About Us

Involta Releases Air Gap Solution to Protect Crucial Data From Cybercrime

Involta, a provider of cloud computing, hybrid IT and data services firm, announced the launch of  Involta Air Gap to secure business backup, as digital migration continues to advance into the cloud. Involta Air Gap provides robust air security — the space between working and backup — to stop cyber criminals from accessing important information, significantly mitigating the severity of expensive ransomware attacks.

With increased cybercrime at corporate level, this solution is vital. Cybercrimes have increased significantly over the past year in terms of high-profile ranching campaigns and viruses, malware and DoS (denial of service). This has led to unprecedented cyber and information security spending among businesses. Research forecasts that the world will have a global cost of 11.4 million dollars every minute by the end of 2021.

“In the arena of cybersecurity, ransomware attacks target back-ups, crippling an organization’s ability to access its critical data. Involta Air Gap builds on cybersecurity measures that may already be in place and acknowledges that securing enterprise data in a separate location is critical. The premise is that a cybercriminal can’t access back-ups if there is no connection between environments. Involta Air Gap was developed to help enterprises win the war against cybercrime, especially those using AWS and Veeam cloud solutions,” said Mark Cooley, Vice President of Security and Compliance, Involta.

It continues to follow AWS’s elevated relations with AWS as the AWS Partner Network’s Advanced Consulting partner and its Veeam Cloud and Service Provider (VCSP) status in the AWS Partner Network (APN). 

Corero’s latest software release improves DDoS protection at the network edge and for 5G

Corero Network Security plc (AIM: CNS.L), a leading provider of real-time, high-performance, automated Distributed Denial of Service (DDoS) cyber defense solutions, has released the latest version of its award-winning SmartWall Threat Defense Director product. These new features make it easier than ever for Corero and Juniper clients to keep their businesses running by providing a cutting-edge, an automatic DDoS Protection solution and deploy it as a value-added service to their downstream customers.

Traditional blackholing, out-of-band scrubbing centres, on-demand cloud services, and human intervention are no longer viable business practises as DDoS attacks continue to expand in scale, frequency, and sophistication. Juniper Networks and Corero Network Security are continuing their long-standing and successful partnership to create a groundbreaking new solution against DDoS attacks using Juniper NetworksTM MX Series Universal Routing Platforms and Corero Network Security’s SmartWall software intelligence. This integrated DDoS solution provides automatic, real-time detection and line-rate mitigation, scaling from 100 Gbps to 40 Tbps as a customer’s needs develop. Across the network edge, it uses always-on packet-level monitoring, automated machine analysis, and high-performance infrastructure-based enforcement.

Today, we are highlighting some of the enhancements made to our SmartWall Threat Defense Director (TDD):

  • Visibility into 5G mobile traffic for subscriber-side DDoS protection with GTP payload inspection;
  • Attack source Geolocation and Autonomous System awareness IP intelligence Plug-in;
  • DDoS protection as a service with multi-tenant Service Portal and Tenant-Awareness Plug-in;
  • Flexible upstream Traffic Control with BGP policy for saturation prevention and multi-vendor support.

“The newest enhancements to SmartWall TDD now make it easier than ever for customers to deliver automatic, real-time DDoS protection. Our partnership with Juniper allows both Corero and Juniper to deploy an industry leading DDoS protection solution, leveraging their SDN-enabled MX Series routers and Corero’s software intelligence. These software enhancements enable us to deliver leading protection against the growing threat of DDoS.” said Corero CTO, Ashley Stephenson.

Distributed Denial of Service (DDoS) – Everything You Need to Know

A Distributed Denial of Service (DDoS) is a cyber-attack in which the attackers seek to make an online service unavailable by overwhelming it with traffic from multiple sources. DDoS attacks account for a significant portion of security threats and latest attacks have been larger and more complex than ever before. Research firms are expecting the DDoS attack prevention market to grow 20% every year.

The Basic steps in DDoS are-

1) Detection – The DDoS attack detection involves identification of deviations in traffic flow from a normal to high traffic based on parameters like IP address, bandwidth, etc. The wide-global distribution of attacking sources makes it extremely hard for organizations to recognize real client traffic from attack traffic spread across many points of origin. DDoS detection is the key to quickly stop or mitigate attack and to do these two factors- 1) Speed of detection and 2) Accuracy of detection, play an important role.

2) Decision – Traffic is rerouted away from its target organization using DNS (Domain Name System) or other techniques and a decision must be taken whether to filter it or discard it completely. Discarding traffic completely affects an organization’s customers.

3) Analysis and Adaption – Analytics helps to gather and analyze information about the attack specific patterns such as repeating IP address range, certain processes misused. Security analytics techniques can provide a detailed comprehensive overview of attack traffic and instant understanding of attack. This information can be used to create new robust system and adapt to enhance future attack prevention.

Risk involved in DDoS attack for an Enterprise

DDoS attacks on an organization’s online service or website are time-consuming and expensive. Maximum organizations don’t have experience and technical experts to prevent DDoS attack. These attacks take down an enterprise firm in few minutes and the recovery process take several hours or weeks. An Organization’s network infrastructure comprises of a number of servers, computers and other IT assets. These may include web servers, FTP servers, email servers, ERP or CRM platforms. In a DDoS attack they are targeted resulting in downtime of organization’s business. The negative impact of such downtime can be felt by firm are expensive, it can affect website’s ranking on search engines and they may lose client’s trust, which results in revenue loss. All businesses irrespective of size and industry are vulnerable to DDoS attacks. The organizations having business records, financial data and customer information are more targeted.

DDoS Cloud based Risk Mitigation Services

DDoS mitigation services is a set of techniques or tools for defending or mitigating the effect of distributed denial-of-service (DDoS) attack on Internet-connected networks by protecting the target at various levels of network. DDoS mitigation service can be deployed as a device on an organization’s premises or in their data centers, as a cloud service or hybrid of both. In this, they filter the traffic by accessing data repository stored in the Cloud, so regular customers are not affected. These services are customizable, reliable and can be Scaled up-down as per client’s need.

Big data and ML Integrated Solutions

DDoS attacks are becoming more frequent, Sophisticated and more effective with increasing speed of internet. The pool of potential attacks is now greater than ever considering the increasing availability of attacking tools and botnets. Humans are simply not enough to deter and block DDoS attacks and companies that rely on manual DDoS security and mitigation services are not completely protected against today’s and future threats. Big data Analytics systems can store and process huge data making it possible to have complete logs of raw data like IP address, which can be analyzed with the help of machine learning algorithms to prepare solutions that can help enterprises stay one step ahead of the DDoS attackers. This sector is still in initial phase of growth, but with time they will play a huge role in DDoS attack Prevention.

The main reason behind not buying a Distributed Denial of Service Protection Solution is the cost incurred in buying a service or dedicated team. The key to understanding the extent of the effect of DDoS attacks is to realize the importance or cost of network traffic being blocked or the downtime that will cost a business in terms of trust, reputation and money.