The CDN provider's new DDoS scrubbing offering impersonates the customer’s network to phase out malicious traffic, and employs advanced IP masking at source to prevent direct-to-origin attacks. Credit: Igor Stevanovic / Getty Images Content delivery network (CDN) service provider Edgio has added a new Distributed Denial of Service (DDoS) scrubbing ability along with improved Web Application and API Protection (WAAP) to its network security offering.Designed to reduce severe damages from sophisticated DDoS attacks, Edgio’s scrubbing solution impersonates the customer’s network by routing the customer’s IP traffic through its scrubbing point-of-presence (PoP) and only sending the “clean” traffic back to the customer’s infrastructure, according to Richard Yew, senior director, product management for Security at Edgio.A PoP is the point at which two or more different networks or communication devices build a connection with each other. “Companies like Edgio are always working to push the bar forward with mitigating DDoS attacks, while the bad guys continue to advance their bot armies — both in complexity and in sheer numbers,” said Chris Steffen, research director at analyst and consulting firm Enterprise Management Associates. “When coupled with threat detection and API protection, Edgio’s solution will provide some interesting choices for customers dealing with continued DDoS attacks and API vulnerabilities.” Edgio’s scrubbing extends to origin serversA typical DDoS attack has an attacker holding a business’ system, website or network hostage by overwhelming it with a large volume of requests, making it unavailable to legitimate users. The attack uses multiple compromised devices, referred to as bots or zombies to effect simultaneous requests.There are, however, other types of DDoS attacks that target the origin servers or IP addresses of a website or application, instead of targeting the front-end infrastructure or CDN. These are called direct-to-origin attacks. Edgio’s new scrubbing capability promises protection at the source level against attacks from the non-web applications via a dedicated scrubbing capability that uses standard protocols such as Border Gateway Protocol (BGP) and generic routing encapsulation (GRE) tunnel for masking the original IP packets.“Coupling DDoS scrubbing with edge/CDN-based DDoS protection ensures we provide 100% protection against all forms of DDoS attacks today,” Yew said.Outbound rule customizer and proxy detection Edgio has also added a set of improvements to its WAAP, which include advanced rule customizer, outbound data leak prevention, proxy detection, enhanced configurability and regional code support for geopolitical compliance.Conventionally, security rules are designed to inspect inbound requests to mitigate application attacks from the inside-in, lacking the outbound visibility. Therefore, Edgio has added the ability for security rules to scan outbound traffic as well, preventing data and code leakage.“Controlling outbound traffic is critical — one of the most significant control gaps there is, and continues to be the cause for abuse of APIs and the sensitive traffic that uses them,” Steffen said. “Controlling that traffic (or — in the very least — having visibility to that traffic) is an important step on gaining control of data in motion, regardless of the source.”Outbound rules typically have higher computational costs and tend to add too much latency if done via a point solution that’s not edge based, according to Yew. Edgio has also added the ability to detect and block requests originating from anonymous proxies, providing additional control on the access to customers’ applications. The enhanced configuration management will enable developers to directly import and export configuration JSON via both API and UI to protect new applications.Edgio’s clients can also control access to their applications via new advanced access control rules like regional control down to specific regions and provinces. Related content news Consolidation blamed for Change Healthcare ransomware attack United HealthGroup said it has already taken $872 million in dealing with the attack and the disruption it caused. By John Leyden Apr 18, 2024 5 mins Ransomware Cyberattacks feature Are you a toxic cybersecurity boss? How to be a better CISO Horrible bosses are everywhere but cybersecurity appears to be particularly problematic, leading to talent-retention issues and security risks. Here’s how not to be a toxic CISO. By Christine Wong Apr 18, 2024 9 mins CSO and CISO Human Resources Risk Management news analysis AWS and Google Cloud command-line tools can expose secrets in CI/CD logs Cloud vendors say it is up to users to ensure sensitive command outputs are not saved in logs By Lucian Constantin Apr 17, 2024 4 mins Cloud Security Data and Information Security news SAP users are at high risk as hackers exploit application vulnerabilities Research highlights heightened threat actor interests in SAP systems, targeting poorly patched organizations. By Shweta Sharma Apr 17, 2024 4 mins Application Security Vulnerabilities PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe