoS Attacks | DDoS Attack Statistics
Q3 2013 Global DDoS Attacks | DDoS Attack Statistics
 
The Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack StatisticsThe Battle Against DDoS | DDoS Attack Statistics
The Battle Against DDoS | DDoS Attack Statistics
 
Rise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - InfographicRise of Dr Dos DDoS Attacks - Infographic
Rise of Dr Dos DDoS Attacks - Infographic
 
DDoS Attack & Defense Infographic
DDoS Attack & Defense InfographicDDoS Attack & Defense Infographic
DDoS Attack & Defense Infographic
 
Q3 2013 Global DDoS Attack Report
Q3 2013 Global DDoS Attack ReportQ3 2013 Global DDoS Attack Report
Q3 2013 Global DDoS Attack Report
 

Kürzlich hochgeladen

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Knowledge center-white-paper-planning-and-validating-your-ddos-defense

  • 1. CONFIDENTIALwww.prolexic.com Planning for and Validating a DDoS Defense Strategy www.prolexic.com
  • 2. www.prolexic.com Planning for and Validating a DDoS Defense Strategy • DDoS attacks can cost businesses: • Sales • Customer loyalty • Search engine rankings • An attack on an unprepared business can result in several days of downtime • Having a solid DDoS response plan as part of your company’s business continuity plan is essential 2 May 2013 www.prolexic.com
  • 3. www.prolexic.com Best Practices for DDoS Mitigation Validation With the DDoS mitigation service active • Verify that all applications are performing properly • Verify all routing and DNS is working • Generate a few gigabits of controlled traffic to validate features of the service, including: • Alerting • Activation • Mitigation 3
  • 4. www.prolexic.com Best Practices for DDoS Mitigation Validation • Validate your on-premise monitoring systems • Test small levels of traffic without scrubbing and without any DDoS protection • Identify stress points on your network • Conduct baseline testing and calibrate systems to remediate vulnerabilities • Schedule validation tests on a regular basis (yearly or quarterly) • If network issues arise during testing, make modifications 4
  • 5. www.prolexic.com Best Practices for DDoS Mitigation Validation • Based on the test results, develop a mitigation playbook as part of an incident response plan • This plan ensures that everyone in the organization knows what to do and expect when a DDoS attack hits Download the full report from Prolexic for more information about best practices to ensure your DDoS mitigation service can protect your business. 5
  • 6. www.prolexic.com Estimating the Cost of a DDoS Attack • Forrester Consulting has found that an online company loses an average of US $220,000 per hour during an unmitigated DDoS attack 6
  • 7. www.prolexic.com Be Prepared: Test and Validate • Every company that does business online is vulnerable to DDoS attacks • Talk to your DDoS mitigation provider before an attack happens • Test and validate your DDoS mitigation service regularly. Download the full report for more information about how to test and validate a DDoS defense plan. 7
  • 8. www.prolexic.com Create an Operations Plan for DDoS Attacks • In addition to testing and validating your DDoS mitigation service, develop a strong operational plan for activation and communication in the event of a DDoS attack 8
  • 9. www.prolexic.com Download the Free White Paper • Download the white paper Planning for and Validating a DDoS Defense at http://www.prolexic.com/planning • The white paper includes: • Detailed enterprise case studies that show the consequences of inadequate preparation • What to include in your anti-DDoS playbook • A best-practice case study of DDoS attack readiness • How to validate your DDoS defense 9
  • 10. www.prolexic.com About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services • Prolexic has successfully stopped DDoS attacks for more than a decade • We stop the largest attacks that exceed the capabilities of other DDoS mitigation service providers 10