4 Steps to Be Prepared for Ransom DDoS Attacks

Logo
Presented by

Ezer Goshen, VP Business Development (Radware); Eva Abergel, Product Marketing Manager (Radware)

About this talk

Ransom DDoS attacks are becoming more and more popular as a form of online extortion. Many opportunist hackers are looking for new ways to earn money while threatening to impact organizations’ service availability. With the holiday season coming up, many organizations, including retailers, ecommerce, and financial services, simply cannot afford to lose the availability of their assets and negatively impact the SLA to their customers. Even just a minute of downtime can have meaningful negative impact on revenue and reputation. In this webinar, we will cover four steps that any organization can take ahead of time, to make sure they are protected from Ransom DDoS attacks.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (348)
Subscribers (53173)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.