Welcome!

News Feed Item

Prolexic Keeps Revenues Flowing for worldofwatches.com by Mitigating DDoS Attacks

HOLLYWOOD, Fla., Nov. 19, 2012 /PRNewswire-iReach/ -- Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it has successfully mitigated two attacks against the popular e-commerce website www.worldofwatches.com.

(Photo: http://photos.prnewswire.com/prnh/20121119/CG16573)

The website is owned by Swiss Watch International (SWI), a Florida-based company that designs and manufactures timepieces. The company also distributes and owns watch lines including SWI, Edox, Giordano, Jacques Lemans, Magico, Swiss Legend, Triumph Motorcycles and Ventura. The website averages more than 33,000 unique visitors daily, and at peak times, it generates more than US$100,000 each day, so any extended period of downtime can significantly affect revenues.

Despite having a firewall in place, a 130 Mb bandwidth flood penetrated the network via a well-known gaming port and brought down worldofwatches.com for 12 hours. The next day the company called Prolexic about emergency provisioning and mitigating the attack. 

"The person we spoke to at Prolexic said they could mitigate the attack within minutes of receiving our traffic, so we signed a contract," said Darin Grey, chief technology officer at Swiss Watch International. "Prolexic gave us a virtual IP address to use, and when I pointed traffic to Prolexic they were able to mitigate the attack and sent us back clean traffic. We were back up and running within minutes as promised."

When it comes to effective DDoS mitigation, Grey believes that relying on an external provider is the best strategy. "Some attacks overwhelm your bandwidth and some overwhelm your hardware," explained Grey. "It is almost impossible for a company to block these large attacks without investing hundreds of thousands or even millions of dollars in extra network equipment. Plus networks like this take time to set up. That's one reason we chose Prolexic."

After the attack was over, SWI increased network capacity to avoid a similar scenario. However, one month later, the website was attacked again, this time with an attack that was three times larger than the first. Network bandwidth flooded and the site went down again, but this time only briefly. Working closely with the website hosting provider, Prolexic successfully stopped this much larger second attack using its cloud-based mitigation network.

Grey has sage advice for other e-commerce providers with revenue-generating websites.

"If you have a successful site and are concerned about outages and you don't have experience in fighting DDoS attacks on a large, large scale, I would definitely recommend Prolexic," he said. "As I've told other people, use it as an insurance plan. If you're not attacked now, you will eventually get attacked as DDoS increases every year. And as your site becomes more successful, you are more of a target."

With Prolexic's cloud-based mitigation network standing between worldofwatches.com and any incoming DDoS attacks, Grey is confident about long-term site availability. "I know we're doing as much as we can to prevent DDoS attacks, and I know I have someone else in my back pocket in case we ever get hit to help mitigate it." 

To learn more about the DDoS attack launched against worldofwatches.com, download the full case study at www.prolexic.com/worldofwatches.  

An extended outage caused by a DDoS attack can lead to financial loss, and adversely affect the reputation of your online business, customer relationships and Google search rankings. Learn the best practices that support fast DDoS mitigation in our new white paper, "Strategies for Surviving a Cyber Attack this Holiday Season." Or, to find how much DDoS attacks could affect your business, visit the DDoS Downtime Calculator at www.prolexic.com/downtime

About Prolexic

Prolexic is the world's largest, most trusted Distributed Denial of Service (DDoS) mitigation provider. Able to absorb the largest and most complex attacks ever launched, Prolexic restores mission-critical Internet-facing infrastructures for global enterprises and government agencies within minutes. Ten of the world's largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries rely on Prolexic to protect their businesses. Founded in 2003 as the world's first in-the-cloud DDoS mitigation platform, Prolexic is headquartered in Hollywood, Florida and has scrubbing centers located in the Americas, Europe and Asia. To learn more about how Prolexic can stop DDoS attacks and protect your business, please visit www.prolexic.com, follow us on LinkedIn, Facebook, Google+ , YouTube , and @Prolexic on Twitter.

CONTACT:
Michael E. Donner                                                                
SVP, Chief Marketing Officer
Prolexic
media {at} prolexic {dot} com
+1-954-620-6017                                                  

To view this video on YouTube, please visit: http://www.youtube.com/watch?v=E0G-iwDRSp8&feature=plcp

Media Contact: Michael E. Donner, Prolexic Technologies, 954-620-6017, [email protected]

News distributed by PR Newswire iReach: https://ireach.prnewswire.com

SOURCE Prolexic Technologies

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets.
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., will discuss how these tools can be leveraged to develop a lasting competitive advanta...
Building custom add-ons does not need to be limited to the ideas you see on a marketplace. In his session at 20th Cloud Expo, Sukhbir Dhillon, CEO and founder of Addteq, will go over some adventures they faced in developing integrations using Atlassian SDK and other technologies/platforms and how it has enabled development teams to experiment with newer paradigms like Serverless and newer features of Atlassian SDKs. In this presentation, you will be taken on a journey of Add-On and Integration ...
Now that the world has connected “things,” we need to build these devices as truly intelligent in order to create instantaneous and precise results. This means you have to do as much of the processing at the point of entry as you can: at the edge. The killer use cases for IoT are becoming manifest through AI engines on edge devices. An autonomous car has this dual edge/cloud analytics model, producing precise, real-time results. In his session at @ThingsExpo, John Crupi, Vice President and Eng...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. The...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...