Enterprise Level Protection requires many layers or and heuristic approaches to mitigating attacks. Over the past decade, we've seen the emergence of a new threat to global networks and have deployed an extensive 5 Tbps global network as a way of handling large attacks. Once the attacks reach our network, we apply Access Control List Rules ( ACLs) blocking traffic at the edge of our network. The second stage of mitigation involves inspecting and analyzing each packet, ensuring no malicious, service disrupting traffic makes it through to our clients