Bad Bots Adversely Affect Your Customers Amy DeMartine, Principal Analyst

Similar documents
Beyond Blind Defense: Gaining Insights from Proactive App Sec

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

RSA Web Threat Detection

Vincent van Kooten, EMEA North Fraud & Risk Intelligence Specialist RSA, The Security Division of EMC

RSA Fraud & Risk Intelligence Solutions

Doxxing, Dissidents, And. Digital Extortion. Fortify Your Digital Risk Defenses. Nick Hayes, Senior Analyst

AKAMAI CLOUD SECURITY SOLUTIONS

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

The Interactive Guide to Protecting Your Election Website

RSA Web Threat Detection

Reduce Your Network's Attack Surface

Display campaign setup guide

WHAT IS MALICIOUS AUTOMATION? Definition and detection of a new pervasive online attack

Behavioral Analytics A Closer Look

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

CASE STUDY TOP 10 AIRLINE SOLVES AUTOMATED ATTACKS ON WEB & MOBILE

Automation is changing the modern world. DevOps, Infrastructure Automation, Process Automation

Mastering The Endpoint

IBM Cloud Internet Services: Optimizing security to protect your web applications

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Imperva Incapsula Product Overview

SOLUTION BRIEF FPO. Imperva Simplifies and Automates PCI DSS Compliance

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Conversion Path Tracking - Affiliate sheet

Security Whitepaper. DNS Resource Exhaustion

Protecting the Omnichannel With Comprehensive Security Defenses

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

A GUIDE TO DDoS PROTECTION

Imperva Incapsula Website Security

Accelerating growth and digital adoption with seamless identity trust

Monitor Optimize Validate

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Artificial Intelligence Drives the next Generation of Internet Security

Intelligent and Secure Network

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

FINDING THE SWEET SPOT BETWEEN AI AND EI IN THE CONTACT CENTRE. Jonathan Sharp Sales & Marketing Director, Britannic Technologies Stand #F131

Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience

Retail Security in a World of Digital Touchpoint Complexity

360 View on M-Commerce. Presented by S. Baranikumar

COMPETITIVE EDGE IN THE CLOUD DRIVING GROWTH AND VALUE WITH ADAPTIVE DELIVERY, SECURITY, AND ACCELERATION

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Android Pay. Tap into the world s biggest mobile platform PAYMENT METHODS ALTERNATIVE PAYMENTS

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

NETACEA / WHITE PAPER DNS VS JAVASCRIPT

The Artificial Intelligence Revolution in Cybersecurity

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Technical Overview. Elastic Path Commerce

Akamai: Turning Enterprise Security Inside Out

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

The Digital Risk Dilemma

Media Mark Web Development, Marketing & Production. Media Mark custom websites recognize the fact that packaged products do not fit every need!

paladin vendor report 2017

雲服務比你想像更安全? 陳建宏 Akamai 大中華區資安業務總監

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Antivirus Myths and Facts. By Helmuth Freericks

Business Logic Attacks BATs and BLBs

RSA. The security division of EMC. Visibilidad total en el entorno de seguridad. Javier Galvan Systems Engineer Mexico & NOLA

Comodo cwatch Web Security

FOR FINANCIAL SERVICES ORGANIZATIONS

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016

Building Resilience to Denial-of-Service Attacks

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Google & Mobile SEO 1

Secure the value chain. Risk management in the omnichannel consumer and retail environment

Cyber War Chronicles Stories from the Virtual Trenches

COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process

Security in a Converging IT/OT World

2018 Edition. Security and Compliance for Office 365

Global DDoS Threat Landscape

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED

Key Considerations in Choosing a Web Application Firewall

haltdos - Web Application Firewall

Putting security first for critical online brand assets. cscdigitalbrand.services

WHITE PAPER Fighting Mobile Fraud

Gary Reblin Vice President, Product Innovation United States Postal Service. March, 2018

E-Commerce Networking

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Build Your Zero Trust Security Strategy With Microsegmentation

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Rethink Enterprise Endpoint Security In The Cloud Computing Era

Geolocation and Application Delivery

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

Be effective in protecting against the cybercrime

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Use Cases. E-Commerce. Enterprise

What we can do for you

Enterprise D/DoS Mitigation Solution offering

Collective responsibility for security and resilience of the global routing system

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Predicting and Stopping Account Takeover Fraud. A PatternEx Solution Guide

Overview of Akamai s Personal Data Processing Activities and Role

Transcription:

CX NYC 2018 Bad Bots Adversely Affect Your Customers Amy DeMartine, Principal Analyst

Most website visitors aren t humans, but are instead bots or, programs built to do automated tasks. They are the worker bees of the internet, and also the henchmen. Adrienne Lafrance, The Atlantic 2017 Forrester Research, Inc. Reproduction Prohibited 2

Your bots work for your company. Bad bots attack your customer touch points. 2018 Forrester Research, Inc. Reproduction Prohibited 3

Today s Bot Traffic Will Only Increase In The Future With Chatbots, Virtual Agents, etc. Source: TechRadar : Application Security, Q2 2017 Forrester report. 4

Bots Are Evolving Quickly Simple automated actions Mimic human behavior Hijack a real user AI will make these bots even more difficult to identify 2018 Forrester Research, Inc. Reproduction Prohibited 5

Your customers are adversely affected by bad bots. 2018 Forrester Research, Inc. Reproduction Prohibited 6

Your data is NOT clean. 2018 Forrester Research, Inc. Reproduction Prohibited 7

Scraping 8

Distributed Denial of Service (DDoS) 9

Inventory hoarding 10

Checkout abuse 11

Credential Stuffing (aka Account Takeover) More than 40% of global log-in attempts are malicious thanks to botdriven credential stuffing attacks 12

Carding GiftGhostBot logged up to 4 million gift card balance requests per hour 13

Ad Fraud Accounts For $1.443 Billion In Wasted Impression Spending Source: Forrester Data Report: Ad Fraud And Viewability Forecast, 2016 To 2021 (US) 14

Methbot has been costing advertisers $3 million to $5 million per day in the US; on its way to $1 billion per year Source: Forrester Data Report: Ad Fraud And Viewability Forecast, 2016 To 2021 (US) 15

Influence Fraud 16

Your customer journey mapping may be skewed, distorted or just plain wrong as a result of bad bots. Customer list Trouble spots Browsing behavior Click through Unable to onboard Click through coupon 17

Bot management solutions actively profile automated traffic to determine its intent and perform protection techniques such as delaying, blocking, or rerouting traffic from bad bots. 2017 Forrester Research, Inc. Reproduction Prohibited 18

Assumption of good customer traffic until proven otherwise Source: Vendor Landscape: ecommerce And Retail Fraud Management Solutions, Q3 2017 19

What To Look For In A Bot Management Solution Counter sophisticated attacks Manage bot traffic in multiple ways Provide uninterrupted user experience Create comprehensive traffic analytics 20

Bot Management Solutions DDoS Mitigation Bot Management Bot Management Specialists Bot adjacent web application firewall Advertising verification and brand safety 2018 Forrester Research, Inc. Reproduction Prohibited 21

What To Remember 1. Bot traffic is increasing and your data may already be distorted this affects: Your customer touchpoints availability and performance Your ability to make correct customer experience decisions 2. Implement bot management 3. Sophistication in detection logic and transparency in reports are key factors 2018 Forrester Research, Inc. Reproduction Prohibited 22

Thank you Amy DeMartine +1 617.613.8906 ademartine@forrester.com @AmyDeMartine