|By Business Wire||
|January 29, 2014 08:02 AM EST||
Defense.Net, the only company designed to mitigate the increasing scale and sophistication of modern Distributed Denial of Service (DDoS) attacks, today announced the launch of DDoS Frontline, a new primary DDoS mitigation service designed to protect businesses and organizations against the increasing threat of modern DDoS attacks that have disabled their web and business operations. DDoS Frontline combines a network provisioned with 10 times the bandwidth and mitigation capacity per customer of the leading primary DDoS mitigation providers with breakthrough new technologies specifically designed to counter the latest and most powerful DDoS attack techniques, ensuring continuous operations for customers. It also eliminates the harmful side effects created by legacy DDoS mitigation techniques.
“Since Weebly was founded in 2006, we have been somewhat unique in building our own infrastructure in-house, including our DDoS mitigation capabilities,” said Chris Fanini, Co-Founder and CTO of Weebly, a website creation service which has enabled more than 20 million people to create their own high-quality websites. “While this infrastructure has served us well in successfully thwarting DDoS attacks in the past, we’ve recently seen an increasing number of attacks that are larger and more complex than before. By partnering with Defense.Net and utilizing their massive distributed scrubbing centers, we remain protected from these larger DDoS attacks – enabling us to remain focused on delivering our users a high-quality experience.”
In DDoS attacks, perpetrators assemble an army of compromised computers (a botnet) to inundate a website with a volume of requests that overwhelms and crashes the website. Recently, the ease of access to sophisticated attack tools has advanced to a level where a botnet that can do millions of dollars of damage within minutes can be rented for $7 per hour, making these powerful attack tools widely available to anyone with a grudge, even with minimal technical knowledge. Motivations range from political and religious hacktivists, extortionists, business competitors and even disgruntled customers and former employees.
DDoS Frontline protects against the entire spectrum of DDoS attacks, from low-level Layer 7 attacks to the increasingly frequent large-scale attacks, including those that have overwhelmed traditional DDoS mitigation services and exceeded the size of the Internet pipe before any traffic can even reach an organization’s mitigation equipment. The benefits over legacy DDoS mitigation services include:
- Fastest Time to Mitigation: Defense.Net's proprietary DefenseActioner technology intercepts each packet of traffic, determines its legitimacy, and automatically routes it to the most appropriate of Defense.Net’s several hundred different mitigation solutions for the industry’s fastest time-to-mitigation. It breaks down multi-layer attacks into their components for more thorough mitigation via the only systems specifically designed to mitigate each attack vector, versus legacy DDoS solutions that have a “one box does all” approach. Additionally, legacy DDoS mitigation services are based on having a human in the process. The new technologies created by Barrett Lyon and the Defense.Net team have automated the process where mitigation decisions and actions can be taken at the millisecond level, far faster than a human can respond. When needed, a human can be inserted into the Defense.Net mitigation process.
- All Internet Services Protected: While DDoS attacks have traditionally been aimed at the Web operations of their targets, hackers are increasingly attacking non-Web based protocols which are the foundation of many of the mission critical applications housed within the datacenter (NTP,TELNET, FTP, SNMP, SMTP, POP-3, CHARGEN, MIME and DNS).
- Eliminates Mitigation Side Effects: Defense.Net technologies eliminate the damaging side effects created by legacy DDoS mitigation solutions such as false positives, blocked users, fraud alerts, fragmentation, slow page loads, broken links, and stalled or timed out video streams. Unlike existing solutions, Defense.Net can put out the fire without breaking windows and getting water all over the place to do so.
- Highest Levels of Visibility Before, During and After an Attack: Defense.Net Frontline includes Defense.Net AttackView™, the only interactive customer portal to instantly provide the detailed information on an attack in real-time, as well as post-attack analysis. AttackView breaks down each attack into a unique timeline “story” and contains information on attack type, source and size and also the mitigation techniques utilized. It includes data not typically provided by leading DDoS mitigation services, including attack origin, diagnostics of the attack traffic, specific mitigations performed, the result of each mitigation vector on attack traffic, and how each attack responds and morphs based on the specific mitigations performed.
“DDoS attacks have grown significantly in the past 18 months, taking down even some of the largest and most heavily defended websites,” said Chris Risley, CEO of Defense.Net. “DDoS Frontline offers an entirely new set of network technologies specifically designed to protect large enterprises and critical infrastructure from today’s DDoS attacks and the growing number of actors carrying out these attacks.”
Defense.Net Frontline is based on the following components:
- Largest Network & Mitigation Capacity: Abundant network bandwidth is a key element to fighting any DDoS attack and Defense.Net has developed proprietary technologies that enable it to mitigate DDoS attacks using bandwidth more efficiently than legacy DDoS mitigation services. Its massive, fully redundant datacenters have the ability to mitigate in excess of 100% of its network capacity. This network, built from the world’s most trusted Tier 1 and Tier 2 carriers, has 10 times the network and mitigation capacity per customer than its closest competitor
- Veteran Team: The Defense.Net “Zero Day Team” includes the best and brightest DDoS mitigation experts and network operators in the world, including veterans of Prolexic, Verisign, BitGravity, Juniper, Box.net and Apple’s security team. Defense.Net Founder and CTO Barrett Lyon created the DDoS mitigation industry more than 10 years ago when he founded Prolexic Technologies. This led to his pursuit of hackers operating as part of the Russian mob, as chronicled in the best-selling book, Fatal System Error by Joseph Menn.
- Proprietary Technologies: Defense.Net’s DefenseD platform of new technologies was custom built to respond to today’s modern attacks. These technologies, developed by Barrett Lyon, include traffic inspection technologies such as Traffic SpectrumTM (a new technique for breaking multi-layer attacks into their components for more thorough mitigation), traffic routing technologies such as DefenseActioner™ and IP Reflection™ (a patent-pending asymmetric approach for delivering clean traffic back to the organization under attack), and traffic scrubbing technologies such as SYNAssure™ (a new technique for mitigating SYN Flood attacks that detects suspect SYN requests and conducts further analysis before blocking).
“The DDoS threat is constantly morphing and requires that businesses have the most current defenses in place,” said Defense.Net founder and CTO Barrett Lyon. “In addition to the best technologies, network and team, Defense.Net is providing enterprises with the highest levels of transparency and customer service. We understand the concerns of the companies we’re protecting and understand that “false positives” are more than an acceptable side effect of mitigation – they’re your customers.”
Founded by Barrett Lyon, who created the Distributed Denial of Service (DDoS) attack mitigation industry more than 10 years ago, Defense.Net has combined the top minds in the DDoS space with breakthrough new technologies designed to effectively address today’s and tomorrow’s DDoS mitigation challenges. It is the only company to defend businesses and organizations against this new generation of massive and sophisticated DDoS attacks while delivering the highest levels of Internet application performance – two areas where legacy DDoS mitigation services have not been able to match the modern strategies of today’s cyberattackers. With increasing threats from the escalating scale and complexity of DDoS attacks and a growing number of antagonists willing to use them, Defense.Net protects organizations from modern attacks by providing end-users with a seamless experience as if no attack were occurring. The company has raised more than $9.5M in debt and equity financing with investors that include visionary security and Internet investor Bessemer Venture Partners (BVP).
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 28, 2016 04:30 PM EDT Reads: 2,794
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Sep. 28, 2016 04:15 PM EDT Reads: 1,462
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Sep. 28, 2016 04:15 PM EDT Reads: 2,417
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 28, 2016 04:15 PM EDT Reads: 1,850
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Sep. 28, 2016 04:00 PM EDT Reads: 1,479
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Sep. 28, 2016 03:15 PM EDT Reads: 335
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 28, 2016 03:15 PM EDT Reads: 1,305
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Sep. 28, 2016 03:15 PM EDT Reads: 4,135
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 03:00 PM EDT Reads: 3,863
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 28, 2016 02:45 PM EDT Reads: 1,738
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 28, 2016 02:30 PM EDT Reads: 2,922
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Sep. 28, 2016 02:30 PM EDT Reads: 3,313
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
Sep. 28, 2016 02:00 PM EDT Reads: 4,774
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Sep. 28, 2016 02:00 PM EDT Reads: 4,419
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Sep. 28, 2016 01:57 PM EDT Reads: 241