Cloud

11/7/2017
11:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Distil Networks Announces New JavaScript Deployment Option

New method completes Distil Anywhere Architecture, giving enterprises ability to block bots via Secure CDN, in the data center, on AWS, on proprietary infrastructure, or through JavaScript integration

SAN FRANCISCO, CA – November 7, 2017 – Distil Networks, the global leader in bot detection and mitigation, today announced further enhancements to its Bot Defense Platform, with the immediate availability of a new JavaScript deployment option. By using the JavaScript deployment, Distil customers can now choose to integrate the product into their own code with no infrastructure changes required.

Whether through organic growth or through acquisition, large enterprises often have heterogeneous web application technology stacks. This enhancement is the final step in making Distil the only 100% deployment agnostic platform to meet these large organizations’ current and future needs.

“Malicious bot activity is on the rise and becoming more sophisticated. Although the goal for organizations is the same -- to protect themselves from bots responsible for online fraud, web scraping and brute force attacks -- everyone has a slightly different technology stack with different needs,” said Rami Essaid, co-founder and chief product and strategy officer of Distil Networks. “Distil’s JavaScript deployment of the Bot Defense Platform is a good option for customers that are unable to configure a reverse proxy or don’t want to deploy the solution in-line. With Distil, users can pick their own path and can now literally deploy Distil anywhere.”

Distil offers Bot Defense through the following deployment methods:

·  Secure CDN - Configure through a CDN to speed-up website properties and protect the business from DDoS attacks.

·  Appliance - Deploy in the datacenter as a Layer 7 reverse proxy.

·  Private AWS cloud - Implement in the cloud using Amazon Web Services.

·  JavaScript - Integrate into existing code with no infrastructure changes.

·  On your own infrastructure - Deploy on any cloud service, hosted or virtual environment.

“Deploying Distil Bot Defense using JavaScript was fast and simple,” said Frank Lin, CTO of DMD, a leading provider of digital marketing solutions for the pharmaceutical industry. “We were able to start blocking bots in a matter of hours with almost no effort from our engineering team.”

Distil offers the only accurate way to defend websites, mobile apps and APIs against malicious bots -- without impacting legitimate users. By building a fingerprint of each incoming connection, Distil provides customers with complete visibility and control over human, good bot and bad bot traffic, while also providing numerous options to mitigate malicious attacks.

To learn more about the Bot Defense JavaScript deployment method, visit: https://www.distilnetworks.com/distil-javascript/

Or attend our upcoming webinar:

451 Research - The Website Resiliency Imperative: http://info.distilnetworks.com/the-website-resiliency-imperative-webinar

·  Resiliency architectures for cloud-optimized and cloud native applications

About Distil Networks

Distil Networks, the global leader in bot detection and mitigation, protects your website, mobile app, and APIs from automated cybersecurity threats without affecting the flow of business-critical traffic. Distil defends against web scraping, account takeover, transaction fraud, denial of service, competitive data mining, unauthorized vulnerability scans, spam, click fraud, and web and mobile API abuse. Only Distil’s unique, holistic approach combines a superior technology platform, human expertise, and vigilant and dedicated support – delivering protection that’s as sophisticated and adaptable as the threat itself. Get complete visibility and control over human, good bot, and bad bot traffic, and rest easy knowing that the world’s best bot hunters have got your back.

For more information on Distil, visit https://www.distilnetworks.com/block-bot-detection/ or follow @DISTIL on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Now, we come here to play Paw-ke Man Go!"
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...
CVE-2019-6496
PUBLISHED: 2019-01-20
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of...
CVE-2019-3773
PUBLISHED: 2019-01-18
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVE-2019-3774
PUBLISHED: 2019-01-18
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.