Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Incapsula Takes Aim at CloudFlare With Boosted Network Capacity

Incapsula, the cloud-based website performance and security service, today announced plans to significantly increase its infrastructure capacity throughout this year.

Incapsula, the cloud-based website performance and security service, today announced plans to significantly increase its infrastructure capacity throughout this year.

According to a company spokesperson, the investment is a move to take on competitor CloudFlare, which currently operates out of 24 data centers around the world and is used by more than 350,000 websites.

Marc Gaffan, Co-Founder and Chief Business Officer of Incapsula, told SecurityWeek that the company is not at liberty to publicly disclose the number of sites that use its services, but said they have “tens of thousands” of customers.

Incapsula, which now operates as a subsidiary of Redwood Shores, California-based Imperva, said it will increase its total Points of Presence (POPs) to 30 and increase its global coverage and network capacity to exceed 1.5 Tbps.

During Q1 2014, Incapsula activated new data centers in Seattle, Dallas, and Paris. The company said more would be coming online in Toronto, Mexico City, Madrid, Lima, Seoul, Stockholm, Warsaw and other major cities around the world.

Additionally, each of Incapsula’s POPs will be upgraded to cache 30 times more than its current capacity.

The company also said that it is building several “Mega POPs” in each region to deal with the largest possible attacks.

While an increased number of POPs is always a positive, judging the performance and capacity of a CDN simply on the overall number of POPs is unreasonable. There are many factors to consider such as the available bandwidth, server capacity and configuration of each POP, along with the protocols, technologies and features supported.

Advertisement. Scroll to continue reading.

Incapsula said its network capacity expanded by 500 percent in 2013, and that it would almost double its global network from 16 to 30 high-powered data centers during the rest of 2014.

“Website and cloud application performance are as critical as they have ever been, and security challenges show no signs of abating,” said Gur Shatz, co-founder and CEO at Incapsula.

According to a recent report from Neustar, the number of DDoS attacks jumped significantly in 2013, and dealing with them was not cheap. In a survey of 450 companies in North America across various verticals, 60 percent reported experiencing a DDoS attack in 2013, up from just 35 percent in 2012. Overall, these attacks  did not last as long: 77 percent reported the attacks lasted less than a day, compared to 63 percent in 2012. Less than two percent reported the attacks lasting a week, compared to 13 percent in 2012.

According to DDoS protection firm Black Lotus, new distributed reflected denial-of-service (DrDoS) threats could lead to attacks in excess of 800 Gbps during the next 12 to 18 months.

Additionally, a recent report from Imperva highlighted increased activity of hacker-owned bots, used for corporate espionage, website hijacking and data theft.

A recent report from Distil Networks found that bad bot traffic nearly doubled as a percentage of all Web traffic during 2013, from 12.25 percent to 23.6 percent. The biggest offender was the notorious Pushdo botnet, which is believed to have infected 4.2 million IPs.

Incapsula has found that in 2013, malicious bots accounted for over 31 percent of all Internet traffic.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

OT zero trust access and control company Dispel has appointed Dean Macris as its CISO.

Cloud identity and security solutions firm Saviynt has hired former Gartner Analyst Henrique Teixeira as Senior Vice President of Strategy.

PR and marketing firm FleishmanHillard named Scott Radcliffe as the agency's global director of cybersecurity.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...