DDoS Mitigation Cloud Vendors

In the last posting about DDoS Mitigation Solutions, I discussed how hardware vendors in the DDoS protection space differ. I highlighted how different companies process data differently using tap vs. flow, the advantages and disadvantages of ASIC vs. commodity CPUs, and the problem of DDoS protection from a scale perspective. The goal around hardware is performance, […]