Distil Stops 100% of the OWASP Top 20 Automated Threats

August 24, 2016 Edward Roberts

Automated threats on websites opens up many industries to exploitation of business processes including cyber-fraud. From banks to popular airlines, businesses are poised to lose millions in revenue if they’re not properly protected against these automated attacks. In layman’s terms, automated threats are those undertaken by bots. Thankfully, Distil Networks successfully stops all of the OWASP Top 20 automated threats! Read the following to learn the history behind these threats and how they can exploit your business, undermine your reputation, and affect revenue.


The Open Web Application Security Project (OWASP) established in 2001 to provide a free, and open, software security community. Their mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP provides an unbiased view of software development and does not endorse or recommend commercial products or services.

OWASP Top 10 Vulnerabilities

The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats.

OWASP Automated Threat Handbook

In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. The handbook breaks down the Top 20 automated threats into the following four main categories - Account Credentials, Payment Cardholder Data, Vulnerability Identification, and Other Automated threats.

Distil Stops 100% of the OWASP Top 20 Automated Threats

Complete Coverage with Distil Networks

Distil Networks offers protection from each of the 20 threats listed in the OWASP Automated Threats report. Simply put, all the threats listed are carried out by bots. And at Distil, we block bots!


About the Author

Edward Roberts

Edward Roberts leads Product Marketing and has over twenty years experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Software, a web security company.

More Content by Edward Roberts
Previous Article
Plagiarism in Politics and Content Scraping
Plagiarism in Politics and Content Scraping

Melania Trump’s speech at the RNC has come under fire for plagiarism. View more on politicians stealing con...

Next Article
Applied Behavior Analytics – A New 451 Research Whitepaper
Applied Behavior Analytics – A New 451 Research Whitepaper

A recent whitepaper from the 451 Group named us as the only company with positive feedback about the effect...