Cloud

11/7/2017
11:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Distil Networks Announces New JavaScript Deployment Option

New method completes Distil Anywhere Architecture, giving enterprises ability to block bots via Secure CDN, in the data center, on AWS, on proprietary infrastructure, or through JavaScript integration

SAN FRANCISCO, CA – November 7, 2017 – Distil Networks, the global leader in bot detection and mitigation, today announced further enhancements to its Bot Defense Platform, with the immediate availability of a new JavaScript deployment option. By using the JavaScript deployment, Distil customers can now choose to integrate the product into their own code with no infrastructure changes required.

Whether through organic growth or through acquisition, large enterprises often have heterogeneous web application technology stacks. This enhancement is the final step in making Distil the only 100% deployment agnostic platform to meet these large organizations’ current and future needs.

“Malicious bot activity is on the rise and becoming more sophisticated. Although the goal for organizations is the same -- to protect themselves from bots responsible for online fraud, web scraping and brute force attacks -- everyone has a slightly different technology stack with different needs,” said Rami Essaid, co-founder and chief product and strategy officer of Distil Networks. “Distil’s JavaScript deployment of the Bot Defense Platform is a good option for customers that are unable to configure a reverse proxy or don’t want to deploy the solution in-line. With Distil, users can pick their own path and can now literally deploy Distil anywhere.”

Distil offers Bot Defense through the following deployment methods:

·  Secure CDN - Configure through a CDN to speed-up website properties and protect the business from DDoS attacks.

·  Appliance - Deploy in the datacenter as a Layer 7 reverse proxy.

·  Private AWS cloud - Implement in the cloud using Amazon Web Services.

·  JavaScript - Integrate into existing code with no infrastructure changes.

·  On your own infrastructure - Deploy on any cloud service, hosted or virtual environment.

“Deploying Distil Bot Defense using JavaScript was fast and simple,” said Frank Lin, CTO of DMD, a leading provider of digital marketing solutions for the pharmaceutical industry. “We were able to start blocking bots in a matter of hours with almost no effort from our engineering team.”

Distil offers the only accurate way to defend websites, mobile apps and APIs against malicious bots -- without impacting legitimate users. By building a fingerprint of each incoming connection, Distil provides customers with complete visibility and control over human, good bot and bad bot traffic, while also providing numerous options to mitigate malicious attacks.

To learn more about the Bot Defense JavaScript deployment method, visit: https://www.distilnetworks.com/distil-javascript/

Or attend our upcoming webinar:

451 Research - The Website Resiliency Imperative: http://info.distilnetworks.com/the-website-resiliency-imperative-webinar

·  Resiliency architectures for cloud-optimized and cloud native applications

About Distil Networks

Distil Networks, the global leader in bot detection and mitigation, protects your website, mobile app, and APIs from automated cybersecurity threats without affecting the flow of business-critical traffic. Distil defends against web scraping, account takeover, transaction fraud, denial of service, competitive data mining, unauthorized vulnerability scans, spam, click fraud, and web and mobile API abuse. Only Distil’s unique, holistic approach combines a superior technology platform, human expertise, and vigilant and dedicated support – delivering protection that’s as sophisticated and adaptable as the threat itself. Get complete visibility and control over human, good bot, and bad bot traffic, and rest easy knowing that the world’s best bot hunters have got your back.

For more information on Distil, visit https://www.distilnetworks.com/block-bot-detection/ or follow @DISTIL on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: camera, camera everywhere, not a single news to rely on
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14623
PUBLISHED: 2018-12-14
A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulne...
CVE-2018-18093
PUBLISHED: 2018-12-14
Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access.
CVE-2018-18096
PUBLISHED: 2018-12-14
Improper memory handling in Intel QuickAssist Technology for Linux (all versions) may allow an authenticated user to potentially enable a denial of service via local access.
CVE-2018-18097
PUBLISHED: 2018-12-14
Improper directory permissions in Intel Solid State Drive Toolbox before 3.5.7 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2018-3704
PUBLISHED: 2018-12-14
Improper directory permissions in the installer for the Intel Parallel Studio before 2019 Gold may allow authenticated users to potentially enable an escalation of privilege via local access.