Endpoint
12/18/2013
04:18 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Nominum Launches Tool To Minimize Effect Of DNS-Based DDoS Attacks

Vantio CacheServe 5.4 introduces precision policies to rate limit DNS traffic based on specific criteria

Redwood City, USA, December 18, 2013 ̶ NominumTM, the provider of integrated subscriber, network, and security solutions for communication service providers (CSPs), today announced the launch of its Vantio CacheServe 5.4 software, which introduces ground-breaking rate limiting technology to allow CSPs to minimize the effect of DNS amplification attacks on network performance.

Nominum's Vantio CacheServe 5.4 introduces industry-leading precision policies which can be used to rate limit DNS traffic based on specific criteria, including by type of query, by client IP or response size.

The release of the latest version of Vantio CacheServe follows the worldwide launch of Nominum's network security solution Vantio ThreatAvert last month. ThreatAvert combines the power of the Vantio CacheServe and its precision policies with the Global Intelligence Xchange (GIX) platform, a real-time database of malware threats, to provide a foundational security layer to protect CSPs from threats emanating from within networks.

Vantio CacheServe DNS software has a proven track record of defending against multiple attacks including botnet related activities, malware exploits, DNS amplification, DoS / DDoS, and outbound spam. The latest version of the software includes upgrades allowing:

- Improved broadband subscriber experience during an attack by increasing bandwidth availability and decreasing the response time of DNS infrastructure

- Increased protection of server and bandwidth resources

- A reduction in the number of customers impacted by attacks, resulting in fewer complaints

Hari Krishnan, Director of Product Management, Nominum, says: "Sophisticated DNS amplification attacks are becoming an increasingly common problem for CSPs, who have a responsibility to their end-users to deploy the most advanced protection for network infrastructure to minimize impact to customer experience.

"Nominum is committed to developing ground-breaking security solutions to help CSPs protect themselves, and their customers, by leveraging the expertise derived from our rich heritage in developing the DNS architecture used by CSPs around the world."

Craig Sprosts, VP of Product Management, Nominum, says: "The new precision policies that have been applied to Vantio CacheServe and Vantio ThreatAvert provide the only way to stop the latest DNS amplification attacks using the DNS itself, without blocking legitimate traffic. Only a month ago we launched Vantio ThreatAvert, which combines precision policies with the unique capability of Nominum's GIX platform to detect attacks days, or even hours, before alternative solutions. The additional precision policies available in this release, plus the real-time threat updates delivered by GIX, provide unmatched protection against this critical threat to our customers worldwide."

About Nominum

Nominum provides innovative software that leverages DNS data to deliver a reliable, safe and personalized Internet experience for Communication Service Providers and their subscribers. The company's Vantio tm DNS Software and N2 applications arm CSP's to avert insider threats that could impact network availability and reputation. Nominum enables CSPs to engage with customers to deliver unique services and revenue opportunities and to build brand loyalty. Today, Nominum's carrier-grade software processes over 1.5 trillion queries daily and is deployed by the largest fixed and mobile operators worldwide. Nominum is a global organization headquartered in Redwood City, CA

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6212
Published: 2014-04-19
Unspecified vulnerability in HP Database and Middleware Automation 10.0, 10.01, 10.10, and 10.20 before 10.20.100 allows remote authenticated users to obtain sensitive information via unknown vectors.

CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2013-6215
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 10.01 and 10.10 allows remote authenticated users to execute arbitrary code via unknown vectors, aka ZDI-CAN-1977.

CVE-2013-6218
Published: 2014-04-19
Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x, 9.1x, and 9.2x allows remote attackers to execute arbitrary code via unknown vectors.

Best of the Web