In this article, you will learn,
- how the anti-DDoS service included in the Open Telekom Cloud works.
- what methods are used in the fight against DDoS attacks.
- how to activate and configure anti-DDoS
- the advantages of Cloud Eye (CES) - the free-of-charge, high-performance monitoring service
There’s no doubt that cyber criminality has now reached unprecedented levels. Hackers today have a vast arsenal of criminal techniques at their disposal, making companies of all sizes a target. So-called Distributed Denial of Service attacks (DDoS), where hackers try to overwhelm servers to put them out of service, are particularly dreaded. During the widespread DDoS attacks, servers are brought to their knees by countless requests within a short space of time from various IP addresses.
Despite the common misconception, cloud platforms are actually well protected when it comes to cyber security. Why? Because they are backed by the necessary experience and resources to successfully repel a cyber-attack. Open Telekom Cloud already includes anti-DDoS features, making it more than capable of handling an attack!