main

Application DeliverySecurityWAF

DevOps and Security: Yes We Can

May 19, 2016 — by Ron Meyran0

web-application-firewall-3-960x679.png

Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues or facilitate productivity. They typically develop and maintain their own web applications which are tailored for their business needs. To support the growing needs of their online presence, they are adopting agile development practices also known as DevOps and Continuous Deployment.

Application DeliveryDDoSSecurity

Why Cloud-based and ISP-based Scrubbing Alone Are Inadequate.

May 18, 2016 — by David Monahan0

cloud-scrubbing-2-960x713.png

On occasion, the topic of DDoS defense has come up and invariably goes to, “Why can’t organizations rely on ISP and cloud scrubbing services to protect themselves from DDoS attacks?” The conversation also rolls over to, “Why can’t organizations rely on on-premises solutions to protect themselves from DDoS attacks?” The latter is usually asked by someone who is a novice in the field, but both are valid questions. The true answer lies with a combination defense or, to coin a common security phrase, “defense-in-depth.”

SecurityWAF

Protecting Your Applications Everywhere – Are You in Good Hands?

April 28, 2015 — by Shira Sagiv2

Cloud migration – one of the top trends this past year and predicted by many to be a top trend in 2015 – brings with it many benefits to the organization.  You can enjoy cost savings, scalability, flexibility, and productivity benefits for your organization, your customers and your partners.  Regardless of the industry they belong to, today’s enterprises are finding that the cost and speed advantages of cloud cannot be ignored.

Application DeliveryData CenterWeb Application Firewall

How Application Delivery and Security Work Hand-in-Hand

March 29, 2013 — by Nir Ilani1

At first glance, application delivery and security might seem unrelated because they appear to solve and address different challenges from different domains. But a closer look actually reveals that they are entwined. In this post I’ll break down the ways in which application delivery and security work hand-in-hand.

Application SecurityAttack MitigationBotnetsBrute Force AttacksDDoS AttacksHTTP Flood AttacksPhishingSecuritySecurity VirtualizationSEIMWeb Application Firewall

Are you ready for your Green Belt in Attack Mitigation?

July 2, 2012 — by Carl Herberger0

Knowledge Test Overview

Wow! The Attack Mitigation Black Belt Challenge is only two weeks old and already we have dueling leaders and intense competition.

People from all over the world are participating in Radware’s first Attack Mitigation Black Belt Challenge and only seven seconds separates the current leader, “dh”, from the fifth place position. It is apparent that some questions were stumbling blocks as we had two questions in the Yellow Belt round that only 10% of the participants could answer properly.

Attack MitigationSecurityWeb Application Firewall

Place Security Controls at Multiple Levels

May 24, 2012 — by Deborah Manor0

Well-kept secrets – The importance of blocking and masking measures for data leakage prevention

Nowadays organizations are more and more data driven. Thanks to advancements in technology, companies can track and analyze customers’ behavior, collecting a multitude of parameters, and store the information to better offer them a more personal experience. On the positive side, end-users get a customized service adapted to his or her preferences – the bank offers customer customized financial tracks; the HMO shows lab results comparisons based on medical history; the social media site delivers content based on location, keywords, and browsing patterns.