{"id":3632,"date":"2021-07-30T16:55:25","date_gmt":"2021-07-30T20:55:25","guid":{"rendered":"https:\/\/chrisgrundemann.com\/?post_type=avada_portfolio&#038;p=3632"},"modified":"2021-08-04T14:24:28","modified_gmt":"2021-08-04T18:24:28","slug":"key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0","status":"publish","type":"avada_portfolio","link":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/","title":{"rendered":"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Protection from Distributed Denial of Service is crucial for websites and applications that are accessed over the Internet. There are several different DDoS protection techniques which suit different requirements, this report will help you identify capabilities that suit your requirements&#8230;<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/gigaom.com\/report\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Keep Reading<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4261,"featured_media":3633,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"portfolio_category":[981],"portfolio_skills":[992],"portfolio_tags":[1098,976,995],"class_list":["post-3632","avada_portfolio","type-avada_portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-content-creation","portfolio_skills-research","portfolio_tags-ddos","portfolio_tags-gigaom","portfolio_tags-report"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0 ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0 ~ Chris Grundemann\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-04T18:24:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/\",\"name\":\"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0 ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg\",\"datePublished\":\"2021-07-30T20:55:25+00:00\",\"dateModified\":\"2021-08-04T18:24:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Content Creation\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio_category\\\/content-creation\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/chrisgrundemann.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/grundemann\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cgrundemann\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0 ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/","og_locale":"en_US","og_type":"article","og_title":"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0 ~ Chris Grundemann","og_url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/","og_site_name":"Chris Grundemann","article_modified_time":"2021-08-04T18:24:28+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@ChrisGrundemann","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/","url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/","name":"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0 ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg","datePublished":"2021-07-30T20:55:25+00:00","dateModified":"2021-08-04T18:24:28+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/08\/pietro-jeng-n6B49lTx7NM-unsplash-scaled.jpg","width":2560,"height":1707,"caption":"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution-v1-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"Portfolio","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/"},{"@type":"ListItem","position":3,"name":"Content Creation","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio_category\/content-creation\/"},{"@type":"ListItem","position":4,"name":"Key Criteria for Evaluating a Distributed Denial of Service (DDoS) Solution v1.0"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/avada_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/4261"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=3632"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3632\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/3633"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=3632"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_category?post=3632"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_skills?post=3632"},{"taxonomy":"portfolio_tags","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_tags?post=3632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}