Incapsula, the cloud-based website performance and security service, today announced plans to significantly increase its infrastructure capacity throughout this year.
According to a company spokesperson, the investment is a move to take on competitor CloudFlare, which currently operates out of 24 data centers around the world and is used by more than 350,000 websites.
Marc Gaffan, Co-Founder and Chief Business Officer of Incapsula, told SecurityWeek that the company is not at liberty to publicly disclose the number of sites that use its services, but said they have “tens of thousands” of customers.
Incapsula, which now operates as a subsidiary of Redwood Shores, California-based Imperva, said it will increase its total Points of Presence (POPs) to 30 and increase its global coverage and network capacity to exceed 1.5 Tbps.
During Q1 2014, Incapsula activated new data centers in Seattle, Dallas, and Paris. The company said more would be coming online in Toronto, Mexico City, Madrid, Lima, Seoul, Stockholm, Warsaw and other major cities around the world.
Additionally, each of Incapsula’s POPs will be upgraded to cache 30 times more than its current capacity.
The company also said that it is building several “Mega POPs” in each region to deal with the largest possible attacks.
While an increased number of POPs is always a positive, judging the performance and capacity of a CDN simply on the overall number of POPs is unreasonable. There are many factors to consider such as the available bandwidth, server capacity and configuration of each POP, along with the protocols, technologies and features supported.
Incapsula said its network capacity expanded by 500 percent in 2013, and that it would almost double its global network from 16 to 30 high-powered data centers during the rest of 2014.
“Website and cloud application performance are as critical as they have ever been, and security challenges show no signs of abating,” said Gur Shatz, co-founder and CEO at Incapsula.
According to a recent report from Neustar, the number of DDoS attacks jumped significantly in 2013, and dealing with them was not cheap. In a survey of 450 companies in North America across various verticals, 60 percent reported experiencing a DDoS attack in 2013, up from just 35 percent in 2012. Overall, these attacks did not last as long: 77 percent reported the attacks lasted less than a day, compared to 63 percent in 2012. Less than two percent reported the attacks lasting a week, compared to 13 percent in 2012.
According to DDoS protection firm Black Lotus, new distributed reflected denial-of-service (DrDoS) threats could lead to attacks in excess of 800 Gbps during the next 12 to 18 months.
Additionally, a recent report from Imperva highlighted increased activity of hacker-owned bots, used for corporate espionage, website hijacking and data theft.
A recent report from Distil Networks found that bad bot traffic nearly doubled as a percentage of all Web traffic during 2013, from 12.25 percent to 23.6 percent. The biggest offender was the notorious Pushdo botnet, which is believed to have infected 4.2 million IPs.
Incapsula has found that in 2013, malicious bots accounted for over 31 percent of all Internet traffic.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
