Prolexic Technologies

(Redirected from Prolexic)

Prolexic Technologies was a US-based provider of security solutions for protecting websites, data centers, and enterprise IP applications from Distributed Denial of Service (DDoS) attacks at the network, transport, and application layers. It operated a DDoS mitigation platform and a global network of traffic scrubbing centers. Real-time monitoring and mitigation services were provided by a 24/7 security operations control center (SOCC). Prolexic indicated its DDoS mitigation services make websites, data centers and enterprise IP applications harder to take down via DDoS attacks.[1]

Prolexic Technologies, now part of Akamai
Company typeSubsidiary
IndustryInformation technology and services
Founded2003
Headquarters,
Area served
Worldwide
ParentAkamai Technologies
Websitewww.prolexic.com

In February 2014, cybersecurity and cloud services company Akamai Technologies acquired Prolexic Technologies.

History

edit

In 2003 Prolexic Technologies was founded by Barrett Lyon and was the subject of the book Fatal System Error by Joseph Menn. Prolexic protects organizations in the following markets: airlines/hospitality, e-commerce, energy, financial services, gambling, gaming, public sector, and software as a service. Sony is said to be a customer of the company.[1][2] Prolexic claims some of the largest banks as its clients.

In 2005, the company was named one of the 100 Hottest Private Companies in North America by Red Herring.[3]

Prolexic was acquired by Internet content delivery network Akamai Technologies in a $370 million deal completed in February 2014.[4]

Financial history

edit

In 2011, Prolexic completed two financing rounds led by Kennet Partners totaling $15.9 million.[5]

In 2012 Baltimore private equity firm Camden Partners invested $6 million in the company, and American Trading and Production Corp invested $2 million as part of an $8 million Series B funding round.[5] In the deal, Jason Tagler of Camden Partners joined the board of directors of Prolexic. Prolexic said it would use the Series B money to support staff and augment its network.

In 2013, Prolexic closed a US$30 million Series C funding round led by new investors Trident Capital and Intel Capital. Kennet Partners, Camden Partners and Medina Capital all took part in the funding round.[6]

DDoS mitigation

edit

In 2012, hacktivism and vandalism were cited as the main inspiration for DDoS attacks, rather than extortion as in the past. This type of motivation is said to make any company a victim, not just high-profile organizations.[7] Organizations of all sizes are said to be at risk of DDoS attacks, because the newer application-level attacks are more targeted than classic DDoS botnet attacks and don’t need as many resources to deploy.[8] The cloud-based DDoS mitigation approach used by Prolexic employs technology to redirect traffic to the company’s DDoS mitigation service, scrub the traffic, and send only legitimate traffic to the client site. This attack mitigation approach is said to be lower-cost than the traditional approach of a company maintaining its own network firewall, making DDoS attack prevention an option for most firms doing business on the web.[8]

See also

edit

References

edit
  1. ^ a b "Source: Anonymous attacks on Sony annoying, not much more". Ars Technica. April 9, 2011.
  2. ^ "LulzSec's Parting Trojan is a False Positive". CIO Magazine. June 28, 2011.
  3. ^ "Top 100 Private Companies in North America" (PDF). RedHerring (Print issue). May 23, 2005.
  4. ^ "February 18, 2014 - Akamai Completes Acquisition of Prolexic". www.akamai.com. Archived from the original on February 28, 2014.
  5. ^ a b "Camden Partners leads $8M funding round of Prolexic Technologies". Baltimore Business Journal. February 8, 2012.
  6. ^ "Venture Capital Dispatch: The Daily Startup". Wall Street Journal. July 26, 2013.
  7. ^ "Más DDoS: More Powerful, Complex, And Widespread". Dark Reading. February 7, 2012.
  8. ^ a b "New Denial of Service Attacks Now Targeting All Size Businesses". CIO: IT Security Hack. December 8, 2011. Archived from the original on May 14, 2013. Retrieved March 25, 2012.
edit