TNM leads in cyber-security

Written by 

Cyber security crime remains a major challenge across the world and as a way of dealing with the vice; TNM plc has announced the provision of Distributed Denial of Service attack (DDoS) protection solutions to its clients.

Deshmukh: Cyber-crime affects service delivery Deshmukh: Cyber-crime affects service delivery
08
March


Announcing the service, TNM’s Managing Executive for Enterprise Services, Vishwajeet Deshmukh said the company’s drive in offering the DDoS protection on the network layer to its clients was triggered by the increasing threat of cyber-attacks with potential to negatively impact on service delivery.


“This will grant protection from volumetric DDoS attacks that attempt to consume the bandwidth of the customer, and cause congestion. With TNM DDoS protection, organizations will be able to avoid the DDoS cyber-attacks that can greatly affect their service delivery for their customers,” said Deshmukh.


He further observed that the key impact of DDoS attack has resulted in brand reputation damage following such incidents as public facing website or application unavailability that can lead to angry customers, lost revenue and brand damage.


“DDoS also has the potential to reduce productivity. For instance, when critical applications become unavailable, operations and productivity stops slowly. Internal websites that partners rely on usually experiences supply chain and production disruption,” noted Deshmukh.


Deshmukh highlighted that Distributed Denial of Service attacks vary significantly, and there are thousands of different ways an attack can be done but they fall into three broad areas of Volumetric, TCP State-Exhaustion and Application Layer Attacks.


According to IT experts, DDoS represents a significant threat to business continuity as organizations grow more dependent on the Internet and web-based applications and services; availability has become as essential as electricity.


A DDoS attack is an attempt to exhaust the resources available to a network, application or service so that genuine users cannot gain access.


Cyber criminals utilize a combination of very high volume attacks, along with more subtle and difficult to detect infiltrations that target applications as well as existing network security infrastructure such as firewalls and IPS.

Get Your Newsletter