Latest Updates

  • 2018 Bad Bot Report

    2018 Bad Bot Report

    The year bots went mainstream. What makes this report unique is its focus on bad bot activity at the application layer (layer 7 of the OSI model).

    Read Now
  • Enterprise Security Weekly with Rami Essaid29:53

    Enterprise Security Weekly with Rami Essaid

    Founder of Distil Networks, Rami Essaid is a passionate entrepreneur who has been building companies for over a decade. Disrupting industries with technological innovations is a personal mission. He j

    Watch Video
  • ×

    The Rise Of Machine Learning In Fraud Detection

    First Name
    Last Name
    Phone Number
    Company Name
    Thank you!
    Error - something went wrong!
  • Inside The 2018 Bad Bot Report6:21

    Inside The 2018 Bad Bot Report

    We're interviewing Anna from Distil Networks about the 2018 Bad Bot report. The interview covers what bots are doing new in 2018, and the latest from the report on new bad actor methods in web scrapin

    Watch Video
  • 2018 Bot Report Executive Summary

    2018 Bot Report Executive Summary

    Bad bots interact with applications in the same way a legitimate user would, making them harder to prevent. Bots enable high-speed abuse, misuse, and attacks on your websites and APIs.

    Read Now
  • Distil’s Bad Bot Report 2018: The Year Bad Bots Went Mainstream

    Distil’s Bad Bot Report 2018: The Year Bad Bots Went Mainstream

    This report is the bot mitigation industry’s leading study and analyzes hundreds of billions of bad bot requests to provide insight into the impact of bad bots on business today.

    Read Article
  • Anatomy of GiftGhostBot

    Anatomy of GiftGhostBot

    This infographic shows how the GiftGhostBot works, it's profile, scale and who it effects. Learn about this bad bot and how to detect and stop it.

    Read Article
  • New Year, New Threat: OWASP Denial of Inventory (OAT-021)

    New Year, New Threat: OWASP Denial of Inventory (OAT-021)

    Last month, OWASP released an updated version of their Automated Threat Handbook that includes Denial of Inventory (OAT-021).

    Read Article
  • Full Transcript and Video: GiftGhostBot Explained

    Full Transcript and Video: GiftGhostBot Explained

    Distil's Edward Roberts, Director of Product Marketing and Anna Westilius, Senior Director of Security explain GiftGhostBot, a sophisticated bot attack on gift card balances.

    Read Article
  • GiftGhostBot Explained49:13

    GiftGhostBot Explained

    So, now we're going to tell you about this attack that we coined "GiftGhostBot," and it's sort of the great gift card heist that we called in early 2017.

    Watch Video
  • Why Bots Pose an Increasing Challenge to Healthcare Organizations

    Why Bots Pose an Increasing Challenge to Healthcare Organizations

    A hacker can use a bot to access accounts and find test results; financial information such as bills; payments made through debit, credit or health savings accounts and more.

    Read Article
  • The Rise Of Machine Learning In Fraud Detection

    The Rise Of Machine Learning In Fraud Detection

    These days, automated attacks, and the speed with which attackers can modify their techniques to avoid detection, continue to put pressure on rule-based systems.

    Read Article
  • Scoot Airlines Safeguards Passenger-facing Systems with Distil Networks | Case Study

    Scoot Airlines Safeguards Passenger-facing Systems with Distil Networks | Case Study

    We compared different anti-bot solutions on separate websites. Distil blocked a far greater percentage of bad bots—more than 30%—than the other solutions we tried.

    Read Now
  • How to Block Bots From a Website

    How to Block Bots From a Website

    Bots can appear as normal users, with an IP address, browser and header data, and other seemingly identifiable information. But dig a bit deeper by collecting and reviewing in-depth analytics and othe

    Read Article
  • Gartner Report: How to Build an Effective API Security Strategy

    Gartner Report: How to Build an Effective API Security Strategy

    An API security strategy that manages access and protects systems from attack while still engaging digital ecosystems is essential to any API program.

    Read Article
  • Distil Networks-Akamai Integration

    Distil Networks-Akamai Integration

    The Distil Networks-Akamai Integration Guide, which provides general instructions for integrating Distil with Akamai’s CDN.

    Read Article
  • The Ultimate Guide to Preventing Denial-of-Service Attacks

    The Ultimate Guide to Preventing Denial-of-Service Attacks

    Every business must consider the issue and mitigate the causes of denial-of-service to ensure that web services are continuously available. Download this eBook to help you understand this problem

    Read Now
  • Biggest Holiday Season Concerns from Today’s Ecommerce Executives

    Biggest Holiday Season Concerns from Today’s Ecommerce Executives

    Some serious threats to this are distributed intelligent crawling and DDoS attacks. This is especially a concern as it can severely stress your infrastructure during an already high traffic period.

    Read Article
  •  The Dark Side of Vulnerability Scanning

    The Dark Side of Vulnerability Scanning

    Vulnerability scanners are used by security teams to find holes. But there’s a flip side - they can be used just as effectively (or even more so) by the “bad guys.”

    Read Article
  • Distil Networks: Block Bad Bots and Improve Web Security

    Distil Networks: Block Bad Bots and Improve Web Security

    Rami Essaid, Distil Networks’ CEO and co-founder, takes just three minutes to run through how Distil Networks can protect your web applications from bad bots, API abuse, and fraud.

    Read Article
  • Rami Essaid CEO of Distil Networks Interviewed on BizTalkRadio’s “The Big Biz Show”

    Rami Essaid CEO of Distil Networks Interviewed on BizTalkRadio’s “The Big Biz Show”

    Rami Essaid CEO of Distil Networks Interviewed on BizTalkRadio’s “The Big Biz Show”.

    Read Article
  • The Website Resiliency Imperative52:05

    The Website Resiliency Imperative

    Many posit that cloud architectures/business models will bring about a more patient, gradual availability model, where failures are either rendered unimportant because of mass replication or load shif

    Watch Video
  • loading
    Loading More...