IT workers are becoming increasingly aware of the threat of DDoS attacks. But what can a company do if it does not want to buy dedicated protection appliances? What mechanisms exist which, when properly implemented, protect against such attacks distributed via the network?
Three different procedures are currently ready on the market; the right choice depends on which applications and IT are being used, which type of attacks frequently occur and how much money is available. Each method has its pros and cons. (more…)