• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

6 Must-Have Metrics in Your DDoS Defense SLA


By VARINDIA - 2018-05-16
6 Must-Have Metrics in Your DDoS Defense SLA

Your Service Level Agreement (SLA) is a crucial component of DDoS defenses. It is your contractual guarantee outlining what your DDoS mitigation provider will deliver and their obligation to remedy in case they do not meet those guarantees.

 

Many vendors make expansive marketing claims about mitigation capabilities, but when it comes to making contractual commitments to l performance, the claims vaporize into thin air. It is fair to say that your DDoS protection is only as good as your SLA.

 

Use these six questions to evaluate how good your DDoS protection is. Each SLA metric has a specific technical benchmark and defined business purpose. Not having one (or more) of these KPIs in your SLA document should cast doubt on your vendor’s confidence in their own service, and ultimately the vendors’ ability to protect your organization against DDoS attacks.

 

Ask these six questions of your DDoS mitigation provider:

 

How Soon Can You Detect Attacks?

 

The first step in stopping a DDoS attack is recognizing that an attack is taking place. Many vendors will make bold claims on mitigation time, but the question is mitigation from when? The sooner an attack can be identified the sooner that attack can be migitated. With a Time-to-Detect SLA, your DDoS mitigation vendor commits to how quickly they will detect an attack. Not including the Time-to-Detect leaves you exposed to the possibility that a DDoS attack could be well under way before its noticed.

 

How Quickly Will You Let Me Know?

 

When something bad happens, you want to be the first to know about it. The Time to Alert SLA is crucial for ensuring that you’re notified immediately if under attack. Failure to include this metric means that your mitigation provider does not commit to immediate notification of an attack, and puts the burden on you, your customers, or worse – your boss – to find out on their own.

 

How Swiftly Will You Divert?

 

For on-demand DDoS protection deployments, the time it takes the system to initiate diversion is a crucial step to quick mitigation. Any delay in diversion can result in needless downtime. The Time to Divert SLA commits to how fast your mitigation provider will initiate diversion once an attack has been detected. Not having this metric in your SLA likely means that the DDoS mitigation provider lacks the technology or processes to ensure fast diversion, leaving you exposed for longer periods.

 

How Fast Will You Stop The Attack?

 

Once an attack has been detected and diverted to a DDoS mitigation provider, the next question is how fast will it take to mitigate the attack The Time-to-Mitigate metric measures the speed with which DDoS mitigation vendors mitigate different types of attacks, based on attack characteristics. Although most providers provide this commitment, there are still many that do not. This is a key metric, and unwillingness to commit to mitigation time should cast serious doubt on their ability to stop attacks.

 

How Do You Measure Quality of Protection?

 

Shakespeare said that “a rose, by any other name, would smell just as sweet.” Sadly, the same is not true when it comes to DDoS protection. Apart from the time it takes to mitigate an attack, a key consideration is the quality of mitigation. The Consistency of Mitigation metric provides a baseline to calculate the effectiveness of mitigation, and how much bad traffic is allowed through. A high-level mitigation threshold will only allow less than 5% of attack traffic to go through. Not including a Consistency of Mitigation commitment in your SLA effectively renders Time-to-Mitigate commitments meaningless because vendors can pass almost anything for ‘mitigation’ and claim to meet mitigation SLAs.

 

How Reliable is Your Service?

 

Finally, when under attack, you want to be sure that your mitigation service will be available to take over. The Service Availability metric defines uptime requirements for service, and how much downtime will be tolerated on an annual basis. A high-quality service will commit to at-least 99.999% of uptime, which means only about 5 minutes of allowed downtime throughout the year. If your SLA does not include a Service Reliability commitment, that should make you wonder whether it will be there in a time of need.

 

These six performance indicators are crucial to guarantee the effectiveness of your DDoS protection. These metrics should be outlined in clear, straightforward terms inside your SLA document. If you don’t see them – ask your vendor about how those guarantees are provided and what they commit to. And if you don’t like their answers, perhaps you should look at alternatives.

 

Nikhil Taneja
Managing Director-India, SAARC & Middle East, Radware

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.