Story image

Level 3 extends firewall service to APAC and Africa customers

03 Oct 2017

Level 3 Communications has extended its firewall service to customers across Asia pacific and Africa as part of its pledge to help organisations stay ahead of threats and transition to next-generation security.

According to Level 3’s SVP of global managed security services Chris Richter, the threat landscape is evolving – and so are the cost and complexity of security solutions.

The company’s global VPN backbone includes security gateways across Asia Pacific, Europe, the Middle East, Africa and North America.

Level 3’s Threat Research Labs has been tracking malicious activity this year. Between January and June, it tracked 109 million unique victims and 108,000 threats daily around the globe.

In Asia Pacific, the top five countries that fell victim to malware included China, Japan, Pakistan, South Korea and Australia. The company detected more than 35 million malware victims in the first half of 2017.

“The Asia Pacific region is a key piece of the threat landscape puzzle because of its massive infrastructure and growing population,” Level 3 states.

China also featured top of the list for the most amount of command and control hosts in Asia Pacific, the most amount of bots by country with more than 435,000 unique bots per day.

Level 3’s network facilitates the delivery of Adaptive Network Security, Level 3’s security solution designed to help customers monitor, block and report cyber attacks.

Level 3 also monitors more than 1.3 billion security events across 94 billion NetFlow sessions daily; as well as activity through 5000 command and control servers and malicious IPs.

“Level 3's expansion of Adaptive Network Security marks the next step in delivering adaptive networking solutions to break the hardware dependency cycle and reduce the administrative burden of trying to stay ahead of bad actors. Global businesses can leverage Adaptive Network Security for the latest security technology to keep their networks and workforces secure while they focus on what matters most to their business,” comments Richter.

The cloud-based network architecture breaks the common hardware dependency cycle, which allows custom configuration of features and functions according to customer needs.

Level 3’s Threat Research Labs says it is vital for Asia Pacific to remain vigilant about security best practices and to use threat analytics to proactive protect infrastructure, enterprises and consumers.

Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Online attackers abusing Kiwis' generosity in wake of Chch tragedy
It doesn’t take some people long to abuse people’s kindness and generosity in a time of mourning.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."