Cloud

11/7/2017
11:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Distil Networks Announces New JavaScript Deployment Option

New method completes Distil Anywhere Architecture, giving enterprises ability to block bots via Secure CDN, in the data center, on AWS, on proprietary infrastructure, or through JavaScript integration

SAN FRANCISCO, CA – November 7, 2017 – Distil Networks, the global leader in bot detection and mitigation, today announced further enhancements to its Bot Defense Platform, with the immediate availability of a new JavaScript deployment option. By using the JavaScript deployment, Distil customers can now choose to integrate the product into their own code with no infrastructure changes required.

Whether through organic growth or through acquisition, large enterprises often have heterogeneous web application technology stacks. This enhancement is the final step in making Distil the only 100% deployment agnostic platform to meet these large organizations’ current and future needs.

“Malicious bot activity is on the rise and becoming more sophisticated. Although the goal for organizations is the same -- to protect themselves from bots responsible for online fraud, web scraping and brute force attacks -- everyone has a slightly different technology stack with different needs,” said Rami Essaid, co-founder and chief product and strategy officer of Distil Networks. “Distil’s JavaScript deployment of the Bot Defense Platform is a good option for customers that are unable to configure a reverse proxy or don’t want to deploy the solution in-line. With Distil, users can pick their own path and can now literally deploy Distil anywhere.”

Distil offers Bot Defense through the following deployment methods:

·  Secure CDN - Configure through a CDN to speed-up website properties and protect the business from DDoS attacks.

·  Appliance - Deploy in the datacenter as a Layer 7 reverse proxy.

·  Private AWS cloud - Implement in the cloud using Amazon Web Services.

·  JavaScript - Integrate into existing code with no infrastructure changes.

·  On your own infrastructure - Deploy on any cloud service, hosted or virtual environment.

“Deploying Distil Bot Defense using JavaScript was fast and simple,” said Frank Lin, CTO of DMD, a leading provider of digital marketing solutions for the pharmaceutical industry. “We were able to start blocking bots in a matter of hours with almost no effort from our engineering team.”

Distil offers the only accurate way to defend websites, mobile apps and APIs against malicious bots -- without impacting legitimate users. By building a fingerprint of each incoming connection, Distil provides customers with complete visibility and control over human, good bot and bad bot traffic, while also providing numerous options to mitigate malicious attacks.

To learn more about the Bot Defense JavaScript deployment method, visit: https://www.distilnetworks.com/distil-javascript/

Or attend our upcoming webinar:

451 Research - The Website Resiliency Imperative: http://info.distilnetworks.com/the-website-resiliency-imperative-webinar

·  Resiliency architectures for cloud-optimized and cloud native applications

About Distil Networks

Distil Networks, the global leader in bot detection and mitigation, protects your website, mobile app, and APIs from automated cybersecurity threats without affecting the flow of business-critical traffic. Distil defends against web scraping, account takeover, transaction fraud, denial of service, competitive data mining, unauthorized vulnerability scans, spam, click fraud, and web and mobile API abuse. Only Distil’s unique, holistic approach combines a superior technology platform, human expertise, and vigilant and dedicated support – delivering protection that’s as sophisticated and adaptable as the threat itself. Get complete visibility and control over human, good bot, and bad bot traffic, and rest easy knowing that the world’s best bot hunters have got your back.

For more information on Distil, visit https://www.distilnetworks.com/block-bot-detection/ or follow @DISTIL on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now about that mortgage refinance offer from Wells Fargo .....
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7097
PUBLISHED: 2018-08-14
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow cross-site request forgery.
CVE-2018-7098
PUBLISHED: 2018-08-14
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow directory traversal.
CVE-2018-7099
PUBLISHED: 2018-08-14
A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow disclosure of privileged information.
CVE-2018-7100
PUBLISHED: 2018-08-14
A potential security vulnerability has been identified in HPE OfficeConnect 1810 Switch Series (HP 1810-24G - P.2.22 and previous versions, HP 1810-48G PK.1.34 and previous versions, HP 1810-8 v2 P.2.22 and previous versions). The vulnerability could allow local disclosure of sensitive information.
CVE-2018-7077
PUBLISHED: 2018-08-14
A security vulnerability in HPE XP P9000 Command View Advanced Edition (CVAE) Device Manager (DevMgr 8.5.0-00 and prior to 8.6.0-00), Configuration Manager (CM 8.5.0-00 and prior to 8.6.0-00) could be exploited to allow local and remote unauthorized access to sensitive information.