SlideShare a Scribd company logo
The bot-mitigation solution offered by Verizon helped StubHub identify and block bots performing scraping
and helped reduce transaction fraud and account takeovers.
Marty Boss
Senior Director, Technology Operations, StubHub
0
20
40
60
80
100
A powerful bot-mitigation solution for
accurate web-application protection
19% of traffic are really bad bots causing problems
A “bot” is an automated program that runs on the internet. Although many
bots are designed to be helpful and useful, a rapidly growing number of bots
are created with malicious purposes. These bad bots are created by hackers,
unethical competitors and fraudsters who use them to exploit businesses
in countless ways, including: scanning for vulnerabilities, stealing content,
abusing account credentials, stealing personal data, and causing denial of
service to your web applications.
Verizon Digital Media Services’ bot-mitigation solution is integrated into our
effective multi-layer defense approach.
Its purpose is to address all bot problems included in the OWASP Automated Threat Handbook,
plus defend against advanced, persistent bots that attack, abuse and exploit your web applications.
Key benefits
•	 Protect your web application by stopping bad bots
•	 Secure your APIs against abuse, misuse and user errors
•	 Obtain accurate analytics free of bad data generated
by bots
•	 Create great user experiences with fast web-application
load times
•	 Lower infrastructure costs by eliminating unnecessary
bot traffic
Bad bots
19%
Good bots
27%
Humans
54%
Average website
traffic distribution
Verizon bot mitigation | Overview
Skewed analytics Downtime Digital ad fraud API abuse
Web scraping Security breach Spam Online fraud
Accurate protection
Firewalls, WAFs and IDS systems were never designed
to stop and manage the volume, variety and sophistication
of today’s bots and botnets. The Verizon difference? Ease
of use and accuracy. Our bot-mitigation solution features
self-optimizing protection that blocks 99.9% of malicious
bots without impacting legitimate users. Quickly fine-tune
your own settings, and enjoy complete control over how
you manage bots and use the service.
White-glove support
We provide a dedicated team of security analysts that
fine-tunes your implementation and manages the bot-
mitigation program on your behalf. This includes real-time
threat detection and response and post-incident reporting,
ensuring you stay one step ahead of your adversaries.
Known Violators Database
Real-time updates from the world’s largest Known Violators
Database of bad bot Hi-Def fingerprints is based on the
collective intelligence of all Verizon-protected sites. In
addition, we curate real-time threat intelligence feeds from
third-party fraud, spam, malware and proxy lists, all of which
are updated and used to protect you in real time.
Challenges and browser validation
We validate that a browser is exactly what it claims to be,
and through challenges and deep interrogation, we make
sure the browser is being used by a human, not a bot. Even
browser automation tools like Selenium and PhantomJS
can’t escape our detection.
Inline Hi-Def device fingerprinting
This feature analyzes over 200 attributes of information from
each client request. Hi-Def fingerprints stick to the bot even
if it attempts to reconnect from random IP addresses or hide
behind an anonymous proxy.
Device-based rate limiting
Rate limiting is based on our Hi-Def Fingerprints, not IP
addresses. Predictive analytics show you how your traffic
will be affected when dialing up or down rate limits, such as
pages per minute, pages per session and session length.
Universal access control list
Save time creating whitelists and blacklists by using our
Universal Access Control List. Quickly create a policy, then
apply it to a specific domain, URL/path, API or across your
entire account.
API security
Our API security tracks API clients and monitors acceptable
usage, acting as an automatic shield against API hijacking,
scraping and abuse. It’s also an insurance policy against
developer errors and integration bugs.
Behavioral modeling and machine learning
Machine-learning algorithms pinpoint behavioral anomalies
specific to your site’s unique traffic patterns. We also
proactively predict a bot based on correlating dozens of
dynamic classifications, which is in comparison to the reactive
approach inherent in most Web Application Firewalls (WAFs).
We also offer an enterprise WAF that boasts unprecedented
agility, with rule updates that are applied globally in two to five
minutes – up to 900 percent faster than comparable products.
Edgecast Content Delivery Network
Our enterprise CDN leverages a more efficient, centralized
distribution architecture that’s optimized for today’s internet.
We’ve built a highly interconnected global network, featuring
massive bandwidth capacity and advanced caching and
acceleration strategies. We also embrace best-in-class,
open-source technologies and fast-routing IP Anycast
technology for powerful, lightning-fast performance that
spans the globe.
Physical or virtual appliance
Enjoy premium security out of the box thanks to:
•	 Easily install on virtualized or bare metal appliance(s)
•	 Seamlessly integrate with CDNs, load balancers and
other network infrastructure
•	 Automatically obtain new bad-bot fingerprints via
a heartbeat up to the cloud
Our multiple deployment options don’t require changes to your underlying web infrastructure and won’t impede current
or future integrations.
Why Verizon Digital Media Services
Flexible deployment
Contact us
info@verizondigitalmedia.com
1.877.334.3236
www.verizondigitalmedia.com
Trustedbytheworld’smostsuccessfulwebsites

More Related Content

What's hot

Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
Shivam Porwal
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
Tjylen Veselyj
 
Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
Shivam Porwal
 
Owasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesOwasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilities
RIZWAN HASAN
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id concept
Mostafa El Lathy
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Distil Networks
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
Amazon Web Services
 
Open APIs: Security for Mobile and the Cloud
Open APIs: Security for Mobile and the CloudOpen APIs: Security for Mobile and the Cloud
Open APIs: Security for Mobile and the Cloud
CA API Management
 
Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
Prathan Phongthiproek
 
Owasp 2017 oveview
Owasp 2017   oveviewOwasp 2017   oveview
Owasp 2017 oveview
Shreyas N
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
Robert Crane
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threats
Vishal Kumar
 
Web application security
Web application securityWeb application security
Web application security
Akash Mahajan
 
FortiWeb
FortiWebFortiWeb
FortiWeb
Alireza Akrami
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
YasserElsnbary
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
Prathan Phongthiproek
 

What's hot (20)

Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
 
Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
 
Owasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesOwasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilities
 
12 palo alto app-id concept
12 palo alto app-id concept12 palo alto app-id concept
12 palo alto app-id concept
 
Web application security
Web application securityWeb application security
Web application security
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 
Open APIs: Security for Mobile and the Cloud
Open APIs: Security for Mobile and the CloudOpen APIs: Security for Mobile and the Cloud
Open APIs: Security for Mobile and the Cloud
 
Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
 
Owasp 2017 oveview
Owasp 2017   oveviewOwasp 2017   oveview
Owasp 2017 oveview
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threats
 
Web application security
Web application securityWeb application security
Web application security
 
FortiWeb
FortiWebFortiWeb
FortiWeb
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
 

Similar to Verizon DMS' Bot Mitigation from Paul Hobbs

Anti phishing web browser
Anti phishing web browserAnti phishing web browser
Anti phishing web browser
Sujal Chawala
 
Cyber security
Cyber securityCyber security
Cyber security
Shaibal Ahmed
 
Cyber security
Cyber securityCyber security
Cyber security
Shaibal Ahmed
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
Aardwolf Security
 
10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website
Cigniti Technologies Ltd
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
Felipe Prado
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
Osei Fortune
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
 Secure your app against DDOS, API Abuse, Hijacking, and Fraud Secure your app against DDOS, API Abuse, Hijacking, and Fraud
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
Tu Pham
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
Cyber Security Infotech
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
Paul Hobbs
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
INSPIRIT BRASIL
 
Bringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing AnarchyBringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing Anarchy
ScriptLogic
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
Darshan Khant
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
Nugroho Gito
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
Narola Infotech
 
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
apidays
 
EaZy Security "An introduction to WordPress security plugin"
EaZy Security "An introduction to WordPress security plugin"EaZy Security "An introduction to WordPress security plugin"
EaZy Security "An introduction to WordPress security plugin"
biksweeofficial
 

Similar to Verizon DMS' Bot Mitigation from Paul Hobbs (20)

Anti phishing web browser
Anti phishing web browserAnti phishing web browser
Anti phishing web browser
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
 Secure your app against DDOS, API Abuse, Hijacking, and Fraud Secure your app against DDOS, API Abuse, Hijacking, and Fraud
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
Bringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing AnarchyBringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing Anarchy
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
 
EaZy Security "An introduction to WordPress security plugin"
EaZy Security "An introduction to WordPress security plugin"EaZy Security "An introduction to WordPress security plugin"
EaZy Security "An introduction to WordPress security plugin"
 

Recently uploaded

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 

Recently uploaded (12)

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 

Verizon DMS' Bot Mitigation from Paul Hobbs

  • 1. The bot-mitigation solution offered by Verizon helped StubHub identify and block bots performing scraping and helped reduce transaction fraud and account takeovers. Marty Boss Senior Director, Technology Operations, StubHub 0 20 40 60 80 100 A powerful bot-mitigation solution for accurate web-application protection 19% of traffic are really bad bots causing problems A “bot” is an automated program that runs on the internet. Although many bots are designed to be helpful and useful, a rapidly growing number of bots are created with malicious purposes. These bad bots are created by hackers, unethical competitors and fraudsters who use them to exploit businesses in countless ways, including: scanning for vulnerabilities, stealing content, abusing account credentials, stealing personal data, and causing denial of service to your web applications. Verizon Digital Media Services’ bot-mitigation solution is integrated into our effective multi-layer defense approach. Its purpose is to address all bot problems included in the OWASP Automated Threat Handbook, plus defend against advanced, persistent bots that attack, abuse and exploit your web applications. Key benefits • Protect your web application by stopping bad bots • Secure your APIs against abuse, misuse and user errors • Obtain accurate analytics free of bad data generated by bots • Create great user experiences with fast web-application load times • Lower infrastructure costs by eliminating unnecessary bot traffic Bad bots 19% Good bots 27% Humans 54% Average website traffic distribution Verizon bot mitigation | Overview Skewed analytics Downtime Digital ad fraud API abuse Web scraping Security breach Spam Online fraud
  • 2. Accurate protection Firewalls, WAFs and IDS systems were never designed to stop and manage the volume, variety and sophistication of today’s bots and botnets. The Verizon difference? Ease of use and accuracy. Our bot-mitigation solution features self-optimizing protection that blocks 99.9% of malicious bots without impacting legitimate users. Quickly fine-tune your own settings, and enjoy complete control over how you manage bots and use the service. White-glove support We provide a dedicated team of security analysts that fine-tunes your implementation and manages the bot- mitigation program on your behalf. This includes real-time threat detection and response and post-incident reporting, ensuring you stay one step ahead of your adversaries. Known Violators Database Real-time updates from the world’s largest Known Violators Database of bad bot Hi-Def fingerprints is based on the collective intelligence of all Verizon-protected sites. In addition, we curate real-time threat intelligence feeds from third-party fraud, spam, malware and proxy lists, all of which are updated and used to protect you in real time. Challenges and browser validation We validate that a browser is exactly what it claims to be, and through challenges and deep interrogation, we make sure the browser is being used by a human, not a bot. Even browser automation tools like Selenium and PhantomJS can’t escape our detection. Inline Hi-Def device fingerprinting This feature analyzes over 200 attributes of information from each client request. Hi-Def fingerprints stick to the bot even if it attempts to reconnect from random IP addresses or hide behind an anonymous proxy. Device-based rate limiting Rate limiting is based on our Hi-Def Fingerprints, not IP addresses. Predictive analytics show you how your traffic will be affected when dialing up or down rate limits, such as pages per minute, pages per session and session length. Universal access control list Save time creating whitelists and blacklists by using our Universal Access Control List. Quickly create a policy, then apply it to a specific domain, URL/path, API or across your entire account. API security Our API security tracks API clients and monitors acceptable usage, acting as an automatic shield against API hijacking, scraping and abuse. It’s also an insurance policy against developer errors and integration bugs. Behavioral modeling and machine learning Machine-learning algorithms pinpoint behavioral anomalies specific to your site’s unique traffic patterns. We also proactively predict a bot based on correlating dozens of dynamic classifications, which is in comparison to the reactive approach inherent in most Web Application Firewalls (WAFs). We also offer an enterprise WAF that boasts unprecedented agility, with rule updates that are applied globally in two to five minutes – up to 900 percent faster than comparable products. Edgecast Content Delivery Network Our enterprise CDN leverages a more efficient, centralized distribution architecture that’s optimized for today’s internet. We’ve built a highly interconnected global network, featuring massive bandwidth capacity and advanced caching and acceleration strategies. We also embrace best-in-class, open-source technologies and fast-routing IP Anycast technology for powerful, lightning-fast performance that spans the globe. Physical or virtual appliance Enjoy premium security out of the box thanks to: • Easily install on virtualized or bare metal appliance(s) • Seamlessly integrate with CDNs, load balancers and other network infrastructure • Automatically obtain new bad-bot fingerprints via a heartbeat up to the cloud Our multiple deployment options don’t require changes to your underlying web infrastructure and won’t impede current or future integrations. Why Verizon Digital Media Services Flexible deployment Contact us info@verizondigitalmedia.com 1.877.334.3236 www.verizondigitalmedia.com Trustedbytheworld’smostsuccessfulwebsites