Vulnerabilities / Threats
1/28/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

ScrapeDefender Launches Cloud-Based Anti-Scraping Solution To Protect Web Sites From Content Theft

Monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity

ROSLYN HEIGHTS, N.Y., Jan. 28, 2014 /PRNewswire/ -- ScrapeDefender launched today a new cloud-based anti-scraping monitoring solution that identifies and blocks suspicious activity to protect websites against content theft from mass scraping. The product provides triple protection levels against web scraping in the areas of vulnerability scanning, monitoring and security.

(Photo: http://photos.prnewswire.com/prnh/20140128/PH53558-a)

(Photo: http://photos.prnewswire.com/prnh/20140128/PH53558-b)

ScrapeDefender estimates that losses from web scraping content theft are close to $5 billion annually. According to a recent industry study, malicious non-human-based bot traffic now represents 30% of all website visits. Scrapers routinely target online marketplaces including financial, travel, media, real estate, and consumer-product arenas, stealing valuable information such as pricing and listing data.

ScrapeDefender stops website scraping by identifying and alerting site owners about suspicious activity in near real time. The monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity for both human and bot-like activity. It was designed from the ground up to work passively with web servers so that the underlying business is not impeded in any way. ScrapeDefender does not require any DNS changes or new hardware.

"Web scraping is growing at an alarming rate and if left unchecked, it is just a matter of time until all sites with useful content will be targeted by competitors harvesting data," said Robert Kane, CEO of ScrapeDefender. "We provide the only solution that scans, monitors and protects websites against suspicious scraping activity, in a way that isn't intrusive."

Irv Chasen, a board member at Bondview, the largest free provider of municipal bond data, said, "Our business is built on providing accurate municipal bond pricing data and related information to professional and retail investors. If competitors are scraping our information and then using it to gain an advantage, it creates a challenging business problem for us. With ScrapeDefender we can easily monitor and stop any suspicious scraping. Their support team made it easy for us to stay proactive and protect our website content."

ScrapeDefender is available as a 24 X 7 managed service or can be customer controlled. Customers are assigned a ScrapeDefender support staff member to help monitor network activity and alerts are automatically sent when suspicious activity is identified. Today's announcement extends ScrapeDefender's scanner, which was introduced in 2011 and remains the only anti-scraping assessment tool on the market that singles out web scraping vulnerabilities.

The ScrapeDefender Suite is available now at www.scrapedefender.com, starting at $79 per month for one domain.

About ScrapeDefender

ScrapeDefender was created by a team of computer security and web content experts with 20 years of experience working at leading organizations such as RSA Security, Goldman Sachs and Getty Images. Our web anti-scraping experts can secure your website to ensure that unauthorized content usage is identified and blocked.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5619
Published: 2014-09-29
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.

CVE-2012-5621
Published: 2014-09-29
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.

CVE-2012-6107
Published: 2014-09-29
Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-6110
Published: 2014-09-29
bcron-exec in bcron before 0.10 does not close file descriptors associated with temporary files when running a cron job, which allows local users to modify job files and send spam messages by accessing an open file descriptor.

CVE-2013-1874
Published: 2014-09-29
Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.