Overview
Organizations frequently implement DDoS attack defenses in an ad-hoc manner based upon vendor recommendations or during the panic following an attack. This approach often resolves the immediate issue but results in gaps in DDoS attack defenses that may go unnoticed until the next attack. The DDoS risk assessment takes a proactive, strategic approach in which a NimbusDDOS expert reviews an organization's infrastructure to identify areas of weakness. This switch from reactive to proactive allows an organization to address DDoS risks on their terms rather than being driven and dictated by the attacker.
// ATTACKER RECONNAISSANCE: To discover areas of risk the NimbusDDOS engineers step into the role of a fictitious attacker to examine the target environment. Much of the testing is "black box" with no special guidance from the customer. The goal of this investigation is to uncover areas susceptible to DDoS attack that an attacker is likely to discover.
// DDOS THREAT MATRIX: Each discovered threat is ranked and scored to provide organizations with actionable data to prioritize further testing and corrective action. This scoring is customized according to the specific risk profile of the customer's business.
// ATTACK PLAN: Each DDoS risk assessment includes an attack plan detailing the likely DDoS attacks that an attacker might try based upon the findings of the investigation. The attack plan allows organizations to better understand the gaps in their environment, and understand the strategy of an attacker.
// NOT PENETRATION TESTING: Many organizations incorrectly assume that periodic penetration/vulnerability testing will also detect DDoS risk areas. Although approached with a similar mindset, these assessments are not equivalent and a DDoS risk assessment examines a distinct area of information security.
// DATA DRIVEN DECISION MAKING: The DDoS risk assessment provides facts, recommendations and actionable data that allow an organization to create a complete DDoS preparedness strategy.
// DEDICATED DDOS EXPERT: Each customer is assigned a dedicated DDoS expert that provides DDoS preparedness advice and guidance tailored to the customer's business.
Highlights
- Attacker Reconnaissance : An investigative scan is performed from the Internet, from the perspective of a fictitious attacker with no guidance from the customer. The goal is to uncover areas susceptible to DDoS that an attacker is likely to discover.
- Identify Gaps In Defenses : As environments grow and applications change, the DDoS attack risk also changes. The DDoS Risk Assessment will identify these gaps and provide guidance on remediation methods.
- Non-Intrusive : All scanning is performed at a low rate and in a manner that will not impact the environment. A DDoS expert monitors the activities throughout to ensure success.
Details
Unlock automation with AI agent solutions

Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
<www.nimbusddos.com > 800.674.3367 info@nimbusddos.comÂ
Software associated with this service
