Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:34 PM
Dark Reading
Dark Reading
Products and Releases

Black Lotus Delivers DDoS Protection For Data Centers And Service Providers

Protection for Networks solution is providing data center companies and service providers worldwide with around-the-clock availability

SAN FRANCISCO – January 14, 2013 – Black Lotus, a leader in availability security and provider of distributed denial of service (DDoS) protection, today announced that its Protection for Networks (PFN) solution is providing data center companies and service providers worldwide with around-the-clock availability, which ensures customers avoid revenue losses from site DDoS outages. Customers are discovering that by implementing Black Lotus' DDoS mitigation, they can eliminate attack-related interruptions by 99% without having to invest in additional infrastructure to absorb attacks. Additionally, Black Lotus is offering a free PFN service for data centers and service providers that need up to one gigabits per second (Gbps) of DDoS protection or want to offer it as an entry-level service to end users.

For worldwide service providers that offer Web hosting, cloud hosting, collocation, Internet services, and virtualized and dedicated servers, any interruption to client services can result in customers migrating to competitors. Organizations such as Servers Australia, Steadfast, Zone Networks, Rack Nation and Continuum trust Black Lotus' PFN technology to meet constant availability requirements. The PFN offering allows whole-infrastructure DDoS protection for data center companies and service providers and can also be offered as a value-added service to hosting customers. The end result is a new revenue stream that can defend its own infrastructure and fund the effort through reseller sales to end users.

DDoS attacks lasting hours or even minutes can lead to loss of revenue and customers. Black Lotus' free PFN service enables data center companies and service providers to get started with border gateway protocol (BGP)-based DDoS protection, which includes an introductory level of protection and clean traffic. Service providers can try the entry-level DDoS protection and then quickly ramp up to full-scale mitigation in the future. The full PFN package lets any BGP network establish a session with the Black Lotus scrubbing center for immediate filtering during a DDoS attack. Once the session is active, only confirmed DDoS attacks are sent to the scrubbing center, where IPs under attack are inspected and filtered, and only clean traffic is routed back to the target's network.

"Dedicated and managed hosting companies are finally recognizing it's a matter of 'when,' rather than 'if' they will suffer an attack against their online presence. These companies are often the backbone of countless sites and businesses that need 24/7 uptime to serve their customers, which also makes them prime attack targets," said Shawn Marck, CEO of Black Lotus. "Our services deliver rapid deployment of DDoS mitigation, so service providers not only experience cost savings and operational improvements, but they can also focus on their primary mission of providing continuous Web service instead of diverting internal resources to fight fires and worry about customer uptime."

Service providers or data center companies that are interested in DDoS protection services can send an email to [email protected] or call 866-477-5554 to learn more.

What Black Lotus data center and service provider customers are saying:

"We've grown our servers to host huge booking systems, airlines, government systems and many other sensitive services that require the highest level of reliability and uptime, including some of the world's largest game server providers, which are prone to attacks 24 hours a day, seven days a week. These organizations cannot afford network connectivity issues or downtime, so DDoS protection is a must for us," said Jared Hirst, managing director of Servers Australia, a provider of Web hosting, cloud hosting, collocation, virtualized and dedicated servers and other services. "Black Lotus can clean large amounts of DDoS attack traffic that can range in the hundreds of gigabits per second. Its network has the cleaning capacity we need, and we have successfully cleaned all sustained DDoS attacks to date."

"DDoS attack protection is an important component to any comprehensive network security platform," said Karl Zimmerman, president of Steadfast, a Chicago-based managed cloud and IT infrastructure company with three data centers and about 40 employees. "We have thousands of customers, all with their own needs and requirements, and having a complete security solution is critical to properly serving them. Black Lotus gives us the ability to protect against DDoS attacks while also providing control and flexibility. Because we can now keep customers up and running during DDoS attacks, we've been able to keep accounts that we might have otherwise lost."

"As an offshore data center for high-profile and high-risk clients, we are a constant target for DDoS attacks," said Felipe Cruz Ferrero, chief technical officer for Rack Nation, a data center that provides IT solutions. "We learned the necessity of DDoS protection the hard way, after we suffered repeated attacks targeted at specific clients. Rather than continuing to rely on a third party, we implemented Black Lotus' PFN so we could control DDoS protection for our data center and end users. Now we can confidently deliver 99.98 percent uptime to our customers, which would be near-impossible to achieve without Black Lotus' DDoS protection."

About Black Lotus Communications

Black Lotus Communications is a security innovator that pioneered the first commercially viable DDoS mitigation solutions. These advanced solutions enhance the security posture of small and medium businesses and enterprise clients while reducing capital expenditures, managing risk, ensuring compliance, and improving earnings and retention. Breakthrough developments at Black Lotus include the world's first DDoS-protected hosting network, the first IPv6 DDoS mitigation environment, and the first highly effective Layer 7 attack mitigation strategy. For more information, visit www.blacklotus.net or follow Black Lotus on Twitter at https://twitter.com/ddosprotection.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
Huawei Smartphones HONOR 20 PRO;Honor View 20;HONOR 20 have an improper handling of exceptional condition Vulnerability. A component cannot deal with an exception correctly. Attackers can exploit this vulnerability by sending malformed message. This could compromise normal service of affected phones...
PUBLISHED: 2020-06-05
A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5.1 and iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6. An application may be able to execute arbitrary code with kernel privileges.
PUBLISHED: 2020-06-05
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
PUBLISHED: 2020-06-05
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
PUBLISHED: 2020-06-05
Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.