Hi [[ session.user.profile.firstName ]]
Sort by:
    • Pulsar 2.0: Leveraging Real-Time Data for Optimal Traffic Routing
      Pulsar 2.0: Leveraging Real-Time Data for Optimal Traffic Routing James McCarthy, Director of Solutions Engineering Recorded: May 16 2018 4:00 pm UTC 48 mins
    • If used correctly, Real User Monitoring, or RUM, can deliver immediate performance results and greatly improve user experience. However, implementing RUM and actually realizing these improvements can be a challenging project without clear direction - How do you collect the data? How do you use the data? How do you keep the data secure?

      In this webinar, we introduce Pulsar, NS1's advanced RUM engine. Pulsar seamlessly integrates with our DNS platform so you can quickly and easily enable granular, automated, and optimized traffic routing.

      We'll also cover:

      - NS1's Filter Chain - our point and click traffic management technology
      - Demonstrate how to leverage Pulsar with the Filter Chain
      - Understanding "Best Practices" when combining the Pulsar filter with other filters
      - Using NS1's community cloud & CDN data or bringing your own data

      Read more >
    • easyJet’s Journey to Protect Their Booking Engine from Unwanted Traffic
      easyJet’s Journey to Protect Their Booking Engine from Unwanted Traffic Sean O'Neill, Editor in Chief & Moderator Tnooz, Gene Quinn, Co-Founder & Producer Tnooz Recorded: Dec 28 2016 4:40 pm UTC 41 mins
    • Did you know 30% of travel industry website visitors are unsavory competitors, hackers, spammers, and fraudsters?

      Worse yet, unwanted traffic from web-scraping bots can negatively impact revenue management targets and yields across multiple distribution channels. Join Anthony Drury, Director, Head of Business, at easyJet, as he takes you through his strategy to ensure easyJet customers -- wherever they are booking -- get price and availability content through approved API channels. The approach of easyJet ensures that all bookings are screened for fraudulent activity and blocks are added to restrict screen scraping.

      Watch the reply to learn how to:

      - Eliminate the cascading negative effects of screen-scraping bots
      - Optimize revenue while simultaneously improving the customer experience
      - Strengthen travel industry partnerships by creating a level playing field
      - Improve website KPIs like look-to-book ratios, SEO page rank, cross-selling/up-selling, site speed and conversion rates

      Read more >
    • The Security Risks of Orphaned Network Traffic
      The Security Risks of Orphaned Network Traffic João Gouveia, CTO, AnubisNetworks Recorded: Aug 10 2016 3:00 pm UTC 47 mins
    • As part of our research work focused on identifying automated network traffic that we can relate with malicious behavior and botnet communications, we often come across with traffic not necessarily related to malicious intent, but that represents a high risk for the companies allowing it to occur on their networks.

      Often associated with abandoned ware, policy control failures, or miss configurations, these traffic patterns end up exposing company information and assets to multiple risk levels.

      On this webinar, we are going to explore this byproduct of our botnet research, how widespread this problem is, how we can use this to relay risk information to companies, and the several degrees of exposure and impact that this type of traffic can represent.

      Read more >
    • Next Generation DNS: Using Your Data to Steer Traffic with NS1
      Next Generation DNS: Using Your Data to Steer Traffic with NS1 James McCarthy, Director of Solutions Engineering Upcoming: Aug 8 2018 4:00 pm UTC 30 mins
    • You know your infrastructure best, and chances are you’re already carefully monitoring the health and usage of your systems.

      Join us to learn how to use NS1's next-generation DNS to connect with external data sources, monitoring providers and even your own tools to ingest existing application health and infrastructure telemetry, leveraging your data in real-time to drive traffic management.

      In this webinar we'll cover:


      - Why DNS is perfect for making traffic management decisions
      - How NS1 makes it easy to leverage metrics for traffic steering
      - How using Pulsar, NS1’s RUM-based decision-making engine, can take your application’s performance to the next level.
      - Best practices and example configurations

      Read more >
    • Account Takeovers | Is Your Retail Website Safe?
      Account Takeovers | Is Your Retail Website Safe? Thomas Platt, Traffic Management and Web Security Expert Recorded: Jun 21 2018 10:35 am UTC 32 mins
    • Account takeover fraud isn’t going to stop and the tactics engaged by cyber criminals are becoming more sophisticated every day. The retail market is heavily targeted by criminals and in 2016 alone there were over 3 billion credentials stolen with malicious intent.

      A growing number of high profile retailers have suffered from data breaches in the last year alone, leading to Verizon noting account takeovers as the biggest threat to web applications today.

      An account takeover can have a butterfly effect with credential stuffing leading to brute force attacks, identity theft and huge financial and reputational losses. If your website has a login page, there will be malicious bots attacking your page right now, trying to create and exploit security weaknesses.

      How TrafficDefender can help

      At TrafficDefender our experts beat the bots every day to ensure our clients are always one step ahead of criminal traffic.

      This webinar provides insight into the rise of account takeover attacks in the retail industry and what steps you need to implement to defend against the trillion pound cyber-crime industry.

      Watch the recording to learn more about:

      - The rise of account takeover attacks in the retail market.
      - The anatomy of an account takeover attack.
      - Best practice for identifying and preventing malicious bots from cracking customer accounts.

      Read more >
    • Account Takeovers | Are You A Victim Or An Enabler?
      Account Takeovers | Are You A Victim Or An Enabler? Thomas Platt, Traffic Management and Web Security Expert Recorded: May 1 2018 11:40 am UTC 25 mins
    • We’re nearly half way through 2018 and a week away from GDPR coming into force. With this in mind – how does GPPR and Account Takeovers affect you?

      As a business you are directly affected if your customer’s details are hacked and you could be faced with compensating or losing affected customers. At a minimum you would be expected to honour or reimburse any points that had been illegitimately redeemed.
      A data breach at another company could result in the stolen user names and passwords being used on mass by millions of bots around the world to probe other sites to look for matching combinations and gain access to those accounts.

      With GDPR coming into force this month, businesses with consumers in the EU are required to put reasonable protection in place to protect data. This includes proactively preventing attacks and putting measures in place against large scale brute force attacks.

      How TrafficDefender can help:
      As experts in automated traffic and cyber security, we have developed software to identify and manage malicious traffic and block account takeovers.

      Please join us to learn more about:
      How GDPR affects account takeovers
      The rise in account takeover attacks
      The anatomy of an account takeover account
      Best practice for identifying and preventing malicious bots from cracking customer accounts

      Read more >
    • Under the Hood: How to Responsibly Decrypt & Inspect Encrypted Traffic
      Under the Hood: How to Responsibly Decrypt & Inspect Encrypted Traffic Ken Dang Recorded: May 8 2018 6:00 pm UTC 64 mins
    • Encrypted traffic is a key battleground for today’s security-conscious organizations. But how and where to fight is not always clear or easy to execute. Join SonicWall for a “fireside chat” to gain a clear understanding of how to establish a security model that can decrypt and inspect encrypted traffic without degrading performance or damage trust.

      Register now for this informal Q&A session that will provide a platform to answer your most pressing questions regarding encrypted attacks and how to responsibly and efficiently decrypt SSL and TLS traffic. This session will:

      • Outline the benefits of inspecting SSL/TLS traffic
      • Explain how to block encrypted malware downloads, including ransomware and zero-day cyberattacks
      • Demonstrate how to set up a typical next-generation firewall with DPI-SSL capabilities
      • Customize inclusion and exclusion lists for compliance or legal requirements
      • Operate a required system digital certificate store

      Read more >