Secure64 Deflects Denial-Of-Service Attack That Takes BIND-Based Appliance Down
Greenwood Village, CO – December 19, 2014 — Secure64®, the security company at the core of the internet, announced today that its DNS Authority product continued uninterrupted during a distributed-denial-of-service (DDoS) attack at one of its largest customers. The DDoS attack, which was characterized as a TCP SYN flood attack, brought down one of the leading BIND-based DDI appliance vendors products for over four hours while the Secure64 DNS Authority product performed flawlessly.
The customer, a Fortune 20 technology and services company, acquired and deployed Secure64’s DNS Authority and DNS Manager products in early 2014. The deployment was part of its DNS brand diversity strategy to prevent a security vulnerability in a single product from taking down all customer-facing and mission-critical DNS services.
The client’s DNS brand diversity strategy provided a quick payback as Secure64’s DNS products continued to provide critical DNS services during the attack. Secure64 incorporates multi-level security at the hardware, operating system and DNS application layers in their DNS Authority and DNS Cache appliances that automatically detect and block DDoS attacks such as TCP SYN floods, DNS amplification, DNS reflection, cache poisoning, pseudo random subdomain and many more without requiring any external security hardware and/or protection services.
Concurrently, Secure64 is pleased to announce the release of its two newest products:
Infoblox Connector for Secure64 DNS Authority
Both support the “genetic and vendor diversity” strategy that many of our clients demand for mission-critical systems that manage the heart of the internet—the DNS.
About Secure64 Software Corporation