Listing Thumbnail

    NimbusDDOS DDoS Risk Assessment

     Info
    NimbusDDOS is the leader in proactive DDoS defense. A DDoS Risk Assessment is a non-intrusive scan of an environment designed to identify areas susceptible to DDoS attacks. See what your environment looks like from the perspective of a real-world DDoS attacker. All DDoS risk assessments are performed under the guidance and supervision of a DDoS expert.

    Overview

    Organizations frequently implement DDoS attack defenses in an ad-hoc manner based upon vendor recommendations or during the panic following an attack. This approach often resolves the immediate issue but results in gaps in DDoS attack defenses that may go unnoticed until the next attack. The DDoS risk assessment takes a proactive, strategic approach in which a NimbusDDOS expert reviews an organization's infrastructure to identify areas of weakness. This switch from reactive to proactive allows an organization to address DDoS risks on their terms rather than being driven and dictated by the attacker.

    // ATTACKER RECONNAISSANCE: To discover areas of risk the NimbusDDOS engineers step into the role of a fictitious attacker to examine the target environment. Much of the testing is "black box" with no special guidance from the customer. The goal of this investigation is to uncover areas susceptible to DDoS attack that an attacker is likely to discover.

    // DDOS THREAT MATRIX: Each discovered threat is ranked and scored to provide organizations with actionable data to prioritize further testing and corrective action. This scoring is customized according to the specific risk profile of the customer's business.

    // ATTACK PLAN: Each DDoS risk assessment includes an attack plan detailing the likely DDoS attacks that an attacker might try based upon the findings of the investigation. The attack plan allows organizations to better understand the gaps in their environment, and understand the strategy of an attacker.

    // NOT PENETRATION TESTING: Many organizations incorrectly assume that periodic penetration/vulnerability testing will also detect DDoS risk areas. Although approached with a similar mindset, these assessments are not equivalent and a DDoS risk assessment examines a distinct area of information security.

    // DATA DRIVEN DECISION MAKING: The DDoS risk assessment provides facts, recommendations and actionable data that allow an organization to create a complete DDoS preparedness strategy.

    // DEDICATED DDOS EXPERT: Each customer is assigned a dedicated DDoS expert that provides DDoS preparedness advice and guidance tailored to the customer's business.

    Highlights

    • Attacker Reconnaissance : An investigative scan is performed from the Internet, from the perspective of a fictitious attacker with no guidance from the customer. The goal is to uncover areas susceptible to DDoS that an attacker is likely to discover.
    • Identify Gaps In Defenses : As environments grow and applications change, the DDoS attack risk also changes. The DDoS Risk Assessment will identify these gaps and provide guidance on remediation methods.
    • Non-Intrusive : All scanning is performed at a low rate and in a manner that will not impact the environment. A DDoS expert monitors the activities throughout to ensure success.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Software associated with this service