Endpoint
1/14/2014
02:34 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Black Lotus Delivers DDoS Protection For Data Centers And Service Providers

Protection for Networks solution is providing data center companies and service providers worldwide with around-the-clock availability

SAN FRANCISCO – January 14, 2013 – Black Lotus, a leader in availability security and provider of distributed denial of service (DDoS) protection, today announced that its Protection for Networks (PFN) solution is providing data center companies and service providers worldwide with around-the-clock availability, which ensures customers avoid revenue losses from site DDoS outages. Customers are discovering that by implementing Black Lotus' DDoS mitigation, they can eliminate attack-related interruptions by 99% without having to invest in additional infrastructure to absorb attacks. Additionally, Black Lotus is offering a free PFN service for data centers and service providers that need up to one gigabits per second (Gbps) of DDoS protection or want to offer it as an entry-level service to end users.

For worldwide service providers that offer Web hosting, cloud hosting, collocation, Internet services, and virtualized and dedicated servers, any interruption to client services can result in customers migrating to competitors. Organizations such as Servers Australia, Steadfast, Zone Networks, Rack Nation and Continuum trust Black Lotus' PFN technology to meet constant availability requirements. The PFN offering allows whole-infrastructure DDoS protection for data center companies and service providers and can also be offered as a value-added service to hosting customers. The end result is a new revenue stream that can defend its own infrastructure and fund the effort through reseller sales to end users.

DDoS attacks lasting hours or even minutes can lead to loss of revenue and customers. Black Lotus' free PFN service enables data center companies and service providers to get started with border gateway protocol (BGP)-based DDoS protection, which includes an introductory level of protection and clean traffic. Service providers can try the entry-level DDoS protection and then quickly ramp up to full-scale mitigation in the future. The full PFN package lets any BGP network establish a session with the Black Lotus scrubbing center for immediate filtering during a DDoS attack. Once the session is active, only confirmed DDoS attacks are sent to the scrubbing center, where IPs under attack are inspected and filtered, and only clean traffic is routed back to the target's network.

"Dedicated and managed hosting companies are finally recognizing it's a matter of 'when,' rather than 'if' they will suffer an attack against their online presence. These companies are often the backbone of countless sites and businesses that need 24/7 uptime to serve their customers, which also makes them prime attack targets," said Shawn Marck, CEO of Black Lotus. "Our services deliver rapid deployment of DDoS mitigation, so service providers not only experience cost savings and operational improvements, but they can also focus on their primary mission of providing continuous Web service instead of diverting internal resources to fight fires and worry about customer uptime."

Service providers or data center companies that are interested in DDoS protection services can send an email to sales@blacklotus.net or call 866-477-5554 to learn more.

What Black Lotus data center and service provider customers are saying:

"We've grown our servers to host huge booking systems, airlines, government systems and many other sensitive services that require the highest level of reliability and uptime, including some of the world's largest game server providers, which are prone to attacks 24 hours a day, seven days a week. These organizations cannot afford network connectivity issues or downtime, so DDoS protection is a must for us," said Jared Hirst, managing director of Servers Australia, a provider of Web hosting, cloud hosting, collocation, virtualized and dedicated servers and other services. "Black Lotus can clean large amounts of DDoS attack traffic that can range in the hundreds of gigabits per second. Its network has the cleaning capacity we need, and we have successfully cleaned all sustained DDoS attacks to date."

"DDoS attack protection is an important component to any comprehensive network security platform," said Karl Zimmerman, president of Steadfast, a Chicago-based managed cloud and IT infrastructure company with three data centers and about 40 employees. "We have thousands of customers, all with their own needs and requirements, and having a complete security solution is critical to properly serving them. Black Lotus gives us the ability to protect against DDoS attacks while also providing control and flexibility. Because we can now keep customers up and running during DDoS attacks, we've been able to keep accounts that we might have otherwise lost."

"As an offshore data center for high-profile and high-risk clients, we are a constant target for DDoS attacks," said Felipe Cruz Ferrero, chief technical officer for Rack Nation, a data center that provides IT solutions. "We learned the necessity of DDoS protection the hard way, after we suffered repeated attacks targeted at specific clients. Rather than continuing to rely on a third party, we implemented Black Lotus' PFN so we could control DDoS protection for our data center and end users. Now we can confidently deliver 99.98 percent uptime to our customers, which would be near-impossible to achieve without Black Lotus' DDoS protection."

About Black Lotus Communications

Black Lotus Communications is a security innovator that pioneered the first commercially viable DDoS mitigation solutions. These advanced solutions enhance the security posture of small and medium businesses and enterprise clients while reducing capital expenditures, managing risk, ensuring compliance, and improving earnings and retention. Breakthrough developments at Black Lotus include the world's first DDoS-protected hosting network, the first IPv6 DDoS mitigation environment, and the first highly effective Layer 7 attack mitigation strategy. For more information, visit www.blacklotus.net or follow Black Lotus on Twitter at https://twitter.com/ddosprotection.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.