Listing Thumbnail

    DDoS 360 Service Pack

     Info
    DDoS 360 is the ultimate DDoS protection service for high-risk companies, maximizing their security posture and ability to withstand any DDoS attack, regardless of its intensity and persistence. Unlike the common practice of a single DDoS test session, the DDoS 360 program contains multiple, year-round activities carried out by our top DDoS experts. This includes extensive pre-attack activities to strengthen your technological infrastructure and improve the skills of your teams, as well as a dedicated incident response expert team in the event of an attack.

    Overview

    Activities in the DDoS 360 program are tailored to each customer’s needs, yet always include a combination of the following categories:

    • DDoS Testing Periodic DDoS simulation testing sessions, each with six attack vectors and lasting approximately 3 hours, are conducted using a globally distributed botnet with thousands of bots to validate the security posture, evaluate protection improvements, and identify potential issues.
    • DDoS Hardening A thorough audit of your network architecture and DDoS protection system configuration to assess your current protection status against all types of attacks. Detailed recommendations for hardening and optimization follow this. When relevant, the hardening activities may include a POC for the selection of a DDoS vendor.
    • DDoS Skills DDoS training of all stakeholder teams (NOC/SOC, Security, Network, and IT managers), a DDoS attack playbook with detailed procedures to follow during a DDoS attack, and war game simulations to validate teams’ preparedness.
    • Incident Response (IR) In the event of an attack, our DDoS experts are immediately assigned to manage the attack until it is fully mitigated.

    DDoS 360 activities are spread throughout the year, tailored to the needs and constraints of your organization. An activity roadmap plan is created at the beginning of the service period. It is continuously updated to respond to changes and customer requirements, such as the emergence of new threats or the identification of previously unknown security gaps.

    DDoS 360 service covers key AWS Services, including but not limited to:

    Elastic Load Balancing (ELB)

    Amazon CloudFront

    AWS WAF (Web Application Firewall)

    Amazon Route 53

    Amazon EC2 and VPC

    AWS Shield (Standard and Advanced)

    Substitute 3rd party marketplace services

    Highlights

    • Comprehensive, Year-Round DDoS Preparedness plan
    • Realistic, high-volume DDoS simulations with up to 20 Gbps and 1,000 bots
    • Optional Incident Response service, Account Takeover simulation, and more

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Red Button provides comprehensive, expert-led support throughout the DDoS testing lifecycle. Customers receive guidance at every stage — from test planning and configuration, through live execution and post-test analysis. Each customer engagement is assigned a dedicated security expert who serves as the primary point of contact for all technical and operational support needs.

    Support Channels

    Email Support:  info@red-button.net 

    Knowledge Base:  https://kb.red-button.net 

    Support is available during standard business hours (local time) unless otherwise defined in the customer engagement. For enterprise customers, enhanced support levels may be available upon request.