We begin with an exploration call to learn about your architecture, DDoS protection measures and goals. We then plan simulations that best suit the situation, with controlled attacks and coordination with your team. After the tests have been executed, we provide a detailed report of the results, including which attacks were not mitigated, their severity, and recommendations on how to improve your defenses. We review these results in a conference call and answer any questions you may have.