sb-as logo
Story image

Nexusguard launches ‘industry first’ cloud DDoS mitigation platform

07 Mar 2017

Automation is the name of the game in cybersecurity - or at least that’s what Nexusguard, Juniper Networks and Serro Solutions have worked on to combat a rapidly escalating DDoS attack environment.

Nexusguard sought better protection for its enterprise customers in the face of sudden DDoS attacks. With the help of Juniper Networks and Serro Solutions, the company created what it calls an agile routing platform that works with software-defined networking (SDN) and automation architectures.

The result is what Nexusguard says is the industry’s first software-defined cloud DDoS mitigation platform.

It can manage multiple large-scale DDoS attacks concurrently by automatically routing engineering and optimising traffic through Nexusguard’s network of service providers. 

Nexusguard CEO Jolene Lee says the collaboration ensures customer networks will remain strong in the event of a DDoS attack.

A recent study showed that the DDoS attack size has grown 40 times since 2008. From Q4 2015 to Q2 2016, more than 1500 DDoS were recorded every day.

 “As DDoS attacks continue to grow and become more complex, having the agility to evolve alongside the attacks and customise our protection strategies to serve our clients is paramount. With our valued technology partners Juniper Networks and Serro, we’re confident in our ability to do that,” a statement from Nexusguard says.

Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
Acronis announces new security endpoint solution
The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Download image
Network functions virtualisation: What is is, how to use it, and why it matters
Network functions virtualisation (NFV) is fast becoming the go-to method of simplifying corporate networks from planning, through deployment and management.More
Story image
California's CCPA now enforced worldwide
“The expansive reach of the CCPA and scope of data it covers can make compliance feel daunting to many,” comments ISACA Privacy Group member David Bowden.More