A10 Networks Provides Ability for Service Providers to Deliver Cloud Scrubbing Services With Automation and Scale

Grazed from A10 Networks

A10 Networks today announced availability of an advanced solution for Service Providers to deliver more profitable DDoS scrubbing services to their enterprise customers with the A10 Thunder Threat Protection System (Thunder TPS). The new solution reduces TCO via advanced intelligent automation capabilities, continuous machine learning, and greater scale than competing solutions. 

The solution empowers a wide range of service providers to better serve and protect their enterprise customers at scale and increase revenue by delivering highly profitable scrubbing services with differentiated faster mitigation times, lower operating costs, and service delivery options tailored to different business needs. The result is a solution ideal for mobile, internet, cloud, hosting and managed service providers.

A10 provides the advanced intelligent automation capabilities, powered by machine learning, to enable proactive and precise DDoS defenses throughout the entire protection lifecycle. Operators define the networks to be protected and A10 powered defenses do the rest. A10's solution provides granularity at scale to accurately profile and monitor over 100,000 servers and services, distributed over thousands of networks, while enabling up to 3,000 simultaneous attack mitigations.

US Signal and Cloudflare Collaborate for DDoS Protection

Written by David Marshall

Today, it was announced that US Signal and Cloudflare have launched a fully managed and customizable distributed denial-of-service (DDoS) protection service to market. 

The new service delivers powerful DDoS mitigation for network, transport and application layers and is backed by a 100 percent SLA. Powered by Cloudflare's global Anycast network, the service is implemented by US Signal's information security and provisioning team, with support and customization from its technical operations engineers. 

"US Signal's new DDoS protection service is ideal for companies looking to update their existing DDoS mitigation strategies or for businesses lacking the manpower or skills to manage these risks internally. It is aimed at all market sectors but is particularly beneficial to high-risk areas such as tech, government, finance and healthcare," said US Signal President Stephen Oyer. "But regardless of the economic sector in which your company operates, Cloudflare's 15Tbps plus network throughput should offer peace of mind, as it can handle 15 times more traffic than the largest DDoS attack has produced to date." 

A10 Networks Launches Full Spectrum Cloud Scrubbing and On-premise Enterprise DDoS Protection Solution

Grazed from A10 Networks

A10 Networks, a Secure Application Services company, today announced the A10 DDoS Protection Cloud, powered by Verisign, and the A10 Thunder 1040 TPS appliance offering advanced on-premise protection. With the availability of the latest A10 DDoS protection solutions, A10 delivers full spectrum enterprise protection to detect and mitigate distributed denial of service (DDoS) attacks.

A10 Networks' hybrid approach to DDoS defenses combines surgical precision on-premise protection with orchestrated cloud scrubbing, delivered in form factors and subscription models that are cost effective. Smart, scalable solutions from A10 to assist with protection against harmful DDoS attacks, helping to ensure availability of enterprise business services while protecting legitimate users on the network.

Unlike other cloud-based DDoS protection services, A10 DDoS Protection Cloud, which is powered by Verisign's cloud-based DDoS Protection Service, is based on legitimate traffic, so enterprises do not pay for the amount of traffic that attacks apply against their network. Traffic diversions, or "swings," to the cloud service are optimized by the on-premise Thunder TPS appliances. The Thunder TPS appliance employs machine learning, traffic profiling and intelligent policy escalation in order to reduce disruption on-premise and alert A10 when redirection to the cloud may be necessary.

Cloud Computing: Complacency about DDoS attacks puts businesses at risk, survey shows

Grazed from ComputerWeekly.  Author:  Warwick Ashford.

Complacency about distributed denial of service (DDoS) attacks is putting businesses at risk, a survey has revealed.  Investment in specific DDoS protection is relatively low, according to a survey by F5 Networks at Infosecurity Europe 2015 in London.

Attention is turning to application data breaches, network attacks and malware, despite 60% of respondents saying they are worried about DDoS attacks and 39% admitting it is likely their organisation has already been targeted.  Similarly to advanced persistent threats (APTs), many DDoS attacks are starting to be characterised by long durations, repetition and changing attack vectors, according to a recent report by Imperva...

Cloud Denial of Service Protection

Grazed from CloudPatterns.org. Author: Editorial Staff.

Cloud denial of service (DoS) attacks are multifaceted and prevent consumers of cloud services from accessing their cloud resources. A cloud DoS protection service is incorporated into the security architecture to shield the cloud provider from DoS attacks. A network DoS protection service updates the domain name service (DNS) to route all cloud provider traffic through the protection service, which filters attack traffic and routes only legitimate traffic to the cloud provider. Alternately, the cloud provider can route traffic to a DoS protection service when experiencing an attack, or create their own DoS protection service.

There are three categories of DoS attacks: volume-based attacks, protocol attacks, and application layer attacks. A volume-based attack is when a DoS forces a cloud victim to use overwhelming amounts of network bandwidth. This causes unsupportable network usage, leaving the cloud services without network resources and causing non-responsiveness...

How free cloud services become free, currency-mining, DDoS-attacking botnets

Grazed from Gigaom. Author: Derrick Harris.

It’s no secret that the cloud has the potential to be a hacker’s paradise, chock-full of all the password-cracking computing power a trove of stolen credit cards can buy. Surely, though, this type of bad behavior can’t be carried out without any direct financial investment. After all, the free tiers on most cloud computing services are pretty minimal — a single core (probably fairly weak) and maybe a few gigabytes of storage. What can anyone do with that? A whole lot, if they’re clever.

At the Black Hat security conference this week, a pair of professional penetration testers, Rob Ragan and Oscar Salazar of Bishop Fox, showed how they built a functional 1,000-node botnet by stringing together resources from a variety of services. They used it to mine some Litecoin and could have done a whole lot more if they weren’t trying to minimize harm to other cloud users (by being noisy neighbors) or cloud providers (by driving up power bills)...

Five DDos Security Issues in Cloud Computing

Grazed from Decoded.  Author: Julie Sinclair.

The need for reliable operations and secure access increase as companies migrate to cloud technologies. Defending your applications from distributed-denial-of-service (DDoS) attacks is a top area of concern for your business. Before moving your company’s important data to a cloud service provider, implement a plan to deal with DDoS threats. When designing your DDoS plan for your business, understand how your cloud service provider protects your data.

Five Top Security Issues

1. Securing a new perimeter:

Moving your data to cloud technologies means your data is distributed to multiple data centers. How can you effectively create a new security perimeter for your company and protect your data from attacks? Understand what tools your cloud provider uses to protect your data against DDoS attacks. Check the comprehensive detection tools your cloud provider uses for detection of DDoS attacks. Understand the inline deployment used for examining all inbound and outbound traffic for DDoS attacks...

NSA Website Attacked, Knocked Offline

Grazed from NewsFactor.  Author: David Holmes.

The U.S. National Security Agency's website, nsa.gov, was knocked offline Friday afternoon, and as of Friday evening, it was still unavailable. Only a browser message indicating that the serverwas not responding appeared.

Sources quoted by various news agencies have speculated that the site has apparently fallen victim to a DDoS (distributed denial-of-service) attack, and that it was believed that the hacker group Anonymous would claim responsibility. However, as of the time of publication of this report, the group has not claimed responsibility...

Google offers DDoS defenses to human rights, elections websites

Grazed from ITWorld. Author: Jeremy Kirk.

Google is lending its vast infrastructure to websites that may be targeted by distributed denial-of-service (DDoS) attacks because of their content. The program, called "Project Shield," is invite-only and accepting applications from websites dealing with news, human rights or election-related content.

Those accepted will benefit from Google's DDoS defenses, which help repel barrages of traffic designed to cause websites to stop responding. DDoS attacks are an effective, low-cost way to disrupt companies and organizations. The attacks are difficult to counter even for well-resourced organizations that can afford separate security services specializing in DDoS mitigation...

Layer 7 DDoS Attacks on Sharp Rise—BYOD Makes Matters Worse

Grazed from PRWeb.  Author: PR Announcement.

With Internet connectivity and mobile devices becoming ubiquitous and cloud computing and big data continuing to advance in leaps and bounds, "online activity" has come to mean so much more than just sitting at a desk clicking through hyperlinks. In this new age of personal computing, enterprises must understand the risks and threats they face.

Nexusguard Information Security Manager Ronald Pong's talk in an Information Security Showcase 2013 seminar—The Impact of DDoS in Corporate Cloud with "Bring Your Own Device" Environment— highlights the implications of "Bring Your Own Device" (BYOD) in corporate environments...