The first six (6) months of 2020 displayed a significant increase in the volume of offensive cyber activities worldwide. Moreover, Comsec has identified that the number of DDoS oriented attacks is growing and is becoming the preferred method of attack, as companies become much more reliant on their digital platforms to conduct business. This means that, if successful, a DDoS attack has direct impact on company’s operations and financial performance.Current data shows most DDoS attacks are increasing in power and using multi-vector attacks more frequently.
The average attack now lasts 24% longer, and the maximum attack length has jumped by 264%. The number of DDoS attacks over 100 GB/s in volume increased 776 percent in Q1 2020
Most companies invest effort and money in technology and procedures in order to mitigate a DDoS attack. However, these countermeasures may fail at the critical moment due to inappropriate configuration and gaps in policies.
D.STORM offers a broad range of DDoS attack types that can be conducted in an automated and controlled manner. The objective of D.STORM is to identify the weak points and vulnerabilities in the client’s infrastructure by stress testing it using a variety of attack methods. This approach allows the client to mitigate its cyber risk exposure and take corrective action to be able to withstand potential DDoS attacks against its sensitive and strategic assets. D.STORM maximizes the ROI of DDoS mitigation.
The D.STORM SaaS DDoS simulation platform fits most types of organizations that consume or deliver DDoS Simulation services.
D.STORM simulates real DDoS attacks using clear and simple web interface, in a controlled manner.
Simulate real DDoS attacks
Intuitive and user-friendly UI
Run generic and custom-made attacks
Over 20,000 attack bots
Over 400 Gbps volumetric attack
Over 20 out-of-the-box attack types
In-depth real time reporting and logging capabilities
Safety Mechanisms
Access to the D.STORM platform includes the following out of the box services and capabilities
Attack Types
Volumetric Attacks
SYN flood, TCP & UDP flood (all variations), Amplification attacks
The D.STORMSaaS DDoS simulation platform fits most types of organizations that consume or deliver DDoS Simulation services.On-boarding
The process of tenant configuration, user’s creation of accounts, and training of the users to use the system.
Professional Services
Assistance from Comsec’s DDoS professionals in
a wide range or areas such as:
Assistance in building DDoS Resilience plan
Assistance in reading and understanding the
results of the simulation
Creation of custom attack types
Attack types are constantly added by D.STORMresearch team.SupportD.STORM team will provide on-going support for platform related cases.
Custom Attacks
DDoS Attack types tailored for specific
organization’s application or infrastructure. Mainly used for specific business logic cases.
Managed Service
D.STORM platform can be delivered as a managed
service in conjunction with Comsec’s partners or by
Comsec itself.
Contact us to schedule a D.STORM demo and experience first hand the capabilities of Comsec’s
DDoS simulation platform, that can help you improve your organization’s resiliency to DDoS attacks.
We are sorry to hear you have a problem, but we are here to help!
Our Hot Line is ready to provide immediate assistance 24/7
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.