The problem of web scraping
ScrapeSentry stops unwanted scrapers from benefiting from our clients’ intellectual property. Differentiating good from bad scrapers whether human or bot provides business intelligence to make real decisions that effect our clients’ bottom line.
The anti scraping solution
Passive high powered multi layered analysis tailored for specific traffic types coupled with flexible enforcement of blocks, 24/7 SOC expertise, portal access, scheduled reporting, and scraping analysis provide a total defense against scrapers.
The value of ScrapeSentry
24/7 as near to real-time detection and blocking of scrapers which is invisible and seamless to legitimate users with clear reporting and metrics provided by the inventors of Anti Scraping.
ScrapeSentry protects your business!
Prevent scraping and fraud with ScrapeSentry
ScrapeSentry is a fully managed anti scraping service based on a proprietary technology platform and 24/7 services delivered from the Sentor Security Operations Centre (SOC). These Services include monitoring, analysis, investigation, blocking policy development, enforcement, and support.
The ScrapeSentry service delivery platform is located on the client premises. It is either passively located on a span port or a module is installed directly on the webservers aggregating traffic to a passively located appliance containing the ScrapeSentry platform.
Blocking policies are enforced through interaction with existing infrastructure such as load balancers, webservers or the client’s application.
When the system detects signs of unauthorized usage it will either automatically block access or alert the Sentor SOC for further investigation and intervention in minutes.
Scraping Threat Report 2014
The scraping threat to online businesses has grown rapidly during 2013. Without exception our monitored clients have experienced an increase in the quantity and complexity of scraping attacks.
2013 saw 90 % of all attacks classified as professional or advanced by our anti scraping analysts. Scrapers now try to hide themselves using scripts, programs, and by cycling through a wide range of IP addresses.