Distil Product Updates - August 2016

Distil Fingerprinting is Bigger and Better

Distil’s original fingerprinting method analyzed 40 bits of information to uniquely identify a user. This made it tricky for malicious bots to obscure their identity. We’ve increased the resolution of our fingerprint to more than 200, ensuring less fingerprint collisions and making it even harder for bots to sneak past Distil.


Strengthen JavaScript Challenges to Automated Browsers

We’ve greatly improved our JavaScript challenge to better protect against automated browsers by adding the proof-of-work feature. This security feature forces such requests to prove themselves as coming from valid browsers rather than fake ones or automated scripts.


Improved EMEA Coverage

Action required for Cloud Customers. We recently rolled out a new data center in Frankfurt as well as upgrading our current London and Amsterdam data centers. This will greatly improve traffic routing performance and control throughout the entire European, Middle Eastern, and African regions. Cloud Customers must whitelist our newly added IP range.


Track API Token Abuse

You’ll soon be able to view all token activity related to your protected APIs. Available in API Security, the Token Distribution report shows tokens that are prone to malicious or abusive requests. It also shows how many unique tokens are seen from a single IP address (token cycling) and how many IPs are tied to a single token (token distribution). Use the report to isolate problem tokens and blacklist them from making future attempts.

Empower Your Portal Account Security with Two-Factor Authentication

One of the easiest and most effective ways to protect against Portal intruders is by enabling two-factor authentication. Using it, you’ll never have to worry about malicious users obtaining your credentials to access your account. This prevents them from making unwanted changes—including locking out other users associated with your account or dismantling your protection settings. In order to log in, you and your users must have their authenticated device handy. 


Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request