• DDoS Prevention Research

    Cyber criminals don't keep regular hours. They work around the clock to find and exploit holes in your network and that is why DDoS prevention is so important. Read the latest research to understand the current threat landscape and how to stop DDoS attacks.

  • 2017-2018 Global Application & Network Security Report

    Featured Research

    Cyber-Security Pushed to the Limit

    Bitcoin, Ransom Attacks and AI Take Over

    What's driving cyber-security attacks today? The answer is simple – cyber-crime. Financially motivated attacks have security organizations scrambling resources and technologies to keep up defenses. But gaps still exist. Read Radware's "2017-2018 Global Application & Network Security Report" to learn more.

    Download the Report
  • As we see more and more attacks of all types, we have an obligation to share this knowledge with our customers so that everyone can be as vigilant as possible. We know that attackers are focused on their 'job' 100% of the time. Staying abreast of changes in attack patterns, objectives and execution is something that must remain 'on' at all times."

    Director of Network Engineering, ServerCentral
  • Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS


    Cyber ransom attacks are on the rise. This eBook outlines the current threat environment/attack tools and why ransom attacks are growing in popularity. It provides the reader with an overview of likely targets and how to prepare for such an attack.

    Download Report
    Security and the C-Suite: Threats and Opportunities


    Radware interviewed 200 IT executives in the U.S. and U.K. to understand to understand what cyber security threats concern C-level executives the most and identify opportunities for improving defenses.

    Download Report
    Opportunities, Threats and Security Strategies for Online Business


    Whether you are a Fortune 500 ecommerce company or a mid-sized organization delivering B2B services in a Software-as-a-Service model, one fact is undeniable: you rely on the Internet and many network-based services to operate. You are an online business.

    Download Report
    Reverse Engineering a Sophisticated DDoS Attack Bot


    In June 2015, Radware’s Emergency Response Team (ERT) detected a Tsunami SYN Flood attack against a customer. Radware’s Security Researchers obtained a sample of this malware binary and deployed it in an isolated and controlled environment. This report analyzes the DDoS for hire marketplace, attack sources and tools, and reviews overlooked security vulnerabilities and best practices.

    Download Report
    DDoS Handbook


    The ultimate guide to DDoS attacks and DDoS prevention. Learn how to stop DDoS attacks with expert advice, actionable tools and tips to help detect attacks.

    Download Report
    Optimizing DDoS Mitigation Using Hybrid Approaches


    One promising area of development is the use of hybrid defense approaches that will become more prevalent as organizations seek to defend against all vectors of DDoS attacks and as service providers and product vendors work more closely.

    Download Report
    2014-2015 Global Application & Network Security Report


    2014 was a watershed year for the security industry. Cyber-attacks reached a tipping point in terms of quantity, length, complexity and targets. Even organizations with by-the-book security programs can be caught off guard. This report provides best practices for organizations to consider when planning for cyber-attacks in 2015.

    Download Report
    Automating Defenses Against Increasingly Sophisticated DDoS Attacks


    The distributed denial-of-service (DoS) landscape has rapidly evolved in the last few years, and attackers have become much more sophisticated. Read this Heavy Reading paper and learn more about the changing landscape as well as the need for fast and fine-grained automatic mitigation solutions.

    Download Report