The Economics of Cyber-Attacks

How to Provide State of the Art Protection against Real World Threats

We live in a world where increasing numbers of complex cyber breach tools are available on the Darknet. But what is the Darknet and how do we protect against it? The Darknet is an anonymous and obfuscated section of the internet where criminals can exchange information, tools and money to carry out attacks with little or no traceability. The Darknet provides a service marketplace where criminals can do many of the same things that law-abiding citizens do every day. Criminals search the internet (anonymously). They exchange emails with other criminals and prospective customers, they read news on the latest opensource tools available to perform effective attacks. They even have an online marketplace where cyber-attack services can be ordered and placed into your online shopping cart. In fact, a Darknet marketplace recently advertised $7,500 to rent the now notorious Mirai botnet – the same botnet used to generate a several hundred gigabit multi-vector attack that took down the services of Amazon, BBC, HBO, Netflix, PayPal, Spotify, and many others in October 2016.

[You might also like: Web Internet Companies and Carriers are Deciding to Just be Friends]

In this increasingly sophisticated cyber-attack landscape, over half of all businesses feel that they could not protect against such an attack. This leaves a significant business opportunity for savvy internet service providers, telco providers, and Cable companies/MSOs to provide a high value security service based on state-of-the-art tools and procedures to combat the most destructive attacks known today.

Best of all, this service can be based in two forms: first, as a do-it-yourself, build-and-operate service security or second, as a white-labeled service from an existing managed security provider – the latter being an increasingly popular offering. The white label strategy has several immediate advantages. Most importantly, it offers the quickest time-to-market method for service providers to close the hole in their IT security strategy and begin to offer this critical service to their enterprise customers. Next, it lowers risk by utilizing a NO CAPEX revenue share model to provide share success collaboration with the cloud service. Lastly, it leverages best-of-breed automation tools and proven security expertise to mitigate the most difficult attacks in real time, with no service impact to you or your customers.

Read Radware’s e-book: “How Can You Stop What You Can’t See?” to learn more.

Download Now

Mike O'Malley

Mike O’Malley brings 20 years of experience in strategy, product and business development, marketing, M&A and executive management to Radware. Currently, Mr. O’Malley is the Vice President of Carrier Strategy and Business Development for Radware. In this role, he is responsible for leading strategic initiatives for wireless, wireline and cloud service providers. Mr. O’Malley has extensive experience developing innovative products and strategies in technology businesses including security, cloud and wireless. Prior to Radware, Mr. O’Malley held various executive management positions leading growing business units at Tellabs, VASCO and Ericsson. Mr. O’Malley holds a Master of Business Administration degree, a Master of Science in electrical engineering, and a Bachelor of Science in electrical engineering from the University of Illinois. He also is a graduate of the Executive Strategy Programs at the University of Chicago.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program


An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center