<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-03-12T16:35:00+00:00</dc:date>

	
	<item>
		<title> Identify DDoS Attacks with External Performance Monitoring (Part 2 of 3) (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20131218_identify_ddos_attacks_with_external_performance_monitoring_part_2</guid>
		<link>https://circleid.com/posts20131218_identify_ddos_attacks_with_external_performance_monitoring_part_2</link>
		<description><![CDATA[In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. <a href="https://circleid.com/posts20131218_identify_ddos_attacks_with_external_performance_monitoring_part_2">More...</a>]]></description>
		<dc:date>2026-03-12T09:35:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Identify DDoS Attacks with Monitoring of Internal Applications (Part 1 of 3) (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20131209_identify_ddos_attacks_with_monitoring_internal_applications_part_1</guid>
		<link>https://circleid.com/posts20131209_identify_ddos_attacks_with_monitoring_internal_applications_part_1</link>
		<description><![CDATA[Most cloud DDoS mitigation services are offered on demand meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out -- quickly -- that it is under attack? Sometimes it is difficult to know. In this three part series, we will examine multiple monitoring tools companies can use to capture DDoS, which can help determine whether you are under a DDoS attack. <a href="https://circleid.com/posts20131209_identify_ddos_attacks_with_monitoring_internal_applications_part_1">More...</a>]]></description>
		<dc:date>2026-03-12T09:35:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>