main

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecuritySecurity VirtualizationSEIMWeb Application Firewall

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

February 8, 2013 — by Ron Meyran0

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a lecture track that ran throughout the day and included breaks for the sponsors’ pavilion.

Application DeliveryApplication VirtualizationCloud Computing

Application Delivery Controllers (ADCs): The Last Physical Hurdle to the Software Defined Datacenter (SDDC)

December 21, 2012 — by Ron Meyran1

Effectively a next generation load balancer, enterprises are deploying Application Delivery Controllers (ADCs) to front-end their mission critical applications. The enterprise ADC market is mature with well established players and solutions. Yet when moving applications to the cloud – it’s a completely different playground. The business need is to support a new application life cycle—one that allows the business to scale across hybrid cloud environment.

In this post I will explore an application life cycle use case across hybrid cloud, and how to properly deploy an ADC in the cloud to support the application life cycle.

Application DeliveryApplication VirtualizationCloud Computing

How Cloud Ready Are You? Download Radware’s Alteon VA Blueprint Directly from the VMWare Cloud Application Marketplace

December 3, 2012 — by Ron Meyran0

Anyone intimately connected to the world of server virtualization and cloud computing is no stranger to the name VMware. From an early stage, Radware and VMware have been strategic partners, delivering comprehensive and cost-effective virtual ADC solutions for enterprises and carriers operating in the cloud. Today, with the release of VMware’s Application Director 5.0, the two companies are offering an integrated virtual ADC solution that helps customers simplify and automate the management of their Software-defined-Datacenters (SDDC). Radware’s Alteon VA with VMware’s provisioning solution VMware vFabric Application Director is now generally available for download on VMware’s Cloud Application Marketplace.

Attack MitigationDDoS AttacksSecurity

Think you are secured? Think again following Anonymous cyber-attacks against Panama government website

February 12, 2012 — by Ron Meyran0

On Saturday February 11, 2012 Anonymous Group coordinated a DDoS attack against Panama government website www.presidencia.gob.pa. The site suffered initially from service disruption but was restored shortly.

What can we learn from this case?

  1. Hacktivism surpasses financially motivated attackers. Even if you are not a G7 or G10 country – you still are a potential victim to cyber-hacktivism. Israel, Turkey, New-Zealand government site also have been attacked. Reassess your risk.

Application SecurityAttack MitigationSecurity

DDoS Attack Myths: Does Size Really Matter?

February 6, 2012 — by Ron Meyran11

Major DDoS attacks are often portrayed in the media using measurement terms like “a 10Gbps DDoS attack hit site X” or “an 8 Million packet-per-second DDoS flooded site Y”. While these numbers are easy to understand – they may be misleading to organizations that are planning for and implementing network security solutions. Radware’s 2011 Global Application & Network Security Report not only debunks DDOS myths – it serves as a guide for improving your organization’s overall security posture.

Attack MitigationDDoS AttacksSecurity

Fighting Cyber Attacks in Real Time with AMS

September 19, 2011 — by Ron Meyran0

Most organizations that utilize network defense software have adopted a passive approach when attempting to stop cyber attacks.  That’s because most of the defense software solutions available wait until the system is under attack before kicking in and attempting to slow it down. Furthermore, security managers focus on deploying point security solutions – making them an easy target for attackers who seek for the blind spots by launching multi-vulnerability attack campaigns.

Application SecuritySecurity

IPv6 Threats: What you should know before ramping up a new service layer

August 1, 2011 — by Ron Meyran0

IPv6 was designed to solve the limited addressing space of IPv4 and includes built-in security features to provide authentication, data confidentiality and integrity. However, it does not address service availability and security, which may occur due to IPv6’s inherent vulnerabilities and weaknesses that can be exploited by attackers.