• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Cyber Security Market

Cyber Security Technologies & Markets

  • Cyber Security Events 2022-2023
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

Cybersecurity Testing Experts Launch the First Independent DDoS Mitigation Certification Program

October 25, 2018 By CybersecurityMarket.com

NimbusDDOS, a provider of real-world distributed denial of service (DDoS) attack testing and simulation services, announced today the public launch of the first independent certification program for DDoS attack mitigation vendors. Coinciding with this announcement, NimbusDDOS is also recognising A10 Networks (NYSE: ATEN) as the first device manufacturer to complete this certification program, having successfully achieved certification of their Thunder TPS Series appliances.

In recent years, the rapid growth of Internet connected devices has caused a sharp increase in DDoS attack frequency and size. As a result, organizations of all sizes have found themselves at increased risk of DDoS attacks. Forced to respond quickly to this emerging threat, organizations are rapidly bolstering their defenses with services and products; often based only on the efficacy assurances of the vendor. Andrew Shoemaker, Founder and CEO, of NimbusDDOS said: “Enterprises often struggle with selecting DDoS attack protection products and services. By creating an independent 3rd party certification program, enterprises now have a consistent performance benchmark and framework for efficacy with which to judge potential vendors. This guarantees a more informed selection, and ultimately improved protection for their infrastructure.”

Although DDoS attacks have existed for decades, very few national and international standards exist to provide guidance on DDoS attack preparedness controls. To remediate this, NimbusDDOS constructed their own DDoS attack preparedness framework based upon more generic public cybersecurity frameworks (NIST, NIS, etc). The NimbusDDOS framework forms the foundation of the independent vendor certification program. A key feature of both the framework and vendor certification program is the notion of tiered protection that can be tailored to match the risk level of a specific organization.

Tier I Certification
Capable of identifying and mitigating the attack vectors that made up 90% or greater of in-the-wild attacks in the past year.

Tier II Certification
Capable of identifying and mitigating the attack vectors that made up 95% or greater of in-the-wild attacks in the past year.

Tier III Certification
Capable of identifying and mitigating the attack vectors that made up 98% or greater of in-the-wild attacks in the past year.
Capable of identifying and mitigating emerging threats (0-day) if applicable.
Extended testing of Tier I vectors to ensure detection of slow/low scenarios.

Tier IV Certification
Capable of identifying and mitigating the attack vectors that made up 99% or greater of in-the-wild attacks in the past year.
Capable of identifying and mitigating emerging threats (0-day) if applicable.
Extended testing of Tier I and Tier II vectors to ensure detection of slow/low scenarios.
Extended testing of multi-vector attack combinations

As an industry leader in DDoS attack testing and simulations, NimbusDDOS is uniquely capable of performing the independent vendor certification tests. The NimbusDDOS attack platform uses public cloud resources to safely and legally launch any real-world DDoS attack. These real-world attacks traverse the Internet just as a real attack, and are not synthetically produced like those generated in lab-based testing. As a result, the testing and resulting certification can be trusted to be the most accurate representation of a real-world attack. To achieve the certification, a vendor must undergo a rigorous battery of real-world attacks demonstrating ability to successfully detect and mitigate attacks while maintaining adequate performance for legitimate traffic.

A10 Certification Statement: https://www.nimbusddos.com/certification-TLKAUYN6K19G.htm

About NimbusDDOS: NimbusDDOS is the industry leader in vendor neutral DDoS attack preparedness services. Our vision is to provide the highest level of DDoS expertise to help our customers achieve the level of DDoS preparedness that their business demands. The foundation of our solutions are the expertise of our DDoS engineers, which is paired with a proprietary cloud platform that allows NimbusDDOS to perform legal DDoS attack simulations identical to those used by real-world attackers. To learn how NimbusDDOS solutions and experts are helping businesses proactively address the DDoS attack threat, please visit https://www.nmbusddos.com/

About A10 Networks: A10 Networks (NYSE: ATEN) is a provider of intelligent and automated cybersecurity solutions, providing a portfolio of high-performance secure application solutions that enable intelligent automation with machine learning to ensure business-critical applications are secure and always available. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers in more than 80 countries with offices worldwide. For more information, visit: http://www.a10networks.com and @A10Networks.

Related

Filed Under: Cybersecurity Market

Primary Sidebar

Market Analysis

There will be around 12 million tons of batteries retiring from EV between now and 2030
2021 Was the Year of Container
Top predictions for what comes next in 2022
Up to $265 billion From Hospital to Home
Global Derivatives Regulatory Roundup

Tech Events

TechCrunch held The Disrupt 2021 online on September 21-23
ITRI’s VLSI-TSA and VLSI-DAT Symposia will Kick Off on April 19-22, 2021 at Hsinchu, Taiwan
MATLAB EXPO 2022 Online Conference, May 17–18, 2022
GraphQL Summit, November 10-11, 2021
K-Global 2021, November 8-10, 2021

Market Research

Worldwide government IT spending is forecast to total $565.7 billion in 2022, an increase of 5% from 2021
InfluenceMgmt.com (Influence Management): How to get others to adopt your recommendation
Blockchaining.ai: What is Blockchain Technology and Why is it Popular
ExecutiveTravelMetaverse.com (Executive Travel Metaverse): Corporate travel market is about to become more competitive
Global assets under management (AuM) grew at 12% to more than $112 Trillion in 2021

Secondary Sidebar

Technologies

New Zealand’s leading port, Ports of Auckland, welcome the world’s first full sized, electric tugboat
Nature Co-design Technologies
Top 15 Trends Shaping IT
Jupe wants to fix homelessness with affordable and sustainable off-grid housing
Intel is rolling out new processors designed for data centers
Breakthrough Technologies 2021
Looming obsolescence of the internal combustion engine
Cloudflare ‘s 1.1.1.1 handling more than 1 trillion requests per day
Apple Unveils M1 Ultra, the World’s Most Powerful Chip for a Personal Computer
Oracle Becomes First Hyperscaler to Open a Cloud Region in Mexico

Footer

Recent Posts

  • CyberArk Announces Impact 2022: The Identity Security Event, July 12-14 2022, Boston
  • The first hybrid Security Congress will take place at Caesars Palace in Las Vegas and online from October 10-12, 2022
  • FIC 2022, Forum International de la Cybersécurité, June 7-9 2022, Lille Grand Palais, Lille, France
  • Behavioral cybersecurity platform CybSafe raises $28M
  • Forum Internacional de la Cybersécurité – FIC 2022, 7 to 9 June 2022, Lille Grand Palais, Lille, France
  • IBM Tackles Growing Attack Surface Risks with Plans to Acquire Randori
  • Talon Cyber Security Announces Integration with CrowdStrike to Extend Endpoint Protection to Unmanaged Devices
  • Secure Cloud Architecture with Policy as Code
  • Cybersecurity talent gap
  • JFrog Ushers in New Era of Open-Source Software Security, Launching Project Pyrsia to Help Prevent Software Supply Chain Attacks

Media Partners

  • Opinion
  • Press Media Release
  • Briefly
  • OPINT
  • VPNW
  • S3H
  • Domain Aftermarkets
  • App Coding
  • API Coding
  • Blockchaining

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • OSINT
  • Event Calendar
  • Calendarial
  • Domain Market Research

Copyright © 2015 CyberSecurityMarket.com

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT