main

Security

2017 Considerations before Buying an Attack Mitigation System

May 11, 2017 — by Carl Herberger2

buying-attack-mitigation-960x641.jpg

Managing the security of critical information has proven a challenge for businesses and organizations of all sizes. Even companies that invest in the latest security infrastructure and tools soon discover that these technology-based “solutions” are short-lived. From antivirus software to firewalls and intrusion detection and prevention systems, these solutions are, in fact, merely the most effective strategies at the time of implementation. In other words, as soon as businesses build or strengthen a protective barrier, the “bad guys” find another way to get in. Attackers are constantly changing their tactics and strategies to make their attacks and scams as damaging as possible.  The good news is that it appears that attacks and subsequent defenses are breaking down in categories which can be measured systematically. The following areas are of a particular concern as we look towards 2017-2018 planning for attacks:

Cloud SecurityDDoSSecurity

Network-as-a-Sensor: A New Approach to the DDoS Problem

February 17, 2016 — by Ron Meyran1

network-as-a-sensor-2-960x480.jpg

Mike Geller from Cisco’s CTO office and Ehud Doron of Radware’s CTO office presented at Cisco Live Berlin 2016 the revolutionary concept of Network-as-a-Sensor to fight DDoS attacks.

There are two approaches to detect against DDoS attacks: on-premise (also sometimes called in-line) and Cloud (out of path). When a DDoS solution is deployed on-premise, organizations benefit from an immediate and automatic attack detection and mitigation solution. Within seconds from the start of an attack, the online services are well protected and the attack is mitigated.

Attack Types & VectorsSecurity

Best Practices for Hybrid Cloud/On-Premise Attack Mitigation

February 1, 2016 — by Ben Zilberman0

hybrid-mitigation-2-960x720.jpg

The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies – not only in advanced security capabilities, but also with state of the art methods of management and integration with other network security elements.

You want your security elements to play together in a well synchronized manner. You wouldn’t want to have to intervene to frequently make manual adjustments, would you?

DDoSSecurity

The “State” of DDoS Mitigation Products and Vendors

December 3, 2015 — by Dennis Usle0

DDoS Attacks have become a mainstream topic frequently in the news with coverage in major news outlets around the globe from ABC News to ZDNet and most in between.  Attack campaigns by groups like Anonymous, DD4BC, Lizard Squad and Lulzsec have become dinner conversations in many homes and online businesses have been struggling to keep pace with the evolving threat landscape.

DDoSSecurity

Network Security Can Only Mitigate What It Can Detect

October 28, 2015 — by Ben Desjardins1

When meeting with companies newly looking into protection from DDoS attacks, it’s a common occurrence that they have no idea they’ve already been attacked. Certainly, a healthy number of companies that come to Radware looking for help are those that have been hit by large attacks. They either had no solution in place or found that the solution they had was ill equipped. Also not uncommon are organizations that have been threatened by attacks through some kind of ransom-based threat. Naturally, these evaluations occur under some urgency and duress, making it challenging on both sides.

DDoSSecurity

Radware Integration Enables Cisco Customers to Fight Security Fire with Firepower

October 15, 2015 — by Zeus Kerravala0

Zeus Kerravala is founder and principal analyst of ZK Research, and is a featured guest blogger.

The topic of cyber security is always near the top of any business or IT leaders’ priority list.  In my years as an analyst and prior to that, an IT leader, I’ve never seen more focus on security than I do today.  Over the past few years we have seen a rash of high profile breaches in organizations like banks, Ashley Madison, the Office of Personnel Management, and Target.  These organizations spend tens of millions of dollars trying to protect their organization, yet they fail.

Attack Types & VectorsHacksSecuritySSL

How Application Attacks Take Advantage of Holes in Legacy Network Security Solutions

September 16, 2015 — by Louis Scialabba0

The attacks that get the most news coverage have dramatic names that make for compelling headlines. You can practically feel the intensity of brute force or volumetric DDoS attacks. These attacks target layers 1-4 of operator networks, the layers where data is moved around in the network. But, there’s a troubling blind spot in legacy network security solutions that enables hackers to go deeper into the operators network – all the way through to Layer 7, the application layer.

DDoSSecurity

Poor Application Attack Visibility is a Major Threat to Carrier Network Security

August 10, 2015 — by Louis Scialabba0

If you own, operate, or even consume a carrier-grade communications network, it’s a safe bet you are under attack right now.  Attack motivations and attack tactics may vary, but one consistency is that high profile, sophisticated attacks on carrier networks are increasing – in both number and severity.  Attackers are getting in and causing slow-downs in network speed and performance, service outages and worse.

DDoSSecurity

What Do You Know About DDoS Attacks? Here’s The Ultimate Guide

June 22, 2015 — by Ben Desjardins2

Every good hero needs a trusty guide.

Sherlock Holmes had his Watson. Bruce Wayne had Alfred. Captain Kirk? He had Spock. Today’s information security professionals are no different. They work in the trenches to protect networks and applications and they are the modern day heroes of our digital lives. And thus, a guide for keeping up with the fast evolving cyber-threat landscape is valuable when supporting combat.

DDoSSecuritySSL

Radware and Cisco Sign OEM Agreement As DDoS Mitigation Becomes a SP Imperative

June 8, 2015 — by Ron Meyran0

DDoS attacks are no longer just a nuisance and they can cause lasting damage.  Organizations that ignore this threat often learn the high costs involved in the damage from these attacks – ranging from mild service degradation and to extended service outage. According to Aberdeen Group research, the cost of a one second delay in website load time can translate to a 7% reduction in conversion rate and up to $2.5 million in losses per year.  The cost of outage?  That can reach nearly half a million dollars per hour.