Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a lecture track that ran throughout the day and included breaks for the sponsors’ pavilion.
Effectively a next generation load balancer, enterprises are deploying Application Delivery Controllers (ADCs) to front-end their mission critical applications. The enterprise ADC market is mature with well established players and solutions. Yet when moving applications to the cloud – it’s a completely different playground. The business need is to support a new application life cycle—one that allows the business to scale across hybrid cloud environment.
In this post I will explore an application life cycle use case across hybrid cloud, and how to properly deploy an ADC in the cloud to support the application life cycle.
Anyone intimately connected to the world of server virtualization and cloud computing is no stranger to the name VMware. From an early stage, Radware and VMware have been strategic partners, delivering comprehensive and cost-effective virtual ADC solutions for enterprises and carriers operating in the cloud. Today, with the release of VMware’s Application Director 5.0, the two companies are offering an integrated virtual ADC solution that helps customers simplify and automate the management of their Software-defined-Datacenters (SDDC). Radware’s Alteon VA with VMware’s provisioning solution VMware vFabric Application Director is now generally available for download on VMware’s Cloud Application Marketplace.
On Saturday February 11, 2012 Anonymous Group coordinated a DDoS attack against Panama government website www.presidencia.gob.pa. The site suffered initially from service disruption but was restored shortly.
What can we learn from this case?
- Hacktivism surpasses financially motivated attackers. Even if you are not a G7 or G10 country – you still are a potential victim to cyber-hacktivism. Israel, Turkey, New-Zealand government site also have been attacked. Reassess your risk.
Major DDoS attacks are often portrayed in the media using measurement terms like “a 10Gbps DDoS attack hit site X” or “an 8 Million packet-per-second DDoS flooded site Y”. While these numbers are easy to understand – they may be misleading to organizations that are planning for and implementing network security solutions. Radware’s 2011 Global Application & Network Security Report not only debunks DDOS myths – it serves as a guide for improving your organization’s overall security posture.
Attacks and countermeasures typically focus on techniques, vulnerabilities, systems and tools. There is another angle of the cat-and-mouse fight between attackers and victims — the economical aspect of this cyber war.
Most organizations that utilize network defense software have adopted a passive approach when attempting to stop cyber attacks. That’s because most of the defense software solutions available wait until the system is under attack before kicking in and attempting to slow it down. Furthermore, security managers focus on deploying point security solutions – making them an easy target for attackers who seek for the blind spots by launching multi-vulnerability attack campaigns.
IPv6 was designed to solve the limited addressing space of IPv4 and includes built-in security features to provide authentication, data confidentiality and integrity. However, it does not address service availability and security, which may occur due to IPv6’s inherent vulnerabilities and weaknesses that can be exploited by attackers.