Well, when we spoke to this company, they said they would be happy to do all of that–at their disaster recovery data center located within a large carrier facility on the east coast. Would you do a DDoS POC? You rack and stack the DDoS mitigation appliance (orĮnable the service if it is cloud based), set up some type of management IPĪddress, configure the protection policies, and off you go! Provided an attack demo using our sandbox lab in Mahwah.Įverything was moving along just fine until the customer asked us for a Proof of Concept (PoC), what most would consider a natural next step in the vendor evaluation process. ISP links, types of applications, physical connectivity, and more. The discussion, our team asked a series of technical questions related to their
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |