Prolexic, a provider of Distributed Denial of Service (DDoS) protection services, stated that it helped virtual credit card website EntroPay recently ward off a high-volume Layer 4 DDoS attack.
The Entropay website lets users open and fund an account to get hold of a prepaid Visa card accepted by millions of merchants worldwide. It is seen by customers as a safe, flexible and instantaneous way of making and receiving online payments.
Like any website whose popularity surges, Entropay, too, faced several forms of DDoS denial of service attacks; a recent attack brought the site for a considerable amount of time. Entropay reportedly deployed a hardware mitigation appliance offered by its ISP but DDoS attack with a traffic volume exceeding the appliance’s limit of 100Mbps thwarted the site’s new defenses.
Prolexic’s PLXrouted service was then chosen to help Entropay withstand these types of high-volume DDoS attack. As of now, Prolexic technicians aided by Prolexic’s advanced solutions were able to keep Entropay safe from a wide range of attack types – SYN Flood, ICMP Flood, UDP (News - Alert) Flood – in various durations including a Layer 4 DDoS attack peaking at 700 Mbps.
Prolexic claimed that its DDoS mitigation services are different – they have more capacity, they’re implemented in minutes and they stop all attacks. Hackers will immediately realize the traffic has been rerouted through its DDoS mitigation network and often abandon an attack at once, realizing they’re no match for Prolexic’s live, expert DDoS mitigation personnel.
Said Stuart Scholly, president of Prolexic: “The first half of 2012 has seen an increase in the number and size of DDoS attacks on financial industry websites. The recent attacks against EntroPay.com are no surprise in light of the escalating activity against the financial industry.”
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2012, taking place Oct. 2-5, in Austin, TX. Stay in touch with everything happening at ITEXPO (News - Alert). Follow us on Twitter.
Edited by Braden Becker