Vulnerabilities / Threats
1/28/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ScrapeDefender Launches Cloud-Based Anti-Scraping Solution To Protect Web Sites From Content Theft

Monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity

ROSLYN HEIGHTS, N.Y., Jan. 28, 2014 /PRNewswire/ -- ScrapeDefender launched today a new cloud-based anti-scraping monitoring solution that identifies and blocks suspicious activity to protect websites against content theft from mass scraping. The product provides triple protection levels against web scraping in the areas of vulnerability scanning, monitoring and security.

(Photo: http://photos.prnewswire.com/prnh/20140128/PH53558-a)

(Photo: http://photos.prnewswire.com/prnh/20140128/PH53558-b)

ScrapeDefender estimates that losses from web scraping content theft are close to $5 billion annually. According to a recent industry study, malicious non-human-based bot traffic now represents 30% of all website visits. Scrapers routinely target online marketplaces including financial, travel, media, real estate, and consumer-product arenas, stealing valuable information such as pricing and listing data.

ScrapeDefender stops website scraping by identifying and alerting site owners about suspicious activity in near real time. The monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity for both human and bot-like activity. It was designed from the ground up to work passively with web servers so that the underlying business is not impeded in any way. ScrapeDefender does not require any DNS changes or new hardware.

"Web scraping is growing at an alarming rate and if left unchecked, it is just a matter of time until all sites with useful content will be targeted by competitors harvesting data," said Robert Kane, CEO of ScrapeDefender. "We provide the only solution that scans, monitors and protects websites against suspicious scraping activity, in a way that isn't intrusive."

Irv Chasen, a board member at Bondview, the largest free provider of municipal bond data, said, "Our business is built on providing accurate municipal bond pricing data and related information to professional and retail investors. If competitors are scraping our information and then using it to gain an advantage, it creates a challenging business problem for us. With ScrapeDefender we can easily monitor and stop any suspicious scraping. Their support team made it easy for us to stay proactive and protect our website content."

ScrapeDefender is available as a 24 X 7 managed service or can be customer controlled. Customers are assigned a ScrapeDefender support staff member to help monitor network activity and alerts are automatically sent when suspicious activity is identified. Today's announcement extends ScrapeDefender's scanner, which was introduced in 2011 and remains the only anti-scraping assessment tool on the market that singles out web scraping vulnerabilities.

The ScrapeDefender Suite is available now at www.scrapedefender.com, starting at $79 per month for one domain.

About ScrapeDefender

ScrapeDefender was created by a team of computer security and web content experts with 20 years of experience working at leading organizations such as RSA Security, Goldman Sachs and Getty Images. Our web anti-scraping experts can secure your website to ensure that unauthorized content usage is identified and blocked.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.