SlideShare a Scribd company logo
Continuous Detection and Elimination of DDoS Threats
DATASHEET
What’s Inside?
The DDoS RADAR™
Components
Cloud Component On-Premise Component
MazeBolt main cloud component External
www
Internal
www
MazeBolt
on-premises component
ISP (or ISP
+ scrubbing canter
BGP)
DDoS
mitigation device
(CPE)
Mirror
(TAP) Port Firewall
Application
Application
Web
Mail
Router
monitoring
attacking
The DDoS RADAR™
Network Setup
Confidential
Distributed denial-of-service (DDoS) attacks are increasing in scale and
ferocity, overwhelming businesses globally. The number of DDoS attacks
doubled in the first quarter of 2020 compared to Q4 2019 and 80% more
than in Q1 2019. The attacks are launched with stealth using high volume
traffic and low and slow application targeting. Professional hackers are
constantly seeking new ways to disrupt traffic flow, discolor customer
experience and inevitably lead to loss of revenue.
RADARTM
, MazeBolt’s new patented technology, provides a top layer to
any DDoS mitigation system providing continuous DDoS threat simulations
without any disruption or need for maintenance windows. It assists
organizations in achieving, maintaining, and verifying the continuous
closing of their DDoS vulnerability gaps. Reducing and maintaining the
vulnerability level from an average of 48% to under 2%.
• Eliminate DDoS vulnerabilities
to under 2%
• Continuous and automated
non-disruptive detection of
DDoS vulnerabilities
• No maintenance windows required
• Covering all IP ranges.
100+ simulations against each IP
• More than 50,000 vulnerability
attack simulations annually
• Quickly validate remediation
of configurations
• Managed service - Professional
services to guide remediation
identified vulnerabilities
• RADARTM
works with any
mitigation platform to provide
end to end full coverage
1 // Monitors the target’s response
time by sending legitimate
requests to the targets and
measure the time taken to
get a response
2 // Validates DDoS vulnerability
level by transmitting very
low rate DDoS attack to the
monitored target
3 // Identifies real-time changes
in response times during
validation
1 // Synchronizes with cloud
component before & after
each test
2 // Monitors all traffic
downstream from the DDoS
mitigation device or
scrubbing service during test
to identify leakage
Deployment Considerations
Description Red Team DDoS Testing Mitigation MazeBolt RADAR™
The DDoS RADAR ™
currently validates the supported
setups listed below:
• Datacenter with CPE equipment protection
• Datacenter with BGP scrubbing center
service protection
• Datacenter with a hybrid of BGP and scrubbing
center protection
Other Deployment Considerations:
• Deploy after DDoS mitigation
• Able to read true source IPs
• Management Port
• Services Scanning
• DDoS RADAR™
simulation
Security Considerations
Technical Specifications
Why DDoS RADAR™
Confidential
MazeBolt’s platform and DDoS RADAR™
adheres
to strict security standards:
• Secure coding practices and ISO compliant
• Fully installed and quality assured hardware
along with virtual platforms
• All intercommunication to traffic from the
DDoS RADAR , incoming and outgoing,
™
is encrypted using TLs (HTPS)
• No private data is captured, used or exposed.
• MazeBolt’s platform is secured using TLS (HTTPS)
YES
About twice a year
Less than 20
Sample - Under 5 IP's
48%
Per test
$
N/A
Sample only at time of
test
YES
Downtime under successful attack
Testing frequency
DDoS attack vectors checked
per target
How many target IP's tested -
Against all attack vectors
Vulnerability gap
Vulnerability reports
Cost
Attack response
Detection of successful attacks
Added costs for Red Team testing
- On Demand
65%
N/A
N/A
N/A
48%
NO
$$$
Reactive when an
attack happens
During attack
YES
NO
Continuous
More than 100
Complete - Over 1000 IP's
Under 2%
Continuous - Daily
$$
Continuous before an
attack happens
Full detection - Before an
attack & continuous
NO
About MazeBolt
MazeBolt is a leading innovative cyber security company,
and part of the mitigation space. Offering full DDoS risk
detection and elimination. Working with any mitigation
system to provide end to end full coverage. Avoiding
downtime and eliminating mitigation vulnerabilities before
an attack happens.
For more information,
please visit: www.mazebolt.com
or e-mail: info@mazebolt.com

More Related Content

PDF
Automatic DDoS Attack Simulator | MazeBolt Technologies
PDF
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
PDF
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
PDF
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
PDF
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
PDF
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
PDF
9 Steps For Fighting Against a DDos Attack in real-time
PDF
DDoS Falcon_Tech_Specs-Haltdos
Automatic DDoS Attack Simulator | MazeBolt Technologies
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
9 Steps For Fighting Against a DDos Attack in real-time
DDoS Falcon_Tech_Specs-Haltdos

What's hot (20)

PPTX
Attack Prevention Solution for RADWARE
PPTX
DDoS Mitigation - DefensePro - RADWARE
PDF
Radware Hybrid Cloud WAF Service
PPTX
Radware Solutions for MSSPs
PDF
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
PPTX
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
PDF
DDoS Threat Landscape - Ron Winward CHINOG16
PDF
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
PDF
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
PPTX
Secure & Protect your Data with Druva
PDF
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
PDF
What You Need To Know About The New PCI Cloud Guidelines
PDF
HaltDos DDoS Protection Solution
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Gartner Magic Quadrant for Secure Email Gateways 2014
PPTX
Using a secured, cloud-delivered SD-WAN to transform your business network
PDF
Crush Cloud Complexity, Simplify Security - Shield X
PPTX
Infoblox Secure DNS Solution
PPTX
Overcoming the Challenges of Architecting for the Cloud
PDF
The Cloud Crossover
Attack Prevention Solution for RADWARE
DDoS Mitigation - DefensePro - RADWARE
Radware Hybrid Cloud WAF Service
Radware Solutions for MSSPs
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DDoS Threat Landscape - Ron Winward CHINOG16
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
Secure & Protect your Data with Druva
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
What You Need To Know About The New PCI Cloud Guidelines
HaltDos DDoS Protection Solution
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Gartner Magic Quadrant for Secure Email Gateways 2014
Using a secured, cloud-delivered SD-WAN to transform your business network
Crush Cloud Complexity, Simplify Security - Shield X
Infoblox Secure DNS Solution
Overcoming the Challenges of Architecting for the Cloud
The Cloud Crossover
Ad

Similar to Why DDoS RADAR | MazeBolt Technologies (14)

PDF
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
PDF
Distributed Denial of Service Attack - Detection And Mitigation
PDF
The role of DDoS Providers
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPT
Protecting your business from ddos attacks
PDF
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
PDF
DDOS Mitigation Experience from IP ServerOne by CL Lee
PDF
Meeting Towards Collaboration for DDoS Attack Mitigation
PDF
DDoS Mitigation Tools Explained_ Key Features, Benefits, and Implementation I...
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
PDF
Protecting against modern ddos threats
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
PDF
DDoS Protection For Top 4 Industries | MazeBolt Technologies
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Distributed Denial of Service Attack - Detection And Mitigation
The role of DDoS Providers
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Protecting your business from ddos attacks
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
DDOS Mitigation Experience from IP ServerOne by CL Lee
Meeting Towards Collaboration for DDoS Attack Mitigation
DDoS Mitigation Tools Explained_ Key Features, Benefits, and Implementation I...
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
Protecting against modern ddos threats
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
DDoS Protection For Top 4 Industries | MazeBolt Technologies
Ad

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
August Patch Tuesday
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
A Presentation on Touch Screen Technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Encapsulation theory and applications.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
SOPHOS-XG Firewall Administrator PPT.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
1. Introduction to Computer Programming.pptx
1 - Historical Antecedents, Social Consideration.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
August Patch Tuesday
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A Presentation on Touch Screen Technology
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A comparative analysis of optical character recognition models for extracting...
DP Operators-handbook-extract for the Mautical Institute
OMC Textile Division Presentation 2021.pptx
TLE Review Electricity (Electricity).pptx
Heart disease approach using modified random forest and particle swarm optimi...
Encapsulation theory and applications.pdf

Why DDoS RADAR | MazeBolt Technologies

  • 1. Continuous Detection and Elimination of DDoS Threats DATASHEET What’s Inside? The DDoS RADAR™ Components Cloud Component On-Premise Component MazeBolt main cloud component External www Internal www MazeBolt on-premises component ISP (or ISP + scrubbing canter BGP) DDoS mitigation device (CPE) Mirror (TAP) Port Firewall Application Application Web Mail Router monitoring attacking The DDoS RADAR™ Network Setup Confidential Distributed denial-of-service (DDoS) attacks are increasing in scale and ferocity, overwhelming businesses globally. The number of DDoS attacks doubled in the first quarter of 2020 compared to Q4 2019 and 80% more than in Q1 2019. The attacks are launched with stealth using high volume traffic and low and slow application targeting. Professional hackers are constantly seeking new ways to disrupt traffic flow, discolor customer experience and inevitably lead to loss of revenue. RADARTM , MazeBolt’s new patented technology, provides a top layer to any DDoS mitigation system providing continuous DDoS threat simulations without any disruption or need for maintenance windows. It assists organizations in achieving, maintaining, and verifying the continuous closing of their DDoS vulnerability gaps. Reducing and maintaining the vulnerability level from an average of 48% to under 2%. • Eliminate DDoS vulnerabilities to under 2% • Continuous and automated non-disruptive detection of DDoS vulnerabilities • No maintenance windows required • Covering all IP ranges. 100+ simulations against each IP • More than 50,000 vulnerability attack simulations annually • Quickly validate remediation of configurations • Managed service - Professional services to guide remediation identified vulnerabilities • RADARTM works with any mitigation platform to provide end to end full coverage 1 // Monitors the target’s response time by sending legitimate requests to the targets and measure the time taken to get a response 2 // Validates DDoS vulnerability level by transmitting very low rate DDoS attack to the monitored target 3 // Identifies real-time changes in response times during validation 1 // Synchronizes with cloud component before & after each test 2 // Monitors all traffic downstream from the DDoS mitigation device or scrubbing service during test to identify leakage
  • 2. Deployment Considerations Description Red Team DDoS Testing Mitigation MazeBolt RADAR™ The DDoS RADAR ™ currently validates the supported setups listed below: • Datacenter with CPE equipment protection • Datacenter with BGP scrubbing center service protection • Datacenter with a hybrid of BGP and scrubbing center protection Other Deployment Considerations: • Deploy after DDoS mitigation • Able to read true source IPs • Management Port • Services Scanning • DDoS RADAR™ simulation Security Considerations Technical Specifications Why DDoS RADAR™ Confidential MazeBolt’s platform and DDoS RADAR™ adheres to strict security standards: • Secure coding practices and ISO compliant • Fully installed and quality assured hardware along with virtual platforms • All intercommunication to traffic from the DDoS RADAR , incoming and outgoing, ™ is encrypted using TLs (HTPS) • No private data is captured, used or exposed. • MazeBolt’s platform is secured using TLS (HTTPS) YES About twice a year Less than 20 Sample - Under 5 IP's 48% Per test $ N/A Sample only at time of test YES Downtime under successful attack Testing frequency DDoS attack vectors checked per target How many target IP's tested - Against all attack vectors Vulnerability gap Vulnerability reports Cost Attack response Detection of successful attacks Added costs for Red Team testing - On Demand 65% N/A N/A N/A 48% NO $$$ Reactive when an attack happens During attack YES NO Continuous More than 100 Complete - Over 1000 IP's Under 2% Continuous - Daily $$ Continuous before an attack happens Full detection - Before an attack & continuous NO About MazeBolt MazeBolt is a leading innovative cyber security company, and part of the mitigation space. Offering full DDoS risk detection and elimination. Working with any mitigation system to provide end to end full coverage. Avoiding downtime and eliminating mitigation vulnerabilities before an attack happens. For more information, please visit: www.mazebolt.com or e-mail: info@mazebolt.com