Transformation of the Data Center & Building the Private Cloud, Part 2

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

In Part 1 of this blog, we looked at the growing adoption of cloud and Software-Defined Datacenter (SDDC), but also the fact that network virtualization choices are many and varied, creating some uncertainty regarding how to proceed.  In part 2, we will look at network virtualization options and how to align for best success.

read more

New Research on Cyber-Attack Trends: Radware 2014-2015 Global Application & Network Security Report

The frenetic pace of network security threats leads businesses of all size, and managers at all levels, struggling to understand risk.

read more

Every Day Is Cyber Monday. Is Your Site Delivering the Best Possible User Experience?

With the allure of Black Friday weekend fading, online retailers are discovering that every day is Cyber Monday. Online shoppers expect deep discounts, free shipping, and a top-drawer user experience every day of the holiday shopping season. In this post, we’ll look at four strategies site owners are implementing to give shoppers a richer online experience, and the performance pitfalls (and solutions!) for each strategy.

read more

Transformation of the Data Center & Building the Private Cloud (Part 1)

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

In order to remain engaged and relevant in the long run, a growing percentage of enterprise IT organizations are seriously considering transforming themselves into internal private cloud service providers. The requisite enabling technology is virtualization across all three primary technology domains – compute, storage, and network – combined with a healthy dose of automation and orchestration. Server virtualization is the most mature, and has taught us much with regard to automation and improving IT agility, fueling a desire to extend the model and achieve fluid architectures such as the Software Defined Data Center (SDDC).

read more

Read this List and Check it Twice — How to Protect Your Retail Business From Cyber-Attacks This Shopping Season

As consumers are getting their shopping lists ready for the biggest shopping days of the year, businesses should get ready as well.  Cyber-attacks, and most notably DDoS attacks, are more likely to occur on high traffic days – in fact, according to a 2013 eCommerce Cyber Crime Report conducted by the Ponemon Institute, 64% of respondents say "their organizations have seen an increase in Internet fraud and/or website attacks on high traffic days such as Cyber Monday." 

read more

‘The Art of Cyber War’ at Black Hat 2014 in Sao Paulo

This week I’ll be attending the Black Hat Conference in Sao Paulo (… my first time in Brazil and I’m really looking forward to it!) and I was given the exciting opportunity to discuss some of the latest cyber-crime trends that we’ve seen at Radware.

Cyber-attacks have become so prevalent that nearly every online business, financial service, government agency, or critical infrastructure is a likely target.  In fact, a case can be made that cyber-attacks are not just a powerful option for perpetrators, but they have risen to become a desirable weapon in their caches.

read more

The Rise of Thingbots

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it will only continue to get worse.

read more

The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service

Advancements are continually being made to defend organizations from cyber-attacks. I wanted to take some time to share some powerful reminders of how diligence in approach is needed.

Organizations that used to rely on their service provider’s DDoS protection service (in-the-cloud) found that the attacks that hit their business could and would bypass the provider’s protection layer.  This is because DDoS is a tactic, not the overall problem.  Attacks borne from the Internet are the problem and solutions designed to handle a simple tactic, wind up falling short.

read more