Learn more about intrusion prevention system→ What is three-tier architecture? → Bots are common place on the internet, but how do you ensure you're not overrun by resource consuming requests from "bad bots." IBM Developer Advocate, Dan Kehn, explains the components and strategy you can add to your classic three-tier architecture to help protect your resources and provide the best experience for your users. So when bad bots come for you, you'll know what to do. Get started for free on IBM Cloud → Subscribe to see more videos like this in the future → Chapters 00:00 What is a "bad bot"? 01:17 Three parts of the solution 01:37 Original three-tier web topology 02:00 New components of the solution 03:30 Web Application Firewall (WAF) 04:20 What is bad behavior? 05:42 Challenging bad behavior 06:51 Caveats #bot #malware #DDoS #webdevelopment #performance











