Cloud

11/7/2017
11:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Distil Networks Announces New JavaScript Deployment Option

New method completes Distil Anywhere Architecture, giving enterprises ability to block bots via Secure CDN, in the data center, on AWS, on proprietary infrastructure, or through JavaScript integration

SAN FRANCISCO, CA – November 7, 2017 – Distil Networks, the global leader in bot detection and mitigation, today announced further enhancements to its Bot Defense Platform, with the immediate availability of a new JavaScript deployment option. By using the JavaScript deployment, Distil customers can now choose to integrate the product into their own code with no infrastructure changes required.

Whether through organic growth or through acquisition, large enterprises often have heterogeneous web application technology stacks. This enhancement is the final step in making Distil the only 100% deployment agnostic platform to meet these large organizations’ current and future needs.

“Malicious bot activity is on the rise and becoming more sophisticated. Although the goal for organizations is the same -- to protect themselves from bots responsible for online fraud, web scraping and brute force attacks -- everyone has a slightly different technology stack with different needs,” said Rami Essaid, co-founder and chief product and strategy officer of Distil Networks. “Distil’s JavaScript deployment of the Bot Defense Platform is a good option for customers that are unable to configure a reverse proxy or don’t want to deploy the solution in-line. With Distil, users can pick their own path and can now literally deploy Distil anywhere.”

Distil offers Bot Defense through the following deployment methods:

·  Secure CDN - Configure through a CDN to speed-up website properties and protect the business from DDoS attacks.

·  Appliance - Deploy in the datacenter as a Layer 7 reverse proxy.

·  Private AWS cloud - Implement in the cloud using Amazon Web Services.

·  JavaScript - Integrate into existing code with no infrastructure changes.

·  On your own infrastructure - Deploy on any cloud service, hosted or virtual environment.

“Deploying Distil Bot Defense using JavaScript was fast and simple,” said Frank Lin, CTO of DMD, a leading provider of digital marketing solutions for the pharmaceutical industry. “We were able to start blocking bots in a matter of hours with almost no effort from our engineering team.”

Distil offers the only accurate way to defend websites, mobile apps and APIs against malicious bots -- without impacting legitimate users. By building a fingerprint of each incoming connection, Distil provides customers with complete visibility and control over human, good bot and bad bot traffic, while also providing numerous options to mitigate malicious attacks.

To learn more about the Bot Defense JavaScript deployment method, visit: https://www.distilnetworks.com/distil-javascript/

Or attend our upcoming webinar:

451 Research - The Website Resiliency Imperative: http://info.distilnetworks.com/the-website-resiliency-imperative-webinar

·  Resiliency architectures for cloud-optimized and cloud native applications

About Distil Networks

Distil Networks, the global leader in bot detection and mitigation, protects your website, mobile app, and APIs from automated cybersecurity threats without affecting the flow of business-critical traffic. Distil defends against web scraping, account takeover, transaction fraud, denial of service, competitive data mining, unauthorized vulnerability scans, spam, click fraud, and web and mobile API abuse. Only Distil’s unique, holistic approach combines a superior technology platform, human expertise, and vigilant and dedicated support – delivering protection that’s as sophisticated and adaptable as the threat itself. Get complete visibility and control over human, good bot, and bad bot traffic, and rest easy knowing that the world’s best bot hunters have got your back.

For more information on Distil, visit https://www.distilnetworks.com/block-bot-detection/ or follow @DISTIL on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8030
PUBLISHED: 2018-06-20
A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashes due to the defect. AMQP protocols 0-10 and 1.0 a...
CVE-2018-1117
PUBLISHED: 2018-06-20
ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log. In an environment where logs are shared with other parties, this cou...
CVE-2018-11701
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x005cb509, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11702
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00578cb3, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11703
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00402d6a, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.