4 Steps to Be Prepared for Ransom DDoS Attacks

Presented by

Ezer Goshen, VP Business Development (Radware); Eva Abergel, Product Marketing Manager (Radware)

About this talk

Ransom DDoS attacks are becoming more and more popular as a form of online extortion. Many opportunist hackers are looking for new ways to earn money while threatening to impact organizations’ service availability. With the holiday season coming up, many organizations, including retailers, ecommerce, and financial services, simply cannot afford to lose the availability of their assets and negatively impact the SLA to their customers. Even just a minute of downtime can have meaningful negative impact on revenue and reputation. In this webinar, we will cover four steps that any organization can take ahead of time, to make sure they are protected from Ransom DDoS attacks.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (346)
Subscribers (52330)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.