Radware’s ERT Security Update Subscription (SUS) bolsters protection of network elements, hosts and applications against the latest security vulnerabilities and threats with rapid and continuous updates, as well as emergency updates for immediate response and environment-specific custom signatures.
Radware’s ERT Active Attackers Feed provides preemptive protection against DDoS attacks, scanners, anonymous proxies, IoT botnets and web application attacks by identifying and blocking known IP addresses that were recently involved in attacks in real time. It aggregates and correlates information from multiple sources making its data highly accurate.
- Radware’s global threat detection and deception infrastructure
- Cloud security customer network
- ERT threat research group
- Leading security vendors as part of the Cyber Threat Alliance
Radware’s Location-Based Mitigation solution helps protect data centers and networks against country-based DDoS attacks. It facilitates compliance with global regulations and meeting operational requirements. Radware’s solution allows for immediate ingress traffic filtering by country, based on geolocation mapping of IP subnets, ensuring dataflow alignment to organizations’ needs.
A network of globally distributed sensors – honeypots - running services that attract bots engaged in malicious activity around the world. Such bots are attempting to compromise, abuse and hack into computers, create new botnets and launch DDoS attacks.
The deception network attracts hundreds of thousands of malicious IPs, generating millions of events daily. The automatic analysis algorithms provide insights and categorization of various types of malicious activity from port scanning and reconnaissance through password Brute Force attempts to DNS reflection attacks.
Radware proprietary and patented algorithms running on the deception network are used to catalog and identify new and emerging threat actors, as well as to analyze malicious behavior designed to hide the attacker such as spoofing and anonymizing. Combining these creates a real time, non-spoofed IP list of malicious actors employing DDoS related behavior.