Free registration required
Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Featured in this Report from John Pescatore
- Attacks Grow in Complexity
- Using DDoS Detection and Mitigation Techniques to Defend Against Advanced Threats
- Deployment Options
- Format: PDF
- Size: 971.95 KB