Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

F5 Networks Snaps Up Defense.net to Offer Hybrid DDoS Protection

F5 Networks Snaps Up Defense.net to Offer Hybrid DDoS Protection
F5 Networks Snaps Up Defense.net to Offer Hybrid DDoS Protection

Application delivery firm F5 Networks has announced the acquisition of privately held Defense.net for an undisclosed sum in a deal designed to bolster its security credentials by adding extra anti-DDoS capabilities.

The Seattle-based firm said the acquired cloud-based technology would help it protect against an even broader range of distributed denial of service attacks.
 
Defense.net co-founder Barrett Lyon, who managed to raise $9.5m in VC funding for the Californian-headquartered start-up last year, has previous when it comes to DDoS prevention, having also founded Prolexic.
 
His firm offers two main products: DDoS Frontline for primary protection and DDoS SWAT for ‘secondary’ protection – that is, for firms who want a back-up provider in case their primary DDoS protection service fails.
 
Defense.net claims that its cloud-based DDoS mitigation service offers “10 times the defense bandwidth per customer” compared to the rest of the market, enabling the firm to absorb even the largest attacks.
 
It’s a decent fit with F5 Networks – which provides technology to ensure applications can be delivered quickly and securely, and with high availability.
 
Defense.net’s technology will slot into F5’s existing portfolio of on-premise DDoS protection tools, which are founded on its Application Delivery Firewall (ADF), BIG-IP Local Traffic Manager and BIG-IP Global Traffic Manager products.
 
This will enable it to offer a hybrid approach to DDoS protection, combining the “resilience and scale” of the cloud with the “granularity and always-on capabilities” of on-premise, according to senior product manager, Lori MacVittie.
 
“While Defense.Net supports traditional architectural deployments – asymmetric GRE configuration and a symmetric proxy configuration – it also supports a destination NAT configuration that eliminates GRE MTU and other challenges,” she wrote in a lengthy note explaining the deal.
 
“This approach requires only inbound traffic to be inspected, which dramatically decreases its bandwidth requirements compared to symmetric DDoS technology. It further benefits organizations in reducing the latency incurred by traditional approaches, which means less of an impact on application performance and the quality of experience demanded to keep customers and employees satisfied.”
 
It’s no secret that DDoS attacks are increasing in volume and sophistication all the time.
 
A DDoS Threat Landscape study by web security firm Incapsula in March revealed a major shift to NTP amplification attacks since January, with some reaching 180Gbps.
 
Meanwhile, Neustar warned in its annual DDoS Attacks and Impact report that that in 2013, 60% of UK DDoS attacks measured over 1Gbps – double the 30% reported in 2012.

 

What’s Hot on Infosecurity Magazine?