Home / Industry

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Verisign and Juniper offer a joint solution combining Juniper’s on-premise DDoS Secure with Verisign’s cloud-based DDoS Protection Service. Together these solutions provide the depth and breadth needed to combat attacks targeted at every layer of the network through Real-Time Adaptive Mitigation technologies. You may have seen the news this morning that we have joined forces with Juniper Networks to provide a comprehensive, always on, DDoS solution. At Verisign, we focus on protecting companies from increasingly complex cyber threats, and this relationship should only raise the bar higher, as it will provide a different, more integrated approach than what’s used today, to help ensure faster and more efficient detection and mitigation.

Given the alarming rise of sophisticated DDoS attacks, today’s solutions must be able to detect and mitigate zero-day threats and large-scale attacks that exceed the capacity of the victim’s network to help businesses of all types and sizes stay secure, stable and available. By combining the strength of network and application-layer protection provided by Juniper’s DDoS Secure appliances and Verisign’s cloud-based DDoS Protection, we can help customers improve time to mitigation. This will be achieved by quickly handling low-volume attacks with on-premise hardware, while still offering the added security of back-up in the cloud for large-scale and extremely complex attacks, as well as the extra bandwidth needed for mitigation as those attacks ramp up. We chose Juniper as their solution offers unique capabilities when it comes to premise-based detection and mitigation. Other premise-based DDoS detection and mitigation solutions on the market put a strain on the customer security team to customize and adapt the rule sets on the fly during an attack, which can be time-intensive and requires significant skills and resources. This solution uses Juniper advanced technology to automatically detect and mitigate DDoS attacks, working in conjunction with our globally connected, fully redundant cloud-based platform to provide a real-time adaptive solution. This solution offers customers peace of mind that they can handle all types of attacks faster and more efficiently.

Specifically, the solution responds in real-time to application response and adapts to support automated detection through risk scoring and cloud-based mitigation based on customizable parameters. It is the first solution that delivers both non-signature based risk scoring and real-time, zero-day signature integration providing customers the full spectrum of DDoS defenses across Layers 3-7. The solution monitors the health of protected services and applications, and incorporates predictive and real-time risk intelligence across the service.

The way this solution works is very simple and effective for the customer. When an attack is determined to exceed the network capacity at the data center edge, mitigation moves to Verisign’s globally connected, fully redundant cloud-based platform to provide comprehensive protection against network and application layer attacks. Additionally, Verisign iDefense Security Intelligence analysts actively monitor indicators of attacks, in order to assist Verisign’s DDoS protection engineers in creating new signatures for new attacks, while Juniper DDoS Secure heuristics engine inspects both inbound and outbound traffic to calculate local risk. This is absolutely critical to help defend against zero-day threats. Overall, by bringing together dedicated, on-premise DDoS mitigation devices and cloud-based solutions, we are one step closer to realizing the vision of more comprehensive, always on, automated DDoS protection in increasingly heterogeneous environments that span public, private and hybrid clouds.

There hasn’t been a more crucial time for organizations to improve their security defenses than today, and this approach offers a breadth and depth of defense—from premises to the cloud—that more effectively provides the security protection customers need.

By Verisign, A Global Provider of Critical Internet Infrastructure and Domain Name Registry Services

Verisign, a global provider of domain name registry services and internet infrastructure, enables internet navigation for many of the world’s most recognized domain names. Verisign enables the security, stability, and resiliency of key internet infrastructure and services, including providing root zone maintainer services, operating two of the 13 global internet root servers, and providing registration services and authoritative resolution for the .com and .net top-level domains, which support the majority of global e-commerce. To learn more about what it means to be Powered by Verisign, please visit Verisign.com.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC