SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
DDoS Protection Services
1 DDoS Protection
2 About us & global reach
3 Services & Solutions
4 Traffic Diversion
5 Response Time
6 Control Center
7 Capacity Backup
8 Partners
CONTENT
overview
9 Summary
1
DDoS Protection Strategies – General
Traditional Approaches
On Premises
Dedicated appliances
Pros
• Good for layer 7 attacks
• Enterprise control
Cons
• Vol. attacks (upstream)
• Requires in-house skills
Clean Pipe
ISP detects and mitigates.
Pros
• Cost effective
• Mature offering
Cons
• Low capacity ISP
• ISP agnostic
2
DDoS Protection Strategies – Providers
Traditional Approaches
CDN Provider
Web content is distributed,
mitigation done at the edge.
Web only.
Pros
• Always On
• New services (e.g.WAF)
Cons
• No DMZ protection
• Limited to Web
Scrubbing Center
Traffic redirection to closest
cleaning facility. Forward
good traffic.
Pros
• Effects ALL traffic
• Interact with CPE
Cons
• No auto-diversion*
• Require testing
3
SecurityDAM
overview
SecurityDAM offers
Managed Security Service
Providers (MSSPs) a quick
and easy way of adding
comprehensive Distributed
Denial of Service (DDoS)
protection service to their
security portfolio.
ABOUT US
SecurityDAM
Worldwide Resources
Radware Partner
SecurityDAM
Control Center
Monitoring & Alerting
MSSP Solutions
RAD Group
DDoS Protection
NOC/ERT Services
Hybrid Approach
Comprehensive evolving managed
DDoS Protection Services
5
OUR GLOBAL REACH
Global Network of Scrubbing Centers
US
>100 Gbps
Hong Kong
>20Gbps
Frankfurt
>100 Gbps
Current: >200 Gbps
200G
OUR NETWORK IS EXPANDING
Russia
<partner>
UK
<partner>
Hong Kong
<partner>
US
>50Gbps
Singapore
>20Gbps
Partners: >50 Gbps
250G
2014 Plans: >+100 Gbps
350G
SERVICES & SOLUTIONS
SecurityDAM Offering
SecurityDAM offers a complete DDoS Protection Services suit, with a flexible deployment
and responsibility offering, matching your current and future needs.
 White Label Service
Brand on SecurityDAM system
 Turnkey Service
Independent local system
 Backup Service
Mitigation capacity backup
SecurityDAM suite of services enables flexible provisioning of DDoS Protection Services
 Full Operational Services
SecurityDAM NOC and ERT
 Partial Operational Services
NOC / ERT / Support
 On Demand Service
for registered end-customers
7
OUR SERVICES
System and Team
Analysis
Real-time analysis and
adjustment of protection settings
Accounting
Flexible protection plans definitions
to match customer and market needs
Flexible Environment
Cloud-based environment
Best of bread flexible integration
Development
Evolving proprietary
mitigation tools
24x7 Support
NOC – monitoring, mitigation
and past mortem analysis
Research
DDoS tools and mitigation
techniques research
8
Traffic Diversion
Automated from the Control Center
Traffic diversion to Scrubbing Centers
BGP
AS / (/24)
network diversion
Route Change
direct route
changes
9
DNS
website diversion
(reverse-proxy)
RESPONSE TIME #1
Shortest Time-to-Mitigate
24x7 Monitoring
Real-time / Inline
Detection time measured in
seconds.
Alert
NOC / Customer
Analysis of attack
and mitigation measures.
CPE Only
Monitor on
premises
actions
Divert
Decide on
diversion
and engage
10
TIME TO MITIGATE
< 15 minutes, when diversion is needed
Time to mitigate
RESPONSE TIME
Short response time to new threats
SOFTWARE
Cloud Deployment
Quick deployment
of new measures
IDEA
New threats
Real-time analysis of
mitigation efficiency
DEVELOPING
New protections
COTS and custom mitigation
tools integration
12
13
Figure 1 Customer Dashboard
Real-time monitoring
 Traffic
 Setting
 Security & Operational
Signaling based Alerting
Diversion requests
Control Center
Managing DDoS Protection Service
14
Figure 2 Operator Dashboard
Global real-time views
 Traffic
 Setting
 Security & Operational
Signaling based Alerting
Control Center
Managing DDoS Protection Service
15
Figure 3 Reports
Summary Report
Account report aggregating
CPE and Scrubbing Center data
Detailed Report
Attack report per incident (with
aggregation)
Enhanced Reports (future)
External source integration to
produced reports.
Control Center
Managing DDoS Protection Service
CAPACITY BACKUP SERVICE
High rate attack mitigation via SecurityDAM
SD Net
Capacity backup
services for supporting
local scrubbing center
resource limitation.
Unified
Unified reporting cross
levels, with
aggregated date from
multiple mitigation
points.
IncreaseValue
ReduceCapEx
DDoS attack rate can be overwhelming
80/20 still apply  rely on cloud backup 16
Partners – JT Global
Operating SecurityDAM Independent System
Image
Placeholder 1
 UK Channel Island operator
 Customer DDoS Protection
 Banking
 Online businesses
 Stand-alone Control Center
 Stand-alone Scrubbing Center
Mark Stuchfield, (Head of Innovation
and Strategy, JT):
“SecurityDAM allows us to provide
these cloud security services to
multiple customers and at the same
time give them a visual indication of
what is going on”
17
Partners – Defense Center LLC
Operating SecurityDAM Independent System
 Russian MSSP
 Customer DDoS Protection
 Small businesses
 Enterprise networks
 Domestic Control Center
 Mitigation capacity backup
Valery Kirillov, (CEO):
“Business continuity is a prime
concern to our customers. Our multi-
layered DDoS protection will allow us
to provide the highest level of
mitigation capacity, backup by
SecurityDAM Emergency Response
Team service.”
18
SUMMARY
Basic flow
Clean
Reinjection
CC
51
Monitor
CPE
Mitigate / Alert
CPECC
2
Divert
To CC
3
Cloud
Mitigation
CC
4
Attack
End
CPE
6
19
SUMMARY
Attack Management Flow
20
On-premise CPE
mitigates the attack
Protected Organization
Signaling Messaging
Volumetric DDoS attack
blocks the Internet pipe
Clean traffic
Sharing essential
information for
attack mitigation
MSSP Scrubbing Center & NOC
SecurityDAM Global
Scrubbing Centers
MSSP/customer decide to
divert the traffic
MSSP local capacity exhausted;
initiate Capacity Backup
SUMMARY
SecurityDAM DDoS Protection Platform and Services
Customer
Portal
Operator
provisioning
and
management
Audit and
Accounting
Monitoring
End-to-End
Protection
Integrated Layered
DDoS protection
Smooth operation
Experts assistance
21
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

Mais conteúdo relacionado

Mais procurados

DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDeivid Toledo
 
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDSorensenCPR
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application SecurityCloudflare
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREDeivid Toledo
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
momentum dns security case study
momentum dns security case studymomentum dns security case study
momentum dns security case studyJim Zhang
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsSteven_Jackson
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesCloudflare
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingCloudflare
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataGreat Wide Open
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceSagi Brody
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesCloudflare
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackCloudflare
 

Mais procurados (20)

DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWARE
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
 
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
 
Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
momentum dns security case study
momentum dns security case studymomentum dns security case study
momentum dns security case study
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer Games
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart Routing
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS Attack
 

Semelhante a SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPROIDEA
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...MazeBolt Technologies
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementRethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementCorsa Technology
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureCloudflare
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfTuPhan66
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPROIDEA
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centersNarendran Vaideeswaran
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...Sergiy Pitel
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 

Semelhante a SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK) (20)

PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementRethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security Enforcement
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking Infrastructure
 
Datacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter SchjøttDatacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter Schjøtt
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
 
Next-Gen DDoS Detection
Next-Gen DDoS DetectionNext-Gen DDoS Detection
Next-Gen DDoS Detection
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

  • 2. 1 DDoS Protection 2 About us & global reach 3 Services & Solutions 4 Traffic Diversion 5 Response Time 6 Control Center 7 Capacity Backup 8 Partners CONTENT overview 9 Summary 1
  • 3. DDoS Protection Strategies – General Traditional Approaches On Premises Dedicated appliances Pros • Good for layer 7 attacks • Enterprise control Cons • Vol. attacks (upstream) • Requires in-house skills Clean Pipe ISP detects and mitigates. Pros • Cost effective • Mature offering Cons • Low capacity ISP • ISP agnostic 2
  • 4. DDoS Protection Strategies – Providers Traditional Approaches CDN Provider Web content is distributed, mitigation done at the edge. Web only. Pros • Always On • New services (e.g.WAF) Cons • No DMZ protection • Limited to Web Scrubbing Center Traffic redirection to closest cleaning facility. Forward good traffic. Pros • Effects ALL traffic • Interact with CPE Cons • No auto-diversion* • Require testing 3
  • 5. SecurityDAM overview SecurityDAM offers Managed Security Service Providers (MSSPs) a quick and easy way of adding comprehensive Distributed Denial of Service (DDoS) protection service to their security portfolio.
  • 6. ABOUT US SecurityDAM Worldwide Resources Radware Partner SecurityDAM Control Center Monitoring & Alerting MSSP Solutions RAD Group DDoS Protection NOC/ERT Services Hybrid Approach Comprehensive evolving managed DDoS Protection Services 5
  • 7. OUR GLOBAL REACH Global Network of Scrubbing Centers US >100 Gbps Hong Kong >20Gbps Frankfurt >100 Gbps Current: >200 Gbps 200G OUR NETWORK IS EXPANDING Russia <partner> UK <partner> Hong Kong <partner> US >50Gbps Singapore >20Gbps Partners: >50 Gbps 250G 2014 Plans: >+100 Gbps 350G
  • 8. SERVICES & SOLUTIONS SecurityDAM Offering SecurityDAM offers a complete DDoS Protection Services suit, with a flexible deployment and responsibility offering, matching your current and future needs.  White Label Service Brand on SecurityDAM system  Turnkey Service Independent local system  Backup Service Mitigation capacity backup SecurityDAM suite of services enables flexible provisioning of DDoS Protection Services  Full Operational Services SecurityDAM NOC and ERT  Partial Operational Services NOC / ERT / Support  On Demand Service for registered end-customers 7
  • 9. OUR SERVICES System and Team Analysis Real-time analysis and adjustment of protection settings Accounting Flexible protection plans definitions to match customer and market needs Flexible Environment Cloud-based environment Best of bread flexible integration Development Evolving proprietary mitigation tools 24x7 Support NOC – monitoring, mitigation and past mortem analysis Research DDoS tools and mitigation techniques research 8
  • 10. Traffic Diversion Automated from the Control Center Traffic diversion to Scrubbing Centers BGP AS / (/24) network diversion Route Change direct route changes 9 DNS website diversion (reverse-proxy)
  • 11. RESPONSE TIME #1 Shortest Time-to-Mitigate 24x7 Monitoring Real-time / Inline Detection time measured in seconds. Alert NOC / Customer Analysis of attack and mitigation measures. CPE Only Monitor on premises actions Divert Decide on diversion and engage 10
  • 12. TIME TO MITIGATE < 15 minutes, when diversion is needed Time to mitigate
  • 13. RESPONSE TIME Short response time to new threats SOFTWARE Cloud Deployment Quick deployment of new measures IDEA New threats Real-time analysis of mitigation efficiency DEVELOPING New protections COTS and custom mitigation tools integration 12
  • 14. 13 Figure 1 Customer Dashboard Real-time monitoring  Traffic  Setting  Security & Operational Signaling based Alerting Diversion requests Control Center Managing DDoS Protection Service
  • 15. 14 Figure 2 Operator Dashboard Global real-time views  Traffic  Setting  Security & Operational Signaling based Alerting Control Center Managing DDoS Protection Service
  • 16. 15 Figure 3 Reports Summary Report Account report aggregating CPE and Scrubbing Center data Detailed Report Attack report per incident (with aggregation) Enhanced Reports (future) External source integration to produced reports. Control Center Managing DDoS Protection Service
  • 17. CAPACITY BACKUP SERVICE High rate attack mitigation via SecurityDAM SD Net Capacity backup services for supporting local scrubbing center resource limitation. Unified Unified reporting cross levels, with aggregated date from multiple mitigation points. IncreaseValue ReduceCapEx DDoS attack rate can be overwhelming 80/20 still apply  rely on cloud backup 16
  • 18. Partners – JT Global Operating SecurityDAM Independent System Image Placeholder 1  UK Channel Island operator  Customer DDoS Protection  Banking  Online businesses  Stand-alone Control Center  Stand-alone Scrubbing Center Mark Stuchfield, (Head of Innovation and Strategy, JT): “SecurityDAM allows us to provide these cloud security services to multiple customers and at the same time give them a visual indication of what is going on” 17
  • 19. Partners – Defense Center LLC Operating SecurityDAM Independent System  Russian MSSP  Customer DDoS Protection  Small businesses  Enterprise networks  Domestic Control Center  Mitigation capacity backup Valery Kirillov, (CEO): “Business continuity is a prime concern to our customers. Our multi- layered DDoS protection will allow us to provide the highest level of mitigation capacity, backup by SecurityDAM Emergency Response Team service.” 18
  • 20. SUMMARY Basic flow Clean Reinjection CC 51 Monitor CPE Mitigate / Alert CPECC 2 Divert To CC 3 Cloud Mitigation CC 4 Attack End CPE 6 19
  • 21. SUMMARY Attack Management Flow 20 On-premise CPE mitigates the attack Protected Organization Signaling Messaging Volumetric DDoS attack blocks the Internet pipe Clean traffic Sharing essential information for attack mitigation MSSP Scrubbing Center & NOC SecurityDAM Global Scrubbing Centers MSSP/customer decide to divert the traffic MSSP local capacity exhausted; initiate Capacity Backup
  • 22. SUMMARY SecurityDAM DDoS Protection Platform and Services Customer Portal Operator provisioning and management Audit and Accounting Monitoring End-to-End Protection Integrated Layered DDoS protection Smooth operation Experts assistance 21