Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

3/2/2015
08:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Radware Introduces New Attack Mitigation Platform for High Volume Cyber-Attacks

Latest Radware platform boasts up to 300Gbps mitigation capacity and handles 230 million packets per second of attack traffic to defend against evolving and growing cyber-attacks

Radware ® (NASDAQ: RDWR), A leading provider of cyber security and application delivery solutions ensuring optimal service level for applications in virtual, cloud and software defined data centers, today launched its latest attack mitigation platform that offers carriers and cloud providers the industry’s broadest attack detection and the highest mitigation performance for the most demanding operational environments.

Radware’s new attack mitigation platform offers up to 300Gbps of mitigation capacity while allowing customers to enjoy the widest range of simultaneous cyber-attack protection in the industry. The powerful new design can address today’s most tenacious volumetric DDoS attacks such as UDP reflection attacks, fragmented and out-of-state floods while at the same time, pick out and mitigate sophisticated non-volume threats which often lurk below the surface in today’s multi-vectored attacks.

As the industry’s first dedicated attack mitigation platform to offer 100Gb interfaces with the ability to handle 230 million packets per second of attack traffic, Radware’s DefensePro® x4420 platform was designed for multi-tenant environments with the ability to support up-to 1,000 active policies, separate processing capabilities and customized management & reporting per tenant.

“Cyber-attacks have evolved and reached a tipping point in terms of quantity, length, complexity and targets,” says Carl Herberger, vice president of security solutions for Radware. “In 2014, one in seven cyber-attacks were larger than 10Gbps and we’ve seen attacks 100+Gbps in size. The attack landscape is changing and cyber-attackers are getting more and more aggressive with their tactics. It’s not uncommon for mobile carriers and cloud providers to experience extra-large attacks.”

Commercial accounts such as cloud providers and the mobile carrier market have been a target for these large-scale attacks. A recent Heavy Reading survey of mobile operators has shown that approximately 45% of respondents reported their web and DNS servers facing the internet are attacked on a daily or weekly basis. As some carriers are slowly rolling out new mobile features such as voice over LTE (VoLTE) these massive attacks can be potentially target VoLTE as well, creating even more disruptions to mobile customers.”

“With close to 7 billion mobile subscribers worldwide, the need for carriers to provide a secure LTE infrastructure is paramount,” says Michael O’Malley, vice president of carrier strategy and business development.

“It is expected that worldwide VoLTE subscribers will reach 138 million by 2017 so the need for a high-end DDoS platform that can mitigate high volumetric and application attacks across all mobile domains – network infrastructure, mission-critical applications, IMS and EPC is clearly evident.”

Radware’s attack mitigation platform can also provide service and cloud hosting providers better value for their investment as it eliminates the need to deploy multiple devices and provides a high performance platform that can protect networks from sophisticated and volumetric attacks.

“Soon enough, DDoS attacks will eventually reach the 1Tbs level, placing manufacturers in a frenzy to keep up with future volumetric cyberattacks,” says Dan Thormodsgaard, vice president of solutions architecture for FishNet Security. “Radware is a leading vendor in the anti-DDoS space and we are happy to see them addressing these larger volumetric DDoS attacks with the introduction of this new platform.”

For additional information on Radware’s latest commercial-grade DDoS mitigation platform, please visithttp://www.radware.com/Products/DefensePro-Features/ or visit Radware during Mobile World Congress in Barcelona, Spain, March 2-5, 2015 located in Hall 2 Stand 2D50.

About Radware

Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.com

Radware encourages you to join our community and follow us on: FacebookGoogle+LinkedInRadware BlogSlideShareTwitter,YouTubeRadware Connect app for iPhone® and our security center DDoSWarriors.com that provides a comprehensive analysis on DDoS attack tools, trends and threats.

©2015 Radware, Ltd. All rights reserved. Radware and all other Radware product and service names are registered trademarks or trademarks of Radware in the U.S. and other countries. All other trademarks and names are property of their respective owners.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.