Radware (News - Alert) Ltd, a provider of application delivery and application security solutions for virtual and cloud data centers, recently announced that its Attack Mitigation System, (AMS) powered by DefensePro, has been selected by Broadvoice, a provider of VoIP for business and residential customers in the U.S. and Canada. The solution will help Broadvoice avoid any distributed denial of service (DDoS) attacks on its voice network.
Radware's advanced AMS solution is multi-layered, and provides a way to combine detection and mitigation technology that protects against DDoS attacks, which are constantly growing more complex and effective. In fact, the AMS protection is able to identify where the attacks are coming from, which allows it to report on the breach and provide accurate information in real-time while simultaneously keeping legitimate network traffic on track. DefensePro uses a dedicated hardware platform based on Radware's OnDemand Switch supporting network throughputs up to 40Gbps.
“We quickly switched on our mitigation and it immediately halted the attack, preserving the marketing investment of our campaign,” said Ryan Delgrosso (News - Alert), chief technology officer of Broadvoice, in a recent statement about the deal. “Without DefensePro alerting us that we were under attack and effectively mitigating it, our campaign would have fallen flat.”
In related news, Xand, a provider of ultra-flexible cloud, collocation, disaster recovery and managed services in the northeastern United States, recently selected Radware's DefensePro security solution to protect their cloud and collocation infrastructure from DDoS attacks, among other threats.
Xand's customers include hospitals, universities, retail organizations and financial services firms, all of which could potentially be crippled by a successful DDoS attack that shuts down legitimate user access, as every single moment of downtime has a massive associated cost. Through Radware's AMS, these customers can keep their services running in the face of even the strongest network attacks, while keeping the information in the cloud safe and rooting out their attackers.
Edited by Alisen Downey