Cloud

11/7/2017
11:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Distil Networks Announces New JavaScript Deployment Option

New method completes Distil Anywhere Architecture, giving enterprises ability to block bots via Secure CDN, in the data center, on AWS, on proprietary infrastructure, or through JavaScript integration

SAN FRANCISCO, CA – November 7, 2017 – Distil Networks, the global leader in bot detection and mitigation, today announced further enhancements to its Bot Defense Platform, with the immediate availability of a new JavaScript deployment option. By using the JavaScript deployment, Distil customers can now choose to integrate the product into their own code with no infrastructure changes required.

Whether through organic growth or through acquisition, large enterprises often have heterogeneous web application technology stacks. This enhancement is the final step in making Distil the only 100% deployment agnostic platform to meet these large organizations’ current and future needs.

“Malicious bot activity is on the rise and becoming more sophisticated. Although the goal for organizations is the same -- to protect themselves from bots responsible for online fraud, web scraping and brute force attacks -- everyone has a slightly different technology stack with different needs,” said Rami Essaid, co-founder and chief product and strategy officer of Distil Networks. “Distil’s JavaScript deployment of the Bot Defense Platform is a good option for customers that are unable to configure a reverse proxy or don’t want to deploy the solution in-line. With Distil, users can pick their own path and can now literally deploy Distil anywhere.”

Distil offers Bot Defense through the following deployment methods:

·  Secure CDN - Configure through a CDN to speed-up website properties and protect the business from DDoS attacks.

·  Appliance - Deploy in the datacenter as a Layer 7 reverse proxy.

·  Private AWS cloud - Implement in the cloud using Amazon Web Services.

·  JavaScript - Integrate into existing code with no infrastructure changes.

·  On your own infrastructure - Deploy on any cloud service, hosted or virtual environment.

“Deploying Distil Bot Defense using JavaScript was fast and simple,” said Frank Lin, CTO of DMD, a leading provider of digital marketing solutions for the pharmaceutical industry. “We were able to start blocking bots in a matter of hours with almost no effort from our engineering team.”

Distil offers the only accurate way to defend websites, mobile apps and APIs against malicious bots -- without impacting legitimate users. By building a fingerprint of each incoming connection, Distil provides customers with complete visibility and control over human, good bot and bad bot traffic, while also providing numerous options to mitigate malicious attacks.

To learn more about the Bot Defense JavaScript deployment method, visit: https://www.distilnetworks.com/distil-javascript/

Or attend our upcoming webinar:

451 Research - The Website Resiliency Imperative: http://info.distilnetworks.com/the-website-resiliency-imperative-webinar

·  Resiliency architectures for cloud-optimized and cloud native applications

About Distil Networks

Distil Networks, the global leader in bot detection and mitigation, protects your website, mobile app, and APIs from automated cybersecurity threats without affecting the flow of business-critical traffic. Distil defends against web scraping, account takeover, transaction fraud, denial of service, competitive data mining, unauthorized vulnerability scans, spam, click fraud, and web and mobile API abuse. Only Distil’s unique, holistic approach combines a superior technology platform, human expertise, and vigilant and dedicated support – delivering protection that’s as sophisticated and adaptable as the threat itself. Get complete visibility and control over human, good bot, and bad bot traffic, and rest easy knowing that the world’s best bot hunters have got your back.

For more information on Distil, visit https://www.distilnetworks.com/block-bot-detection/ or follow @DISTIL on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.