Detecting DDoS attacks in good time
With G DATA Network Monitoring, companies have a permanent overview of their IT infrastructure.
Internet users and companies observed and worried about the dramatic effects that DDoS (Distributed Denial of Service) attacks have had on the digital ecosystem in the past month. Large Internet companies and their services were no longer available as a consequence of a cyber attack. Is this just an isolated case? No, DDoS attacks are among the most common forms of cyber attack. According to a current TeleTrust survey, one in three companies has been the victim of a DDoS attack. The use of an effective early warning system is essential to be able to respond quickly to an attack. This is precisely what G DATA is addressing with its Network Monitoring solution. It enables IT managers to detect DDoS attacks in good time so that appropriate defence measures can be implemented.
In a DDoS (Distributed Denial of Service) attack, a very large number of devices are used to specifically overload a service with a large volume of queries. This overload leads to a web shop or website being no longer available or only responding very slowly. This can become a problem for companies as no further orders can be taken via a web shop and, therefore, no more turnover can be generated. Such overload attacks are offered as a service in underground forums and can be booked by the hour or the day. In this way, attackers try to force the victim into paying a ransom or cause them commercial damage.
To ensure that no web shop turnover is lost in the event of a DDoS attack, and that potential customers can continue to access the company website, administrators need a reliable network monitoring tool. In G DATA Network Monitoring, threshold values can be defined using historical data that help to identify irregularities. If, for example, the load on the website exceeds a specified average value, the IT manager automatically receives an email alert. In the event of an attack, the response can be swift and corrective action be taken, such as enabling load distribution.
For further information on G DATA Network Monitoring, please see: https://www.gdatasoftware.com/business/network-monitoring