<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">
The Pros & Cons of Self-administered BGP Diversion

The Pros & Cons of Self-administered BGP Diversion

Should network owners count on third parties - and in this case Nexusguard - in provisioning for and executing network traffic route diversions? That’s not a loaded question. While we absolutely possess the experience and hands-on skills the network owner can trust, many network owners may still ..

Read More >

All White Papers

    21 April, 2020,

    The Pros & Cons of Self-administered BGP Diversion

    Should network owners count on third parties - and in this case Nexusguard - in provisioning for and executing network traffic route diversions? That’s not a loaded question. While we absolutely possess the experience and hands-on skills the network owner can trust, many network ... Learn More

    InfraProtect vs Origin Protection - A Comparison Guide

    InfraProtect and Origin Protection provide on-demand attack mitigation, protecting your infrastructure (and downstream) against network DDoS attacks of all sizes and types. Both solutions prevent valuable bandwidth from being saturated with malicious traffic and help maintain ... Learn More

    Move up the cybersecurity value chain

    Over the last decade, DDoS attack has evolved to become one of the biggest cyber threats to network infrastructure, causing more service outages than ever. Because of their large attack surface, communications service provider (CSP) networks are often the prime target for ... Learn More

    Turn DDoS challenge into opportunity for CSPs

    Faced with evolving DDoS attack patterns and tactics that are more difficult to detect and mitigate, communications service providers (CSPs) are presented with a dilemma. Should they just pass on the attack traffic, knowingly or unknowingly, to the victim customer? Rather than a ... Learn More

    Origin Protection for Large Networks

    Protecting a network from malicious and attack traffic is what we are committed to doing to our best at Nexusguard. Our Origin Protection (OP) is architected to protect backend networks. But for enterprises or organizations managing a vast network, such as those managing ... Learn More
    6 September, 2018,

    DDoS Survival Guide

    DDoS attacks could come in various forms that debilitate your entire national internet infrastructure and lead to severe aftermath. Almost anyone can fall victim to a DDoS attack but not everyone know how to defend it. Read our DDoS Survival Guide to help you and your team to ... Learn More

    Understanding Mitigation for Modern DDoS Attacks

    DDoS attacks have real financial and operational costs. Fortunately, there are several ways to mitigate an attack. Learn about the benefits and limitations of various mitigation solutions, how DDoS attacks have changed in recent years, and the steps you should take to keep your ... Learn More

    Surviving GDPR Means Success in New Internet Era

    Effective from 25 May 2018, the General Data Protection Regulation (GDPR) imposed by the European Union (EU) is undeniably daunting and part of it is deliberately vague for online businesses to comply with. Generally speaking, the legislation empowers web users from the EU to ... Learn More
    23 May, 2018,

    DNSSEC: The Global Chain of Trust

    Often described as the Internet phonebook, DNS is fundamentally important to the Internet. DNS also inherits various design, implementation and configuration vulnerabilities. One of those is the threat of DNS cache poisoning, which needs another security protocol, known as DNS ... Learn More
    13 October, 2017,

    DDoS Mitigation

    As enterprises and organizations, no matter big or small, increasingly rely on uninterrupted online presence, the impact of DDoS attacks cannot be neglected. They can cause network, server and application downtime, and sometimes service degradation, which can cause direct ... Learn More
    16 September, 2017,

    The Omnipresence of IoT Poses Unprecedented Challenges for Cybersecurity

    As the Internet of Things (IoT) evolves and expands into different territories of daily life, the potential surface for DDoS attacks—sometimes combined with infiltration attempts—is growing exponentially. As these devices are generally designed with lightweight security, ... Learn More
    5 August, 2017,

    PCI

    The Significance of Being a PCI-Certified Service Provider

    The Payment Card Industry (PCI) Security Standards Council recognizes Nexusguard as a PCI-certified service provider (SP) (Level 1) for scenarios in which a merchant processes, stores, and/or transmits credit card data and sensitive information on the Nexusguard infrastructure. ... Learn More

    CDN, load balancing and caching

    In Nexusguard’s multilayered DDoS mitigation platform, the global CDN infrastructure with load balancing and caching capabilities plays a crucial role in cushing off the impact of large, volumetric attacks while ensuring fast content delivery and network resilience. Learn More
    3 June, 2016,

    SSL

    Mitigating SSL Attacks Without Private Keys

    While most clients trust Nexusguard to look after private keys, some due to regulatory requirements or internal security policies—prefer not to turn over their private key to a third-party vendor. To address their concern, Nexusguard can make use of separate key pairs to examine ... Learn More

    Best Practices for Traffic Log Collection

    The collection and storage of log data is integral to Nexusguard’s comprehensive mitigation and analysis processes. The purpose is to know what is going on within the network in order to better detect and mitigate attack traffic. This White Paper addresses the most common ... Learn More
    22 May, 2016,

    SSL

    Nexusguard Secured SSL Key Management Infrastructure

    Secure Sockets Layer (SSL) encryption technology was developed to make the Internet a safer place for exchanging private information. Essentially, SSL creates an encrypted connection between a web server and an end-user’s browser, making Internet traffic undecipherable to ... Learn More

    The Hidden Danger Behind DDoS Attacks

    As DDoS attacks continue to evolve in scale, frequency and sophistication, they are increasingly used to disguise more serious forms of cybercrime. The financial services sector is a prime target of DDoS attacks, as witnessed by a series of high profile hits on major Wall Street ... Learn More
    Load More