Next Steps – Completing your Evaluation

What have you learned by now?

DDoS Architecture

The Technical Evaluation provided you with a basic understanding on DDoS architecture options. The report is focused on DDoS Cloud Protection and you may need to read on your own about on on-premises protection, ISP based protection and Hybrid architecture. Decide on the best DDoS architecture that suites your organization’s needs.

DDoS-Intro-Image

Vendor Comparison

This vendor comparison helped you compare how solutions differ in their Deployment & Service Options, Mitigation, UX and Reporting, and understand Which Solution is Right for You? based on your needs.

Additional vendors

The report currently covers only three vendors. Using your knowledge you should now be able to investigate additional solutions till we add more vendors in the future.

next-step-no-logo-white

DDoS evaluation process and remaining tasks

What’s next?

Stability and Support

Stability and support are critical factors, but were not cover in our report. Next you should try and evaluate these aspects on your own.

Mission Critical Services May Suffer Stability Issues in Cloud Services It is common knowledge that all cloud-based services may have stability issues that are the result of a multi-tenant environment. The main problem is that an enormous attack on one tenant can affect another tenant. Stability should be a key factor for organizations with mission critical services, that rigorously monitoring their service and cannot tolerate short outages or latency. it is recommended to validate stability with potential vendors, determine their reputations and conduct longer POCs.
Mission Critical Services May Suffer Stability Issues in Cloud Services It is common knowledge that all cloud-based services may have stability issues that are the result of a multi-tenant environment. The main problem is that an enormous attack on one tenant can affect another tenant. Stability should be a key factor for organizations with mission critical services, that rigorously monitoring their service and cannot tolerate short outages or latency. it is recommended to validate stability with potential vendors, determine their reputations and conduct longer POCs.

Pricing

Most vendors keep pricing very private.When you get quotes from vendors, make sure that they are provided in a manner that will allow you to compare apples-to-apples.

POC

Old-timers know the POC (Proofs of Concept) can lie more than tell the truth. The main goal in POC is to take you from the theoretical data sheets to the practical, hands-on experience, and enable you to make a more educated decision.

Another approach is to purchase the service for a limited time or in buy-or-return model and integrate it in your production. This approach is not always possible, but it is more productive than a POC.

Decision

At this point you should have enough input to make a decision.


  

  

Newsletter

Stay up to day with the latest DDoS news

Error: Contact form not found.