Web Security

Businesses and hackers are in a constant, ruthless arms race. To protect customer data, site availability, and your brand reputation, you must always be one step ahead of attackers with the most up-to-date solutions for each critical endpoint.

Explore our full library

slider item
Identity & Access Management (IAM) Passwordless Authentication
Dror Arie, Head of Engineering @ GlobalDots 25.08.21

Passwords are obsolete. Memorizing long and complicated passwords has been holding back businesses for over 50 years, while cyberattacks are evolving every day. ¹ In fact, Google has registered over 2 million phishing sites as of January 2021. The figure is up from 1.7 million in January 2020, a 27% increase year on year. ² […]

Read more
API Vulnerability Exposes COVID Vaccination Status of All Israeli Citizens
API Security
Dror Arie, Head of Engineering @ GlobalDots 17.08.21

Returning from my vacation abroad, I had to fill out a COVID declaration form on the Israeli Health Ministry website. Something looked weird when I filled it out on my mobile: It was too quick to indicate that I’m vaccinated, and this output came up even with a typo in my passport number. Hence I […]

Read more
The GlobalDots-Cloudflare SOC Offering on the News
SOC as a Service
Li-Or Amir 14.07.21

Cloudflare recently announced its new SOC as-a-service offering, in partnership with GlobalDots and 3 additional global partners. With GlobalDots, this offering will include a full suit of web security solutions, implemented and configured by the GlobalDots engineering team. The GlobalDots team will also provide advanced support and professional services to the Cloudflare products included. Read […]

Read more
GlobalDots & Cloudflare Introduce SOC-as-a-Service
SOC as a Service
Francesco Altomare, Southern Europe Regional Manager @ GlobalDots 26.05.21

The increasing difficulty in recruiting in-house security engineers has created a wide demand for Security Operation Centers as-a-service, especially in fast-growing organizations. “It’s hard to overstate the extent to which online has become the most important channel for many businesses,” says CloudFlare. “Dealing with today’s volume of data, you need a reliable mechanism to sift […]

Read more
DDoS (Distributed Denial of Service) Explained
DDoS Protection
Francesco Altomare, Southern Europe Regional Manager @ GlobalDots 21.04.21

DDoS Mitigation & Protections services are a crucial part of any internet business strategy. At GlobalDots we analyze, implement and maintain Security for variety of companies, from Fortune 500 to startups and small-to-medium enterprises. Since the topic is broad and many of our customers ask very specific questions, we decided to put together this resource […]

Read more
Solution Brief: Passwordless Authentication
Passwordless Authentication Zero Trust Access Management
Admin Globaldots 13.04.21

Part with unsecure password lists, password management and forgotten passwords. Passwordless authentication allows easy access to all business apps with a single tap on your chosen device. This solution brief includes top features, capabilities, and benefits. Fill out the form to get your copy.

Read more
Webinar: Defending eCommerce from Next-Gen Identity Fraud
Bot Mitigation & Anti-Fraud
Dr. Eduardo Rocha, Senior Solutions Engineer & Security Analyst @ GlobalDots 12.04.21

Fill out the form to watch now. Following the 2020 uptick in eCommerce traffic and offers, automated fraud has become overwhelmingly sophisticated. As they manage to impersonate human behavior while stealing and abusing user credentials, “bad bots” become harder to differentiate from real users. Hence the pressing need of retailers to augment their security postures, […]

Watch more
Forrester Wave™ DDoS Mitigation Solutions, Q1 2021
DDoS Protection
Dr. Eduardo Rocha, Senior Solutions Engineer & Security Analyst @ GlobalDots 11.04.21

The recent Forrester Wave report has named GlobalDots’ prominent partners Akamai Technologies, Radware, Cloudflare & Imperva as leaders in the Bot Mitigation product category. Vendors were evaluated by 28 criteria concerning current offering, strategy, and market presence. What are the core strengths of each vendor? And how did the world’s 3 biggest cloud providers (AWS, Microsoft & Google) […]

Read more
8 Best Practices for a DDoS Protection Plan
DDoS Protection
Dror Arie, Head of Engineering @ GlobalDots 11.04.21

When a DDoS attack strikes, panic ensues. Having a DDoS mitigation plan in place will make the difference between hours or days of organization-wide chaos and an orderly and timely response that keeps business as usual. Follow these steps to develop a DDoS mitigation plan for your organization. Fill out the form to get your […]

Read more
Ebook: How to Evaluate a Solution for Bot Management and Mitigation
Bot Mitigation & Anti-Fraud
Dr. Eduardo Rocha, Senior Solutions Engineer & Security Analyst @ GlobalDots 08.04.21

In this e-book, you’ll learn that as bots become more sophisticated, a single method of managing bots – namely, blocking – simply cannot cover all of the different types of bots that are interacting with your web applications. What’s more, botnets can evolve their bots over time, so while their first attempt may be successfully […]

Read more
Top Strategies for API Security
API Security
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 08.04.21

The explosion of consumer mobile adoption, digitization of goods and services, and an increase in data generation have driven a change in the way Internet-based businesses are built and consumed. The digital economy has prompted online organizations to facilitate the creation and exchange of information to new channels, partners, and developers with the goal of […]

Read more
How to Stay Protected From Credential Stuffing
Bot Mitigation & Anti-Fraud
Nesh (Steven Puddephatt), Senior Solutions Engineer @ GlobalDots 08.04.21

For any organization at risk for credential stuffing attacks, its ability to effectively mitigate these attacks will depend on more than the bot management vendor or solution selected. How your website is architected will play a critical role in the effectiveness of any security solution. To understand why, consider how these attacks work, and how […]

Read more
4 Common Cloud Vulnerabilities that Lead to Data Breach
API Security
From our Partners 18.02.21

4 Common Cloud Vulnerabilities that Lead to Data Breach

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo