SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Inside the Distil Content
Protection Network

A Technical Whitepaper
Distil.it
2200 Wilson Blvd., Suite 102-219
Arlington, VA 22201
www.distil.it
2
1

Distil protects your web content from
malicious scraping, data mining, and
unauthorized duplication.

Introduction	
  
The Distil Content Protection Network (CPN) is
the first cloud-based, intelligent gatekeeper for
website content. The system makes real-time
decisions to distinguish between human visitors
to your website and malicious bots so that
controls can be put in place to limit or eliminate
content scraping.
A CPN is like anti-virus protection software. It
monitors 100% of incoming requests to ensure
they are from valid end-users and not from
potentially harmful software systems. Protection
is provided automatically and around the clock to
keep your web content safe from theft, reduce
bandwidth requirements, and provide ultimate
peace of mind.
The Distil CPN uses a unique, behavioral-based
learning mechanism that continually gathers
knowledge over to time to perfect bad bot
identification. So, the more you use Distil, the
more it learns about your type of visitors and the
better protection it provides. In addition, Distil
accelerates performance of your website by using
content caching techniques.

An important aspect of the Distil CPN is that it
runs entirely as a cloud service. This means there
is no infrastructure investment from either a
software or a hardware standpoint in order to use
the system. Our global network of redundant
servers provide high availability of your website
and unlimited scalability. And, getting started
with Distil can be done within minutes since your
existing website and infrastructure do not have to
be modified in any way.
How Distil Wor ks
From an end user’s perspective, there is no
change in behavior when your website switches
over to use the Distil Content Protection
Network. End users will be able to access all
services and information as they would normally.

	
  
From a technical perspective, requests for web
pages will first be routed through the Distil CPN
servers so that all visitors can be monitored,
vetted, and fingerprinted. Any visitor that
appears to be performing content scraping will be
quickly identified by our behavioral-based
learning algorithms, and then action is taken
according to configuration options. For example,
you could immediately block offending users, or,
use a gradual stepped response resulting in an
eventual ban. This gives you total control over
the type of access you want for your particular
website.

© 2012, Distil.it
4
3

Dynamic	
  Threat	
  Response	
  
It’s not enough to simply look for a certain type
of behavior and ban the offending signatures. Bot
and tool designers will quickly change the
behavior of their software to work around simple
defenses. Because the Distil Content Protection
Network uses a behavior-based learning
mechanism, the system dynamically adjusts to
the type of threat encountered using a variety of
methodologies:
Ă˜ïƒ˜

header values, and requests made over time,
to look for discrepancies and irregularities
that wouldn’t be present in normal and
legitimate connection requests.
Ă˜ïƒ˜

Unlike any other solution on the market, the
Distil patent-pending technology randomly
and dynamically injects challenges and traps
into the HTTP stream making it impossible
to predict our testing algorithms.
Ă˜ïƒ˜

Active Connection Monitoring

HTTP Stream Injection

The Distil CPN monitors every single
connection and builds a fingerprint of every
incoming connection. The platform evaluates
a wide variety of metrics such as user-agent,

© 2012, Distil.it

Network-wide Threat Information
Propagation
All of the servers that make up the Distil
CPN internally share information regarding
malicious signatures. If a scraper attempts to
6
5

attack one site protected by Distil, that
unique signature will be distributed and
flagged for all sites under protection.
Ă˜ïƒ˜

User Defined Threat Response
In the event of false positives, the Distil CPN
gives the site owner the ability to adjust the
severity of threat response. Responses can
vary based on what the site owner wishes to
configure. A few examples of responses are:

end users and content sites, the Distil Content
Protection Network has several advantages over
appliance-based and server-side software antiscraping solutions:
Ă˜ïƒ˜

Because the Distil CPN is based entirely in
the cloud, the system leverages a global
network of redundant servers dispersed
geographically throughout North America,
Europe, and Asia. When end-users connect to
a specific site, they’ll be routed through a
Distil server closest to them. Our servers will
then forward that connection through an
internal network if going to a different
geographical region or through a backbone
link if staying within the same region. This
allows the connection to avoid less then
optimal links that can occur between ISPs
and internet backbone providers.

Captcha Challenges: A minimally invasive
challenge to guarantee a real end user
Block Page: A custom form that captures
user information and deploys Distil support
to immediately investigate
Drop Connect: A roadblock for the most
egregious offenders
Easy	
  Setup	
  and	
  Configuration	
  
The Distil Content Protection Network was
designed from the ground up to be quick to
deploy and easy to maintain. Unlike any other
solution on the market, the Distil CPN does not
require any complex setup. Other providers
require hardware and or custom code integration.
This puts unnecessary stress on your
infrastructure and is very time consuming. The
Distil CPN instead offloads the load from your
servers by routing your traffic through our
network of cloud servers improving your
performance, but more importantly, eliminating
all setup effort.

Better Response times and Reduced Latency

Ă˜ïƒ˜

Limitless Scalability
As your business grows, so will your
infrastructure and bandwidth requirements.
The Distil CPN will scale with your needs
dynamically based on the number of
connection requests we observe. If your site
is only experiencing a momentary spike in
traffic, the system will scale back down
accordingly allowing you to always only use
the amount of bandwidth you need.

Ă˜ïƒ˜

Advantages	
  of	
  the	
  Cloud	
  
By acting as a cloud-based intermediary between

© 2012, Distil.it

Better Reporting and Monitoring Options
Every server contains rudimentary reporting
and logging options for troubleshooting and
traffic monitoring. These tools, however, are
often either limited in scope or resources
8
7

because they aren’t the server’s primary
purpose. The Distil CPN, however, isn’t
constrained by the same limitations, and the
fact that Distil acts as a gateway allows the
system to offer enhanced connection
monitoring and reporting options.

Ă˜ïƒ˜

The Distil CPN caches website content in
order to return resources faster to users and
reduce page load time, bandwidth, and server
load. Distil not only caches static content but
also identifies content dynamically generated
by your applications. Cached content does
not mean stale content. Distil allows you to
customize the length of time to store cached
requests and honors backend "Expires" and
"Cache-Control" directives.

The	
  Distil	
  Advantage	
  
Due to cloud-based nature of the Distil Content
Protection Network, the service also offers
several distinct site acceleration features allowing
us to protect website content while accelerating
performance:
Ă˜ïƒ˜

Dynamic Content Caching

Ă˜ïƒ˜

Cloud Acceleration
The Distil CPN gives you the option to
accelerate the delivery of your files from our
global edge nodes. This reduces page load
times resulting in happier customers and
higher conversions. This will also reduce the
load on your infrastructure resulting in
better server performance and lower
bandwidth consumption.

Compression
For content rich applications, data transfer
can take a long time, which is why common
web servers and browsers support
compression for content. Configuring the
compression of resources on your web server
requires complicated settings and technical
knowledge. It also requires substantial
processing power from your web server. The
Distil CPN compresses content for you
automatically even if it is sent uncompressed
from your server.

About Distil.it
Distil is the leading Content Protection Network (CPN) and the first cloud-based, intelligent
gatekeeper for website content. Our CPN makes real-time decisions and seamlessly distinguishes
human visitors from malicious bots. Distil mitigates against duplicate content, improves SEO
power, and accelerates the end-user experience – all while reducing server load and infrastructure
demand. The setup is lightning–fast, secure, and completely transparent.
Our mission is to provide enterprise class protection safeguarding commercial and individual
content producers. With the Distil CPN there is finally a solution to protect your content, your
brand, and your revenue without impacting your end-user experience.

© 2012, Distil.it

Weitere Àhnliche Inhalte

Was ist angesagt?

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz Asia Pte Ltd
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyMazeBolt Technologies
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015John White
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...MazeBolt Technologies
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkNetpluz Asia Pte Ltd
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesCost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesMazeBolt Technologies
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper Array Networks
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014Ravindran Vasu
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS ProvidersNeil Hinton
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 

Was ist angesagt? (20)

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
DDoS
DDoSDDoS
DDoS
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt TechnologiesCost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
Cost of DDoS Attacks | DDoS Attacks Cost | MazeBolt Technologies
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS Providers
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 

Andere mochten auch

Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityDistil Networks
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
 
Cleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersCleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersDistil Networks
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityDistil Networks
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Using Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramUsing Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramDistil Networks
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Distil Networks
 
Case Study on Property Portal Data Security
Case Study on Property Portal Data SecurityCase Study on Property Portal Data Security
Case Study on Property Portal Data SecurityProperty Portal Watch
 

Andere mochten auch (14)

Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
Cleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersCleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammers
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Using Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramUsing Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security Program
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!
 
17 00 distil rami
17 00 distil rami17 00 distil rami
17 00 distil rami
 
Case Study on Property Portal Data Security
Case Study on Property Portal Data SecurityCase Study on Property Portal Data Security
Case Study on Property Portal Data Security
 

Ähnlich wie Distil technical-white-paper

Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
Cloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentCloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentgdyadav
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Serviceswebhostingguy
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
Cloud vs. On-Premise Digital Signage Software
Cloud vs. On-Premise Digital Signage SoftwareCloud vs. On-Premise Digital Signage Software
Cloud vs. On-Premise Digital Signage Softwareftx pos
 
Solution Brief
Solution BriefSolution Brief
Solution Briefwebhostingguy
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingAllwyn24
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdfkhan593595
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS
 

Ähnlich wie Distil technical-white-paper (20)

Key Capibilities.pptx
Key Capibilities.pptxKey Capibilities.pptx
Key Capibilities.pptx
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Cloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem studentCloude computing notes for Rgpv 7th sem student
Cloude computing notes for Rgpv 7th sem student
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Services
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
Cloud vs. On-Premise Digital Signage Software
Cloud vs. On-Premise Digital Signage SoftwareCloud vs. On-Premise Digital Signage Software
Cloud vs. On-Premise Digital Signage Software
 
Solution Brief
Solution BriefSolution Brief
Solution Brief
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
SafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service ProvidersSafeDNS Solutions for Internet and Mobile Service Providers
SafeDNS Solutions for Internet and Mobile Service Providers
 

Mehr von Dr. Augustine Fou - Independent Ad Fraud Researcher

Mehr von Dr. Augustine Fou - Independent Ad Fraud Researcher (20)

Forensic Auditing of Digital Media.pdf
Forensic Auditing of Digital Media.pdfForensic Auditing of Digital Media.pdf
Forensic Auditing of Digital Media.pdf
 
Q1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMMQ1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMM
 
Ad blocking benchmarks q4 2021
Ad blocking benchmarks q4 2021Ad blocking benchmarks q4 2021
Ad blocking benchmarks q4 2021
 
Digital ad dollars trickle down chart
Digital ad dollars trickle down chartDigital ad dollars trickle down chart
Digital ad dollars trickle down chart
 
Still nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fouStill nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fou
 
Bad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiencyBad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiency
 
Alternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v finalAlternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v final
 
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad RevenueImpact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
 
Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018
 
Digital Media Trust Collaborative
Digital Media Trust CollaborativeDigital Media Trust Collaborative
Digital Media Trust Collaborative
 
Programmatic reach analysis 2021
Programmatic reach analysis 2021Programmatic reach analysis 2021
Programmatic reach analysis 2021
 
2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy
 
Browser and OS Share Jan 2021
Browser and OS Share Jan 2021Browser and OS Share Jan 2021
Browser and OS Share Jan 2021
 
Checking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analyticsChecking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analytics
 
History and Impact of Digital Ad Fraud
History and Impact of Digital Ad FraudHistory and Impact of Digital Ad Fraud
History and Impact of Digital Ad Fraud
 
Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020
 
What CFEs can do about digital ad fraud
What CFEs can do about digital ad fraudWhat CFEs can do about digital ad fraud
What CFEs can do about digital ad fraud
 
Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020
 
How to Use FouAnalytics For Marketers
How to Use FouAnalytics   For MarketersHow to Use FouAnalytics   For Marketers
How to Use FouAnalytics For Marketers
 
FouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked inFouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked in
 

KĂŒrzlich hochgeladen

KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...Suhani Kapoor
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 

KĂŒrzlich hochgeladen (20)

KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 

Distil technical-white-paper

  • 1. Inside the Distil Content Protection Network A Technical Whitepaper Distil.it 2200 Wilson Blvd., Suite 102-219 Arlington, VA 22201 www.distil.it
  • 2. 2 1 Distil protects your web content from malicious scraping, data mining, and unauthorized duplication. Introduction   The Distil Content Protection Network (CPN) is the first cloud-based, intelligent gatekeeper for website content. The system makes real-time decisions to distinguish between human visitors to your website and malicious bots so that controls can be put in place to limit or eliminate content scraping. A CPN is like anti-virus protection software. It monitors 100% of incoming requests to ensure they are from valid end-users and not from potentially harmful software systems. Protection is provided automatically and around the clock to keep your web content safe from theft, reduce bandwidth requirements, and provide ultimate peace of mind. The Distil CPN uses a unique, behavioral-based learning mechanism that continually gathers knowledge over to time to perfect bad bot identification. So, the more you use Distil, the more it learns about your type of visitors and the better protection it provides. In addition, Distil accelerates performance of your website by using content caching techniques. An important aspect of the Distil CPN is that it runs entirely as a cloud service. This means there is no infrastructure investment from either a software or a hardware standpoint in order to use the system. Our global network of redundant servers provide high availability of your website and unlimited scalability. And, getting started with Distil can be done within minutes since your existing website and infrastructure do not have to be modified in any way. How Distil Wor ks From an end user’s perspective, there is no change in behavior when your website switches over to use the Distil Content Protection Network. End users will be able to access all services and information as they would normally.   From a technical perspective, requests for web pages will first be routed through the Distil CPN servers so that all visitors can be monitored, vetted, and fingerprinted. Any visitor that appears to be performing content scraping will be quickly identified by our behavioral-based learning algorithms, and then action is taken according to configuration options. For example, you could immediately block offending users, or, use a gradual stepped response resulting in an eventual ban. This gives you total control over the type of access you want for your particular website. © 2012, Distil.it
  • 3. 4 3 Dynamic  Threat  Response   It’s not enough to simply look for a certain type of behavior and ban the offending signatures. Bot and tool designers will quickly change the behavior of their software to work around simple defenses. Because the Distil Content Protection Network uses a behavior-based learning mechanism, the system dynamically adjusts to the type of threat encountered using a variety of methodologies: Ă˜ïƒ˜ header values, and requests made over time, to look for discrepancies and irregularities that wouldn’t be present in normal and legitimate connection requests. Ă˜ïƒ˜ Unlike any other solution on the market, the Distil patent-pending technology randomly and dynamically injects challenges and traps into the HTTP stream making it impossible to predict our testing algorithms. Ă˜ïƒ˜ Active Connection Monitoring HTTP Stream Injection The Distil CPN monitors every single connection and builds a fingerprint of every incoming connection. The platform evaluates a wide variety of metrics such as user-agent, © 2012, Distil.it Network-wide Threat Information Propagation All of the servers that make up the Distil CPN internally share information regarding malicious signatures. If a scraper attempts to
  • 4. 6 5 attack one site protected by Distil, that unique signature will be distributed and flagged for all sites under protection. Ă˜ïƒ˜ User Defined Threat Response In the event of false positives, the Distil CPN gives the site owner the ability to adjust the severity of threat response. Responses can vary based on what the site owner wishes to configure. A few examples of responses are: end users and content sites, the Distil Content Protection Network has several advantages over appliance-based and server-side software antiscraping solutions: Ă˜ïƒ˜ Because the Distil CPN is based entirely in the cloud, the system leverages a global network of redundant servers dispersed geographically throughout North America, Europe, and Asia. When end-users connect to a specific site, they’ll be routed through a Distil server closest to them. Our servers will then forward that connection through an internal network if going to a different geographical region or through a backbone link if staying within the same region. This allows the connection to avoid less then optimal links that can occur between ISPs and internet backbone providers. Captcha Challenges: A minimally invasive challenge to guarantee a real end user Block Page: A custom form that captures user information and deploys Distil support to immediately investigate Drop Connect: A roadblock for the most egregious offenders Easy  Setup  and  Configuration   The Distil Content Protection Network was designed from the ground up to be quick to deploy and easy to maintain. Unlike any other solution on the market, the Distil CPN does not require any complex setup. Other providers require hardware and or custom code integration. This puts unnecessary stress on your infrastructure and is very time consuming. The Distil CPN instead offloads the load from your servers by routing your traffic through our network of cloud servers improving your performance, but more importantly, eliminating all setup effort. Better Response times and Reduced Latency Ă˜ïƒ˜ Limitless Scalability As your business grows, so will your infrastructure and bandwidth requirements. The Distil CPN will scale with your needs dynamically based on the number of connection requests we observe. If your site is only experiencing a momentary spike in traffic, the system will scale back down accordingly allowing you to always only use the amount of bandwidth you need. Ă˜ïƒ˜ Advantages  of  the  Cloud   By acting as a cloud-based intermediary between © 2012, Distil.it Better Reporting and Monitoring Options Every server contains rudimentary reporting and logging options for troubleshooting and traffic monitoring. These tools, however, are often either limited in scope or resources
  • 5. 8 7 because they aren’t the server’s primary purpose. The Distil CPN, however, isn’t constrained by the same limitations, and the fact that Distil acts as a gateway allows the system to offer enhanced connection monitoring and reporting options. Ă˜ïƒ˜ The Distil CPN caches website content in order to return resources faster to users and reduce page load time, bandwidth, and server load. Distil not only caches static content but also identifies content dynamically generated by your applications. Cached content does not mean stale content. Distil allows you to customize the length of time to store cached requests and honors backend "Expires" and "Cache-Control" directives. The  Distil  Advantage   Due to cloud-based nature of the Distil Content Protection Network, the service also offers several distinct site acceleration features allowing us to protect website content while accelerating performance: Ă˜ïƒ˜ Dynamic Content Caching Ă˜ïƒ˜ Cloud Acceleration The Distil CPN gives you the option to accelerate the delivery of your files from our global edge nodes. This reduces page load times resulting in happier customers and higher conversions. This will also reduce the load on your infrastructure resulting in better server performance and lower bandwidth consumption. Compression For content rich applications, data transfer can take a long time, which is why common web servers and browsers support compression for content. Configuring the compression of resources on your web server requires complicated settings and technical knowledge. It also requires substantial processing power from your web server. The Distil CPN compresses content for you automatically even if it is sent uncompressed from your server. About Distil.it Distil is the leading Content Protection Network (CPN) and the first cloud-based, intelligent gatekeeper for website content. Our CPN makes real-time decisions and seamlessly distinguishes human visitors from malicious bots. Distil mitigates against duplicate content, improves SEO power, and accelerates the end-user experience – all while reducing server load and infrastructure demand. The setup is lightning–fast, secure, and completely transparent. Our mission is to provide enterprise class protection safeguarding commercial and individual content producers. With the Distil CPN there is finally a solution to protect your content, your brand, and your revenue without impacting your end-user experience. © 2012, Distil.it