Always-On Is Right When
Services carry strict availability SLAs where even brief degraded performance is unacceptable. The organization faces frequent attacks or sophisticated low-volume attacks that automated detection may miss.
Network Security
How much attack traffic hitting your infrastructure before mitigation activates is acceptable?
The choice between always-on and on-demand DDoS mitigation determines how much attack traffic reaches your infrastructure before protection is active, the ongoing latency profile of your internet connectivity, and which attack types you are actually defended against.
Vendor-neutral DDoS architecture design based on your environment, not provider preferences.
The activation delay of on-demand mitigation is the central operational risk, but it is not the only dimension that matters. The model choice also determines which attack types are effectively defended, how clean traffic returns to your infrastructure, and how cost scales with attack frequency and attack size.
Generic always-on versus on-demand labels obscure the architectural specifics that determine real-world outcomes.
The right choice depends on service availability requirements, attack exposure, and provider architecture specifics.
Services carry strict availability SLAs where even brief degraded performance is unacceptable. The organization faces frequent attacks or sophisticated low-volume attacks that automated detection may miss.
Services can tolerate a short window of degraded performance while mitigation activates. Always-on latency overhead would impair user experience and attacks are infrequent enough to justify the cost model.
Five steps to arrive at a defensible DDoS mitigation architecture for your environment.
Segment services by availability SLA, revenue impact, and attack exposure to drive protection tier decisions.
Review attack history and industry patterns to match architecture to realistic threat exposure.
Map scrubbing center locations and anycast coverage against user and data center locations.
For enterprise environments with diverse service profiles, the right answer is usually tiered protection.
Always-on cloud scrubbing combined with application-layer WAF protection for revenue-generating services with strict SLAs.
On-demand cloud protection with fast-activation SLA, combined with on-premises DDoS appliances sized for circuit capacity.
On-premises filtering combined with on-demand upstream protection for extreme events that exceed circuit capacity.
A DDoS architecture that addresses only volumetric attacks leaves application-layer attack surface undefended, and modern attacks commonly combine both vectors.
UDP reflection amplification, ICMP floods, and TCP SYN floods target bandwidth and connection capacity.
Always-on or on-demand cloud scrubbing is effective for these classic attack types.
TCP state exhaustion and fragmented packet attacks target stateful devices and are handled at the scrubbing layer.
HTTP floods, slow POST attacks, and API abuse run at low bandwidth and bypass volumetric detection.
Requires web application firewall or application-aware scrubbing service.
IVI approaches DDoS architecture without vendor bias because the right answer depends on the environment rather than provider relationships.
Architecture emerges from service classification and attack exposure analysis rather than predetermined vendor preferences.
Aegis co-managed services correlates on-premises appliance telemetry, circuit performance, and upstream scrubbing activation into a single operational view.
Review related solution pages, supporting materials, and additional resources that help explain where this solution fits and how it can be applied.
Common questions about DDoS mitigation architecture decisions.
Yes, and for most enterprises this is the right answer. Always-on protection for the most critical and frequently-attacked services, on-demand for general connectivity, on-premises appliances for small attacks that do not require upstream involvement. The cost of always-on protection concentrates where it delivers the most value.
Pre-established BGP sessions with the scrubbing provider are the single largest factor. Configuring BGP sessions in advance rather than establishing them reactively reduces diversion time from minutes to seconds. Pre-configured protection templates and automated detection with human-initiated override are additional factors.
The overhead depends on where scrubbing POPs sit relative to users and origin infrastructure. An anycast provider with POPs closer to users than the origin can deliver neutral or even slightly improved latency. A regional scrubbing provider poorly placed for a given geography can add enough overhead to degrade user experience on latency-sensitive applications.
Traditional volumetric DDoS mitigation at the network layer does not reliably defend against application-layer attacks. HTTP floods, Slowloris, and API abuse run at low bandwidth and do not generate volumetric signatures that trigger scrubbing. L7 protection requires a web application firewall or application-aware scrubbing tier.
CDN-integrated DDoS protection proxies all application traffic through the CDN's global anycast network continuously, absorbing attacks at the edge. For web applications and APIs, this is often the most operationally simple option addressing L3, L4, and L7 attacks through a single architecture. The limitation is that non-HTTP protocols remain outside the protection scope.
On-premises appliances handle small and medium attacks inline with no activation delay, no upstream coordination, and no per-incident scrubbing charges. For attacks within the capacity of the internet circuit and the appliance itself, on-premises mitigation is instantaneous. The limitation is that attacks saturating the upstream circuit cannot be mitigated on-premises.