Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Neustar Named A Leader In IDC MarketScape Worldwide DDoS Prevention Report.

The Results of the 2018- 2019 Vendor Assessment are in

by The Gurus
November 1, 2019
in DDoS
neustar
Share on FacebookShare on Twitter

Neustar®, Inc., a trusted, neutral provider of real-time information services, announced today that it has been named a Leader in the IDC MarketScape: Worldwide DDoS Prevention Solutions 2018- 2019 Vendor Assessment (DOC # US43699318 March 2019). In the published excerpt, Neustar’s advanced features, functionality, detection and mitigation techniques were all cited as strengths within the DDoS space.

IDC MarketScape is the industry’s premier vendor assessment tool, providing in-depth quantitative and qualitative technology market assessments of ICT vendors for a wide range of technology markets. According to IDC, the report is based on a balanced group of criteria that lead to ICT vendor’s market success – not overly weighted toward offering functionality or company size.

“We’re delighted to be considered an IDC MarketScape leader within the DDoS prevention space,” said Shailesh Shukla, Neustar general manager of security solutions. “Neustar thrives on providing a broad portfolio of holistic identity resolution and unmatched mitigation strategies to protect businesses and customers’ mission critical digital assets,” he continued.

Shukla continues, “Neustar products and services leverage real-time intelligence based on the analysis of traffic, behaviour and identity to determine activity, context and intent. From this, decisions are made with respect to the type and level of protection to provide. As DDoS attacks continue to wreak havoc and pose significant challenges across the globe, we’re committed to producing the latest innovations in security to protect organisations.”

“The Neustar DDoS Protection solution offers 10+Tbps of DDoS mitigation making it one of the largest dedicated data scrubbing networks in the world,” said Martha Vazquez, IDC senior research analyst. “As an analyst, we know how important it is to have access to the best mitigation techniques, the most robust vendor-diverse protection technologies, as well as the most advanced analytics available today. Neustar provides its customers with the resources and assurance that are needed to ensure data and infrastructure is continually protected against any type or size of DDoS attack.”

Part of the Neustar Security Solutions suite, SiteProtect NG™, breaks with the tradition of designing DDoS mitigation that makes use of a high volume of small scrubbing centres with fewer, highly fortified and highly connected locations. The SiteProtect NG network has deployed large, full scale, nodes, each with its multi-terabit scrubbing capacity in North America, Europe, and Asia, South America, Africa, Australia and India.

A complimentary excerpt copy of The IDC MarketScape: Worldwide DDoS Prevention Solutions 2018- 2019 Vendor Assessment is available here.

FacebookTweetLinkedIn
Share3TweetShare
Previous Post

The Biometric Smart Card: Connecting The Digitally Excluded.

Next Post

Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria.

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information