Manager Strategic Planning at Endurance International Group
Real User
Feb 4, 2019
In the DDoS it's difficult to validate what is a genuine request from an end user. We've started being able to do that with the logistics that they have set up. With the protection that they have provided, they are able to identify what is valid and what is not valid. We see that a person who is getting DDoS Neustar service is able to block that particular user. However, while they are doing that it doesn't affect other customers on the server.
Find out what your peers are saying about TransUnion, NETSCOUT, Cloudflare and others in Distributed Denial-of-Service (DDoS) Protection. Updated: March 2026.
Distributed Denial-of-Service (DDoS) Protection solutions mitigate attacks designed to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic.DDoS Protection involves techniques and technologies that deploy proactive measures to safeguard networks against intentional attempts to make online services unavailable. A knowledgeable audience appreciates the importance of robust DDoS Protection as it ensures business continuity. This...
In the DDoS it's difficult to validate what is a genuine request from an end user. We've started being able to do that with the logistics that they have set up. With the protection that they have provided, they are able to identify what is valid and what is not valid. We see that a person who is getting DDoS Neustar service is able to block that particular user. However, while they are doing that it doesn't affect other customers on the server.