Even with regular testing and the best mitigation system installed, DDoS traffic still manages to bypass a company’s DDoS mitigation defenses and cause damage.

MazeBolt’s new technology continuously & without any downtime, detects all DDoS Vulnerabilities on going. Working as a top layer on any mitigation system to provide end to end full DDoS coverage.

We take a DDoS risk-based approach, prioritizing DDoS vulnerabilities to reduce the time and effort needed to close only the highest DDoS risk vulnerabilities.


“MazeBolt's RADAR™ dramatically reduced our DDoS Gap and perfectly complements our existing DDoS mitigation systems going well beyond traditional DDoS penetration testing.

I strongly recommend MazeBolt's RADAR™ to any company that needs to ensure 24/7 availability"

Yaron Weiss,

Chief Security Officer

"Thanks to RADAR™ we're able to gain quick & complete visibility of our DDoS Threat Surface with real time 24/7 understanding of our entire DDoS vulnerability landscape.

The continuous deep insight combined with the level of information and user-friendly reporting provided by RADAR™ allowed us to dramatically reduce our DDoS risk and ensure the Parliamentary elections' integrity".

Shay Nahmani

gov.il's IT Manager

The DDoS Vulnerability GAP

Even with the most sophisticated DDoS Mitigation and DDoS Testing deployed, most companies are left with a staggering 48% DDoS vulnerability level.

This gap allows damaging DDoS traffic to  penetrate the target network, causing system disruption and  downtime. 

RADAR™ closes the gap by working as a non-disruptive top layer on any DDoS Mitigation system. Bringing down the vulnerability gap to under 2%

Red Team Vs. Mitigation Vs. RADAR™

Very high chance of Downtime during attack YES 48% Chance NO
Testing frequency About twice a year N/A Continuous
DDoS attack vectors checked per target Less than 20 N/A More than 100
How many target IP's tested - Against all attack vectors Sample - Under 5 IP's N/A Complete - Over 1000 IP's
Vulnerability gap average 48% 48% Under 2%
Vulnerability reports Per test NO Continuous - Daily
Cost $ $$$ $$
Attack response N/A Reactive when an attacks happens Continuous before an attack happens
Detection of successful attacks Sample detection only - At time of test - time of test only Partial detection - during attack Full detection - Before an attack & continuous
Added costs for Red Team testing - On Demand YES N/A NO

“Downtime costs increased 200 percent year-over-year.”

(*300+ Terrifying Cybercrime and Cybersecurity Statistics & Trends [2020] EDITION)

“The average cost of downtime is 23 times higher than the average ransom amount.”

(*300+ Terrifying Cybercrime and Cybersecurity Statistics & Trends [2020] EDITION)

Enterprise Use Case

Constantly changing and dynamic systems are continuously open to DDoS attacks.

Initial DDoS Risk (% of DDoS vulnerabilities identified on first cycle)

Launched new web applications without aligning with DDoS mitigation configuration

Added new IP addresses and upgraded network equipment

Get rid of successful DDoS attack, close DDoS vulnerabilities before they are exploited

In 2019, the number of DDoS attacks increased by almost 50% over the previous year. The average duration of attacks also increased around 50%.

(Kaspersky Labs report 2019)

Closing the gap

Detecting and Eliminating DDoS Threats Before An Attack


Mitigating Attacks and Threats After They Are Launched

ISO 27001:2013 - Certified Information Security Management System