PerimeterX Bot Defender Protects Against Automated Web Attacks
April 13, 2016
Omri Iluz, the co-founder and CEO of PerimeterX, spoke about the Bot Defender’s ease of operation and the security it provides.
“Bot Defender’s behavioral fingerprinting provides the most comprehensive protection against automated threats, and we’ve made it as easy as possible for any company to start using it,” Iluz said. “PerimeterX deployments already protect more than one billion page views each week, and that number is quickly growing.”
Iluz’s mention of “behavioral fingerprinting” refers to his company’s use of client monitoring to determine when attacks are taking place. Instead of attempting to profile the zero-day threats, brute force attacks, content scraping, ad fraud, or scalping that Bot Defender wants to prevent, it pays attention to static information that comes from everyday occurrences within websites.
Malware is not known for remaining static. Program version updates include new code to heighten the efficacy of attacks and evade anti-virus software, so their signatures change too rapidly for security professionals to keep pace. On the other hand, friendly user behavior and the networks and browsers that users employ will not change significantly from day to day. Those patterns of good behavior make bad behavior stand out. This is a bright red shirt among a sea of white shirts.
Within the PerimeterX cloud, enterprise clients can gain visibility of all the traffic traveling to and being blocked at the perimeter of their networks. Administrators can see why specific traffic has been blocked, and they can make changes as they see fit. They can also view the details that surround specific attacks, such as the time, country of origin, and IP address of when and where an automated attacked tried to penetrate their network.
Though only a young company (founded in 2014), PerimeterX has made a name for itself with e-commerce and software-as-a-service protection tools. Its latest Bot Defender service seeks to prove the company’s worth even further with simple use and design alongside an efficient and scalable model of protection.
Edited by Peter Bernstein
Article comments powered by