main

Attack MitigationData CenterMobile Security

The Radware Executive Exchange 2012: A Recap from Tel Aviv

November 19, 2012 — by Sharon Trachtman2

It’s not everyday you can get 300 intelligent, motivated and successful IT executives all in one place. But this past week at the Radware Executive Exchange, we saw administrators from all over the globe travel to Tel Aviv, Israel to discuss the latest application delivery controllers, data center evolution and attack mitigation offerings from Radware.

In three days, there was a mixture of IT presentations, as well as a number of breakout sessions, where customers could see the latest technology and tools offered by Radware, first hand.

Application DeliveryApplication VirtualizationServer Virtualization

The Growing Trend in vADC Density

October 11, 2012 — by Sharon Trachtman1

Over the past 2 years, Radware has offered virtualized ADC appliances with virtual ADC instances that can be used on hardware appliances or on general-purpose servers. During this time, we’ve noticed two schools of thought emerging on the all-important question of vADC density. The first, argues that vADC density is one of the key criteria to consider when evaluating a virtualized appliance. The second, however, claims that organizations will typically avoid utilizing density higher than 10-16 vADC on a single piece of hardware. In search of greater clarity, we went back after implementing hundreds of ADC consolidation and virtualization projects with thousands of vADCs to check and see if there were any identifiable trends in vADC density deployment.

Attack MitigationDDoS AttacksSecurity

A Friend in Need is a Friend Indeed

October 3, 2011 — by Sharon Trachtman0

I just came back from a tour in Europe, meeting with both customers and journalists. It was a very interesting trip, dedicated to the launch of the Radware Attack Mitigation System.

What really stood out to me were all the interesting discussions around the changes in the threat landscape. This year has been a very intense year as far as successful attack campaigns go.  Some high-profile ones included The Playstation Network data breach, RSA breach and the Epsilon data breach, just to name a few. But in all these discussions, it was clear that what customers really want is a way to effectively secure their companies against similar threats and to have someone to turn to when an attack occurs.