Telstra launches web infrastructure protection

Telstra International has launched its Global Distributed Denial of Service (DDoS) Protection service to secure multinational enterprise and network operator customers from a range of infrastructure threats.

Telstra said the service offers ‘in the cloud’ protection and mitigation of DDoS attack traffic, as well as protection of web infrastructure from congestion.

“Most global organisations today are reliant on constant online availability,” said Telstra International’s director of marketing Nathan Bell. “This solution helps to avoid disruption and mitigate unexpected costs through a resilient protection service. DDoS attacks have increased tenfold since 2005. As they have also become increasingly targeted, security has rapidly become a boardroom issue.”

He said Telstra can offer to integrate the service seamlessly with customer IT systems, and support those systems further by means of the company’s Security Operations Centre (SOC) and round-the-clock monitoring and threat analysis.

Analyst firm Infonetics said deployment of DDoS prevention appliances and measures has been increasing rapidly, now a basic requirement to protect enterprise and carrier data centres, mobile networks, carrier transport and wired broadband networks, and government networks from a range of threats.

"Without a doubt, the number-one driver for the DDoS prevention market is the attacks themselves,” said Jeff Wilson, principal analyst for security at Infonetics. “From the Iranian elections, to Wikileaks and the Anonymous army attacking anything with a whirring fan, DDoS attacks have been big news for the last two years. The rise of botnets and easy-to-use tools for launching attacks means that there are more DDoS attacks pushing greater volumes of traffic, initiated by a wider variety of attackers than ever before. As a result, the market for DDoS prevention is growing fast, particularly in the mobile network segment, which will see the most explosive growth as it rides the compound wave of a transition to IP and data, massive increases in capacity, and a new role as a juicy and highly visible target for attacks."

We use cookies to provide a personalized site experience.
By continuing to use & browse the site you agree to our Privacy Policy.
I agree