{"id":6232,"date":"2020-09-21T09:30:28","date_gmt":"2020-09-21T08:30:28","guid":{"rendered":"https:\/\/www.theproche.com\/?p=6232"},"modified":"2020-09-21T09:39:15","modified_gmt":"2020-09-21T08:39:15","slug":"mantra-to-choose-the-appropriate-ddos-mitigation-strategy","status":"publish","type":"post","link":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/","title":{"rendered":"Mantra to Choose the Appropriate DDoS Mitigation Strategy – Keep it Simple"},"content":{"rendered":"\n

The cyber industry offers a plenitude of DDoS mitigation solutions<\/a>. Competition may be misleading as providers highlight terms such as mitigation capacity, layered protections or time-to-mitigate.<\/p>\n\n\n\n

DDoS Mitigation Strategies in a Nutshell<\/h2>\n\n\n\n

There are several options from which you can choose a DDoS mitigation strategy.<\/p>\n\n\n\n

On Premises DDoS Appliance: A DDoS detection and mitigation device installed in front of the firewall in your data center. It offers immediate mitigation of all types of attacks, including SSL attacks, but offers limited protection against volumetric attacks that saturate your internet pipe.<\/p>\n\n\n\n

Always-On Cloud DDoS Protection Service: A cloud service wherein your traffic is constantly routed through the provider\u2019s scrubbing center for attack detection and mitigation.<\/p>\n\n\n\n

On-Demand Cloud DDoS Protection Service: A cloud service that kicks in only when you are under attack by diverting your traffic to the providers\u2019 scrubbing center.<\/p>\n\n\n\n

Hybrid DDoS Protection Solution: This is the best of both worlds: an on-premises device that integrates with a cloud mitigation service (can be on-demand or always-on cloud service).<\/p>\n\n\n\n

How to \u00a0Choose a DDoS Mitigation Plan?<\/h2>\n\n\n\n

There are a few guidelines that can help simplify your selection process, simply by asking  the following questions:<\/p>\n\n\n\n

Can you afford a few minutes of downtime when under DDoS attack?<\/p>\n\n\n\n

If the answer is YES, then go for the On-Demand Cloud DDoS Protection Service. This is the lowest cost solution and offers effective mitigation against DDoS attacks. The payoff is extended time-to-mitigate of several minutes which is driven by the need to re-route your traffic to the provider\u2019s scrubbing center.<\/p>\n\n\n\n

If the answer is NO, then select the Always-On Cloud DDoS Protection Service. This option provides immediate mitigation (within seconds) of DDoS attacks.<\/p>\n\n\n\n

Do you process HTTPS traffic extensively?<\/h2>\n\n\n\n

If YES, then you need the Hybrid DDoS Protection solution, where the on-premises device mitigates HTTPS attacks and the cloud service mitigates volumetric attacks.<\/p>\n\n\n\n

Are you frequently attacked?<\/h2>\n\n\n\n

If YES, then you need an Always-On Cloud DDoS Protection Service. An On-Demand service may overwhelm your network with extensive diversions of your traffic.<\/p>\n\n\n\n

There are several flavors from which to choose when selecting an effective DDoS mitigation strategy. Most enterprises opt for one of the cloud protection flavors (always-on or on-demand). Financial service providers, health care or utilities typically go with hybrid solutions, due to the nature of their business: they require utmost application availability and process SSL traffic extensively.<\/p>\n","protected":false},"excerpt":{"rendered":"

The cyber industry offers a plenitude of DDoS mitigation solutions. Competition may be misleading as providers highlight terms such as mitigation capacity, layered protections or time-to-mitigate. DDoS Mitigation Strategies in a Nutshell There are several options from which you can choose a DDoS mitigation strategy. On Premises DDoS Appliance: A DDoS detection and mitigation device installed […]<\/p>\n","protected":false},"author":7,"featured_media":6234,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[29],"tags":[],"yoast_head":"\nMantra to Choose the Appropriate DDoS Mitigation Strategy - Keep it Simple - Proche<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mantra to Choose the Appropriate DDoS Mitigation Strategy - Keep it Simple - Proche\" \/>\n<meta property=\"og:description\" content=\"The cyber industry offers a plenitude of DDoS mitigation solutions. Competition may be misleading as providers highlight terms such as mitigation capacity, layered protections or time-to-mitigate. DDoS Mitigation Strategies in a Nutshell There are several options from which you can choose a DDoS mitigation strategy. On Premises DDoS Appliance: A DDoS detection and mitigation device installed […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Proche\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Procheindia\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-21T08:30:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-21T08:39:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.theproche.com\/wp-content\/uploads\/2020\/09\/Implementing-DDoS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"947\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nikhil Taneja\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@the_proche\" \/>\n<meta name=\"twitter:site\" content=\"@the_proche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nikhil Taneja\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/\"},\"author\":{\"name\":\"Nikhil Taneja\",\"@id\":\"https:\/\/www.theproche.com\/#\/schema\/person\/6e07b68630fd6d7c74d1a2701b7167b8\"},\"headline\":\"Mantra to Choose the Appropriate DDoS Mitigation Strategy – Keep it Simple\",\"datePublished\":\"2020-09-21T08:30:28+00:00\",\"dateModified\":\"2020-09-21T08:39:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/\"},\"wordCount\":412,\"publisher\":{\"@id\":\"https:\/\/www.theproche.com\/#organization\"},\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/\",\"url\":\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/\",\"name\":\"Mantra to Choose the Appropriate DDoS Mitigation Strategy - Keep it Simple - Proche\",\"isPartOf\":{\"@id\":\"https:\/\/www.theproche.com\/#website\"},\"datePublished\":\"2020-09-21T08:30:28+00:00\",\"dateModified\":\"2020-09-21T08:39:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.theproche.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mantra to Choose the Appropriate DDoS Mitigation Strategy – Keep it Simple\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.theproche.com\/#website\",\"url\":\"https:\/\/www.theproche.com\/\",\"name\":\"Proche\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.theproche.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.theproche.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.theproche.com\/#organization\",\"name\":\"Proche\",\"url\":\"https:\/\/www.theproche.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.theproche.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.theproche.com\/wp-content\/uploads\/2022\/01\/Proche-logo.png\",\"contentUrl\":\"https:\/\/www.theproche.com\/wp-content\/uploads\/2022\/01\/Proche-logo.png\",\"width\":1394,\"height\":780,\"caption\":\"Proche\"},\"image\":{\"@id\":\"https:\/\/www.theproche.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Procheindia\",\"https:\/\/twitter.com\/the_proche\",\"https:\/\/www.linkedin.com\/company\/the-proche\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.theproche.com\/#\/schema\/person\/6e07b68630fd6d7c74d1a2701b7167b8\",\"name\":\"Nikhil Taneja\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.theproche.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04ed9248dcd1c14e9565b8eaa8eadab0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/04ed9248dcd1c14e9565b8eaa8eadab0?s=96&d=mm&r=g\",\"caption\":\"Nikhil Taneja\"},\"description\":\"Nikhil Taneja is a vice president & managing director - India , SAARC , Middle East & GSI at Radware, a global leader of application delivery and application security solutions for virtual, cloud and software-defined data centers.\",\"sameAs\":[\"https:\/\/www.radware.com\/\",\"https:\/\/www.linkedin.com\/in\/nikhil-taneja-0799b114\/?originalSubdomain=in\"],\"url\":\"https:\/\/www.theproche.com\/author\/nikhil\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mantra to Choose the Appropriate DDoS Mitigation Strategy - Keep it Simple - Proche","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/","og_locale":"en_GB","og_type":"article","og_title":"Mantra to Choose the Appropriate DDoS Mitigation Strategy - Keep it Simple - Proche","og_description":"The cyber industry offers a plenitude of DDoS mitigation solutions. Competition may be misleading as providers highlight terms such as mitigation capacity, layered protections or time-to-mitigate. DDoS Mitigation Strategies in a Nutshell There are several options from which you can choose a DDoS mitigation strategy. On Premises DDoS Appliance: A DDoS detection and mitigation device installed […]","og_url":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/","og_site_name":"Proche","article_publisher":"https:\/\/www.facebook.com\/Procheindia","article_published_time":"2020-09-21T08:30:28+00:00","article_modified_time":"2020-09-21T08:39:15+00:00","og_image":[{"width":947,"height":413,"url":"https:\/\/www.theproche.com\/wp-content\/uploads\/2020\/09\/Implementing-DDoS.png","type":"image\/png"}],"author":"Nikhil Taneja","twitter_card":"summary_large_image","twitter_creator":"@the_proche","twitter_site":"@the_proche","twitter_misc":{"Written by":"Nikhil Taneja","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/#article","isPartOf":{"@id":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/"},"author":{"name":"Nikhil Taneja","@id":"https:\/\/www.theproche.com\/#\/schema\/person\/6e07b68630fd6d7c74d1a2701b7167b8"},"headline":"Mantra to Choose the Appropriate DDoS Mitigation Strategy – Keep it Simple","datePublished":"2020-09-21T08:30:28+00:00","dateModified":"2020-09-21T08:39:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/"},"wordCount":412,"publisher":{"@id":"https:\/\/www.theproche.com\/#organization"},"articleSection":["Cybersecurity"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/","url":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/","name":"Mantra to Choose the Appropriate DDoS Mitigation Strategy - Keep it Simple - Proche","isPartOf":{"@id":"https:\/\/www.theproche.com\/#website"},"datePublished":"2020-09-21T08:30:28+00:00","dateModified":"2020-09-21T08:39:15+00:00","breadcrumb":{"@id":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.theproche.com\/mantra-to-choose-the-appropriate-ddos-mitigation-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.theproche.com\/"},{"@type":"ListItem","position":2,"name":"Mantra to Choose the Appropriate DDoS Mitigation Strategy – Keep it Simple"}]},{"@type":"WebSite","@id":"https:\/\/www.theproche.com\/#website","url":"https:\/\/www.theproche.com\/","name":"Proche","description":"","publisher":{"@id":"https:\/\/www.theproche.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.theproche.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.theproche.com\/#organization","name":"Proche","url":"https:\/\/www.theproche.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.theproche.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.theproche.com\/wp-content\/uploads\/2022\/01\/Proche-logo.png","contentUrl":"https:\/\/www.theproche.com\/wp-content\/uploads\/2022\/01\/Proche-logo.png","width":1394,"height":780,"caption":"Proche"},"image":{"@id":"https:\/\/www.theproche.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Procheindia","https:\/\/twitter.com\/the_proche","https:\/\/www.linkedin.com\/company\/the-proche\/"]},{"@type":"Person","@id":"https:\/\/www.theproche.com\/#\/schema\/person\/6e07b68630fd6d7c74d1a2701b7167b8","name":"Nikhil Taneja","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.theproche.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/04ed9248dcd1c14e9565b8eaa8eadab0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/04ed9248dcd1c14e9565b8eaa8eadab0?s=96&d=mm&r=g","caption":"Nikhil Taneja"},"description":"Nikhil Taneja is a vice president & managing director - India , SAARC , Middle East & GSI at Radware, a global leader of application delivery and application security solutions for virtual, cloud and software-defined data centers.","sameAs":["https:\/\/www.radware.com\/","https:\/\/www.linkedin.com\/in\/nikhil-taneja-0799b114\/?originalSubdomain=in"],"url":"https:\/\/www.theproche.com\/author\/nikhil\/"}]}},"_links":{"self":[{"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/posts\/6232"}],"collection":[{"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/comments?post=6232"}],"version-history":[{"count":1,"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/posts\/6232\/revisions"}],"predecessor-version":[{"id":6233,"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/posts\/6232\/revisions\/6233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/media\/6234"}],"wp:attachment":[{"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/media?parent=6232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/categories?post=6232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theproche.com\/wp-json\/wp\/v2\/tags?post=6232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}