From Point Solutions to Application Centric Services: Cisco ACI and Radware

For decades IT managers have been deploying application delivery (Layers 4 – 7) and security services as point solutions.  The network provided the basic connectivity and each L4-7 had to be configured manually per each application.  Virtualizing the compute fabric enabled automation at the configuration stage; however, L4-7 and security were still deployed as point solutions.  Each application infrastructure change still required intervention in rewiring the physical network, reconfiguring network nodes and, of course, with testing application integrity end-to-end and performance.

read more

The Right Way to Secure Your Applications Against DDoS Using Signaling

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

Let’s face it. DDoS are the big, fat, scary bully of the Internet. When organizations have sufficiently tight security or a would-be attacker doesn’t have the skills to overcome a target’s security, he or she can buy capacity on a bot-net or other delivery vehicle and slam packets from all over the world at the target’s site and application(s).

read more

New Research on Cyber-Attack Trends: Radware 2014-2015 Global Application & Network Security Report

The frenetic pace of network security threats leads businesses of all size, and managers at all levels, struggling to understand risk.

read more

The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service

Advancements are continually being made to defend organizations from cyber-attacks. I wanted to take some time to share some powerful reminders of how diligence in approach is needed.

Organizations that used to rely on their service provider’s DDoS protection service (in-the-cloud) found that the attacks that hit their business could and would bypass the provider’s protection layer.  This is because DDoS is a tactic, not the overall problem.  Attacks borne from the Internet are the problem and solutions designed to handle a simple tactic, wind up falling short.

read more

DDoS 2.0: Hackers Getting a Taste of their Own Medicine

Cybercrime and hacktivism are on the rise and commercial and governmental organizations are common attack targets.  But, based on recent evidence, an increasing number of cyber-attack targets are other attackers.  That’s right – attackers attacking other attackers.

read more