Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 3 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Corero and Verisign announce DDoS bashing collaboration

by The Gurus
April 14, 2015
in Top 10 Stories
Share on FacebookShare on Twitter

Corero Network Security has announced integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions.
For Verisign and Corero customers, the integration combines on-premises technology from Corero Network Security to defeat sub-saturating DDoS attacks, alongside cloud-based DDoS Protection Service from Verisign for high volume and complex application layer attacks that exceed the customer’s network and resource capacity.
The architecture is designed to detect and respond to a large spectrum of DDoS attacks, ranging from high volume denial of service attempts to blended multi-vector threats, as well as low and slow application layer attacks. The solution detects, analyses and responds to DDoS attacks by inspecting raw internet traffic at line rate and identifying the threat within the first few packets of an attack.
“This collaboration with Verisign further underscores the momentum in the market for a hybrid approach to DDoS defense,” said Dave Larson, CTO and vice president, product at Corero. “Further, the technology integration between the two organizations is an example of combining best-of-breed solutions in both categories in order to better defend customers against DDoS attacks with real-time defense technology.”
“Corero’s work to integrate with Verisign’s OpenHybrid APIs has been exceptional,” said Danny McPherson, senior vice president and chief security officer at Verisign. “This integration enables customers to stay ahead of the DDoS challenge through a combined, always-on hybrid DDoS solution based on open standards.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Price of breached record rises as attackers life is made easier by old flaws

Next Post

Cyber Security Show – Critical industry operational technology often 30 years old

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information