Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/7/2011
03:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Neustar Launches SiteProtect For DDoS Protection

SiteProtect allows customers’ Web infrastructure to operate normally under attack

Neustar, Inc. (NYSE: NSR) today announced the launch of SiteProtect, a cloud-based service for UltraDNS customers that brings a new level of security to online properties against Distributed Denial of Service (DDoS) attacks. SiteProtect allows customers’ Web infrastructure to operate normally under attack, thus avoiding downtime and the associated loss of potential revenue. According to Arbor Networks, Inc., from 2009 to 2010, the industry has seen the average size of these attacks double, further reinforcing the need for prevention and protection.

Combined with Neustar UltraDNS, SiteProtect arms customers with strong protection bundles that provide security for both domain name system (DNS) and Web traffic. When a DDoS attack hits, SiteProtect is activated via a simple DNS change in the UltraDNS Management Portal, also accessible via a mobile application. The customers’ traffic is routed to the cloud-based traffic scrubbing centers where legitimate traffic is forwarded on while the attack traffic is contained. SiteProtect only charges a per incident fee beyond the monthly subscription and does not charge based on the size of an attack.

“A Web-facing business is proverbially faced with a ‘pay me now or pay me later’ decision,” said Michael Suby, an industry analyst and Director at Stratecast. “Taking steps to fight a DDoS attack before one occurs – pay me now – we view as the best and prudent choice.”

DDoS attacks are increasingly being used as a form of online protest. In December of 2010, the industry experienced pro-WikiLeaks attacks that targeted Visa and MasterCard. The explosive growth of social media channels provides fertile ground to solicit support for such online attacks for political or criminal purposes. Social media channels also help distribute increasingly simple online attack tools to a large numbers of recruits.

“The problem with other approaches to DDoS protection is that the network needs to take a hit before mitigation is started,” said Rick Rumbarger, Senior Director, Product Management, Neustar Internet Infrastructure Services. “With SiteProtect, the brunt of the attack is immediately shifted away from the client infrastructure and directed to our mitigation cloud service. By moving this service to the cloud, customers no longer have to buy and maintain large capacity infrastructure with its resulting capex expenses.”

Neustar has been a leader in DDoS mitigation for more than a decade. Hundreds of the largest Internet companies trust Neustar to protect their brand.

For additional information about Neustar’s new SiteProtect service, please click here.

About Neustar and Neustar UltraDNS Neustar, Inc. (NYSE: NSR) provides market-leading and innovative solutions and directory services that enable trusted communication across networks, applications and enterprises around the world. Leveraging a unique directory platform and proprietary, patented technologies, Neustar's UltraDNS Services – the company’s comprehensive suite of managed DNS offerings – provides a range of infrastructure solutions to organizations that rely on the Internet for their critical business processes, applications and services. Today, UltraDNS Services are used by more than 3,000 enterprises and TLD infrastructure customers worldwide, and currently power the resolution of nearly 20 million global Internet domains. Visit http://www.neustar.biz and http://www.ultradns.com for more information.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
TWCE
50%
50%
TWCE,
User Rank: Apprentice
1/18/2012 | 11:51:27 PM
re: Neustar Launches SiteProtect For DDoS Protection
They forgot to mention in this article that Neustar failed to mitigate a udp flood on port 80 that was directed toward their name server on port 53. Amazon.com was down for hours on Dec 23 as a result of their incompetence.
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32823
PUBLISHED: 2021-06-24
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with &lt...
CVE-2021-35041
PUBLISHED: 2021-06-24
The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainabl...
CVE-2021-2322
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
CVE-2021-20019
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
CVE-2021-21809
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.