Cloud SecurityDDoSSecurity

Network-as-a-Sensor: A New Approach to the DDoS Problem

February 17, 2016 — by Ron Meyran1


Mike Geller from Cisco’s CTO office and Ehud Doron of Radware’s CTO office presented at Cisco Live Berlin 2016 the revolutionary concept of Network-as-a-Sensor to fight DDoS attacks.

There are two approaches to detect against DDoS attacks: on-premise (also sometimes called in-line) and Cloud (out of path). When a DDoS solution is deployed on-premise, organizations benefit from an immediate and automatic attack detection and mitigation solution. Within seconds from the start of an attack, the online services are well protected and the attack is mitigated.

Attack Types & VectorsSecurity

Best Practices for Hybrid Cloud/On-Premise Attack Mitigation

February 1, 2016 — by Ben Zilberman0


The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies – not only in advanced security capabilities, but also with state of the art methods of management and integration with other network security elements.

You want your security elements to play together in a well synchronized manner. You wouldn’t want to have to intervene to frequently make manual adjustments, would you?


The “State” of DDoS Mitigation Products and Vendors

December 3, 2015 — by Dennis Usle0

DDoS Attacks have become a mainstream topic frequently in the news with coverage in major news outlets around the globe from ABC News to ZDNet and most in between.  Attack campaigns by groups like Anonymous, DD4BC, Lizard Squad and Lulzsec have become dinner conversations in many homes and online businesses have been struggling to keep pace with the evolving threat landscape.


Network Security Can Only Mitigate What It Can Detect

October 28, 2015 — by Ben Desjardins1

When meeting with companies newly looking into protection from DDoS attacks, it’s a common occurrence that they have no idea they’ve already been attacked. Certainly, a healthy number of companies that come to Radware looking for help are those that have been hit by large attacks. They either had no solution in place or found that the solution they had was ill equipped. Also not uncommon are organizations that have been threatened by attacks through some kind of ransom-based threat. Naturally, these evaluations occur under some urgency and duress, making it challenging on both sides.


Radware Integration Enables Cisco Customers to Fight Security Fire with Firepower

October 15, 2015 — by Zeus Kerravala0

Zeus Kerravala is founder and principal analyst of ZK Research, and is a featured guest blogger.

The topic of cyber security is always near the top of any business or IT leaders’ priority list.  In my years as an analyst and prior to that, an IT leader, I’ve never seen more focus on security than I do today.  Over the past few years we have seen a rash of high profile breaches in organizations like banks, Ashley Madison, the Office of Personnel Management, and Target.  These organizations spend tens of millions of dollars trying to protect their organization, yet they fail.

Attack Types & VectorsHacksSecuritySSL

How Application Attacks Take Advantage of Holes in Legacy Network Security Solutions

September 16, 2015 — by Louis Scialabba0

The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel the intensity of brute force or volumetric DDoS attacks. These attacks target layers 1-4 of operator networks, the layers where data is moved around in the network. But, there’s a troubling blind spot in legacy network security solutions that enables hackers to go deeper into the operators network – all the way through to Layer 7, the application layer.


Poor Application Attack Visibility is a Major Threat to Carrier Network Security

August 10, 2015 — by Louis Scialabba0

If you own, operate, or even consume a carrier-grade communications network, it’s a safe bet you are under attack right now.  Attack motivations and attack tactics may vary, but one consistency is that high profile, sophisticated attacks on carrier networks are increasing – in both number and severity.  Attackers are getting in and causing slow-downs in network speed and performance, service outages and worse.


What Do You Know About DDoS Attacks? Here’s The Ultimate Guide

June 22, 2015 — by Ben Desjardins2

Every good hero needs a trusty guide.

Sherlock Holmes had his Watson. Bruce Wayne had Alfred. Captain Kirk? He had Spock. Today’s information security professionals are no different. They work in the trenches to protect networks and applications and they are the modern day heroes of our digital lives. And thus, a guide for keeping up with the fast evolving cyber-threat landscape is valuable when supporting combat.


Radware and Cisco Sign OEM Agreement As DDoS Mitigation Becomes a SP Imperative

June 8, 2015 — by Ron Meyran0

DDoS attacks are no longer just a nuisance and they can cause lasting damage.  Organizations that ignore this threat often learn the high costs involved in the damage from these attacks – ranging from mild service degradation and to extended service outage. According to Aberdeen Group research, the cost of a one second delay in website load time can translate to a 7% reduction in conversion rate and up to $2.5 million in losses per year.  The cost of outage?  That can reach nearly half a million dollars per hour.


The Road to Cyber-Safety is Shifting to Hybrid Cloud WAF Protection

April 20, 2015 — by Michael Groskop2

Hybrid Cloud WAF is the answer.  Now what was the question?

Let’s back up a minute.  There is an ancient riddle which goes something like this:

You are walking down a path and come upon a fork in the road. One side is the good path and the other side is the bad path. However, you don’t know which one is which and both paths are guarded by identical twins. One guard tells the truth and the other, always tells lies. If you want to take the good path, what should you ask the guards? You would ask “which path would your brother go?” Then, take the path opposite from where they are pointing.