Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/13/2015
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Distil Networks Acquires ScrapeSentry to Add 24/7 Security Ops Center

New Managed Security Service Evaluates and Responds to Bot Threats in Real-Time Based on Each Customer's Unique Security Policy and Response Plan

San Francisco, CA – January 13, 2016 – Distil Networks, Inc., the global leader in bot detection and mitigation, today announced its acquisition of managed security services provider ScrapeSentry, a spin-off of leading managed security firm Sentor. ScrapeSentry’s team of experienced security analysts will provide real-time threat monitoring, analysis, investigation, and response, as well as post-incident reports and best practices to ensure a rapid response to malicious bot attacks. With today’s news, Distil’s 24/7 managed security service is available to mid-market and enterprise customers and is based on each customer’s unique security policy 

Bots represent a new generation of threats, making up nearly 60 percent of all web traffic. Bots are a platform used by hackers and fraudsters alike and are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.

Distil offers the first easy and accurate way to defend websites against these malicious bots -- without impacting legitimate users. By monitoring each page request and building a fingerprint of each incoming connection, Distil allows customers to accurately detect bots in real time and then provides options to mitigate the attack.

Supporting Quotes

“Distil’s technology is built on machine learning and catches 99.9 percent of the bad guys. By adding ScrapeSentry’s experts to our team, and a human element to our solution, we are getting closer to closing that point one percent gap. With ScrapeSentry’s strong security pedigree and background in managed services, the team’s hands-on, granular approach will provide our customers with dedicated SOC resources along with even faster response times.”

-- Rami Essaid, co-founder and CEO of Distil Networks

“Bots and scraper programs continue to cause serious problems for online business models. Together with Distil we will have a platform that we can use to provide protection for a broader audience and all customers will benefit from the unmatched strength of the joint development and research teams. ScrapeSentry’s experience in managed security services is a natural extension for Distil and we are thrilled to join the company’s team and mission to make the web more secure.”

-- Martin Zetterlund, CEO for ScrapeSentry

About ScrapeSentry 

ScrapeSentry was founded in 2006, and was the world's first anti-scraping solution to be developed to protect sites from the loss of Intellectual Property and from data theft. As pioneers in the field, ScrapeSentry has worked with many global businesses, such as easyJet, Ladbrokes, and Autotrader.com to protect them from scraping and all the costs, losses of data, customers and IP as well as the potential losses in the reputational damage, that scraping involves. ScrapeSentry has offices in Stockholm, Sweden, London, UK and Boston, USA. For more information please see http://www.scrapesentry.com.

About Distil Networks

Distil Networks, the global leader in bot detection and mitigation, is the first easy and accurate way to identify and police malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil protects against web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime. Slash the high tax that bots place on your internal teams and web infrastructure and make your online applications more secure with API security, real-time threat intelligence, a 24/7 security operations center, and complete visibility and control over human, good bot, and bad bot traffic. For more information on Distil Networks, visit us at www.distilnetworks.com or follow @DISTIL on Twitter.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Inside North Korea's Rapid Evolution to Cyber Superpower
Kelly Sheridan, Staff Editor, Dark Reading,  12/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27409
PUBLISHED: 2020-12-04
OpenSIS Community Edition before 7.5 is affected by a cross-site scripting (XSS) vulnerability in SideForStudent.php via the modname parameter.
CVE-2020-27408
PUBLISHED: 2020-12-04
OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.
CVE-2020-27765
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause ot...
CVE-2020-27766
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, b...
CVE-2020-27767
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application avai...