Vulnerabilities / Threats
1/28/2014
11:40 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

ScrapeDefender Launches Cloud-Based Anti-Scraping Solution To Protect Web Sites From Content Theft

Monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity

ROSLYN HEIGHTS, N.Y., Jan. 28, 2014 /PRNewswire/ -- ScrapeDefender launched today a new cloud-based anti-scraping monitoring solution that identifies and blocks suspicious activity to protect websites against content theft from mass scraping. The product provides triple protection levels against web scraping in the areas of vulnerability scanning, monitoring and security.

(Photo: http://photos.prnewswire.com/prnh/20140128/PH53558-a)

(Photo: http://photos.prnewswire.com/prnh/20140128/PH53558-b)

ScrapeDefender estimates that losses from web scraping content theft are close to $5 billion annually. According to a recent industry study, malicious non-human-based bot traffic now represents 30% of all website visits. Scrapers routinely target online marketplaces including financial, travel, media, real estate, and consumer-product arenas, stealing valuable information such as pricing and listing data.

ScrapeDefender stops website scraping by identifying and alerting site owners about suspicious activity in near real time. The monitoring system uses intrusion detection-based algorithms and patented technology to analyze network activity for both human and bot-like activity. It was designed from the ground up to work passively with web servers so that the underlying business is not impeded in any way. ScrapeDefender does not require any DNS changes or new hardware.

"Web scraping is growing at an alarming rate and if left unchecked, it is just a matter of time until all sites with useful content will be targeted by competitors harvesting data," said Robert Kane, CEO of ScrapeDefender. "We provide the only solution that scans, monitors and protects websites against suspicious scraping activity, in a way that isn't intrusive."

Irv Chasen, a board member at Bondview, the largest free provider of municipal bond data, said, "Our business is built on providing accurate municipal bond pricing data and related information to professional and retail investors. If competitors are scraping our information and then using it to gain an advantage, it creates a challenging business problem for us. With ScrapeDefender we can easily monitor and stop any suspicious scraping. Their support team made it easy for us to stay proactive and protect our website content."

ScrapeDefender is available as a 24 X 7 managed service or can be customer controlled. Customers are assigned a ScrapeDefender support staff member to help monitor network activity and alerts are automatically sent when suspicious activity is identified. Today's announcement extends ScrapeDefender's scanner, which was introduced in 2011 and remains the only anti-scraping assessment tool on the market that singles out web scraping vulnerabilities.

The ScrapeDefender Suite is available now at www.scrapedefender.com, starting at $79 per month for one domain.

About ScrapeDefender

ScrapeDefender was created by a team of computer security and web content experts with 20 years of experience working at leading organizations such as RSA Security, Goldman Sachs and Getty Images. Our web anti-scraping experts can secure your website to ensure that unauthorized content usage is identified and blocked.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web