Mitigating a DDoS attack

The DDoS mitigation is a process of protecting the targeted network from the anticipated DDoS attack. A special purpose network equipment or an alternative cloud-based security measures are used for protecting the networks from attackers. Typically, a DDoS mitigation process consists of 4 steps: The detection of possible traffic flow anomalies that may indicate the …

Mitigating a DDoS attack Read More »

Key metrics to measure with RUM

Real User Monitoring (RUM) is one of the most common approaches to perform web monitoring. It is designed in a way to be as unobtrusive as possible. With RUM, it is possible to gain insights into the following key metrics: Communication / network time Network time starts when a user clicks on a link until …

Key metrics to measure with RUM Read More »

How does WAF work?

WAF usually resides in front of web servers, by placing a filtration barrier between the targeted server and the attacker. the WAF is able to protect against attacks like cross-site forgery, cross-site scripting and SQL injection in real time. Learn more about mlytics Enhanced Security feature. Working model Positive Security Model – PSM or Whitelisting only allows web …

How does WAF work? Read More »

How Multi CDN can protect your website?

Mitigate cyber attacks Multi CDN can directly mitigate and even out attack requests/traffics to all available CDNs to maintain uptime without affecting website operation. However, most IT experts find it challenging to manually manage CDN distribution under stressful attack scenarios.  Most Multi CDN options on the market are still very manual-driven or are just using …

How Multi CDN can protect your website? Read More »