SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
©A10 Networks, Inc.
SSL Insight & TPS
Accelerating and Securing Applications & Networks
09242014
Arzu Akkaya
aakkaya@a10networks.com
Sinan İlkiz
silkiz@a10networks.com
2©A10 Networks, Inc.
3400+ Customers in 65 Countries
Web GiantsEnterprisesService Providers
3 of Top 4
U.S. WIRELESS CARRIERS
7 of Top 10
U.S. CABLE PROVIDERS
Top 3
WIRELESS CARRIERS IN JAPAN
SSL Insight
Uncover Hidden Threats in Encrypted Traffic
4©A10 Networks, Inc.
Uncover Hidden Threats in Encrypted Traffic
of Internet traffic is
encrypted with SSL
25%
35%
of all attacks will use encrypted
traffic to bypass controls by
2017
More
than
50%
of organizations with a firewall,
IPS or UTM appliance decrypt
inbound or outbound SSL traffic
Less
than
20%
average performance loss
of leading firewalls when
decrypting traffic
81%
more of the most
popular websites use
SSL in 2014 than 2013
48%
 NSS Labs, “SSL Performance Problems"
 StackExchange analysis on key lengths
 NetCraft SSL Survey
5©A10 Networks, Inc.
Challenge
Malicious users leverage SSL encryption to conceal their exploits.
Organizations need a powerful, high-performance platform to decrypt
SSL traffic.
Solution
A10 Networks enables organizations to analyze all data, including
encrypted data, by intercepting SSL communications and sending it to
3rd party security devices such as firewalls, threat prevention platforms
and forensic tools for inspection.
Uncover Hidden Threats in Encrypted Traffic
6©A10 Networks, Inc.
SSL Insight Traffic Flow
1. Encrypted traffic from the client is decrypted by the
internal, client-side Thunder ADC
2. Thunder ADC sends the unencrypted data to a security
appliance which inspects the data in clear text
3. The external Thunder ADC re-encrypts the data and sends
it to the server
4. The server sends an encrypted response to the external
Thunder ADC
5. Thunder ADC decrypts the response and forwards it to the
security device for inspection
6. The internal ADC receives traffic from the security device,
re-encrypts it and sends it to the client
7©A10 Networks, Inc.
SSL Insight
With SSL Insight, organizations can,
 Achieve high performance with SSL acceleration
hardware
 Scale security with load balancing
 Reduce load on security infrastructure by
controlling which types of traffic to decrypt
 Granularly control traffic with aFleX policies
 Selectively bypass sensitive web applications*
* With ACOS 4.0.1
8©A10 Networks, Inc.
A Single Point for Decryption and Analysis
Thunder ADC can work with
– Firewalls
– Intrusion Prevention Systems
(IPS)
– Unified Threat Management
(UTM) platforms
– Data Loss Prevention (DLP)
products
– Threat prevention platforms
– Network forensics and web
monitoring tools
Inline Non-Inline
9©A10 Networks, Inc.
SSL Insight Performance & Summary
 Scalability, with up to 23.8 Gbps of SSL inspection performance in a standard configuration
 Load Balancing of security devices to maximize uptime and scale security
 Advanced SSL Insight features like URL classification subscriptions, untrusted certificate handling,1 and more
 Hardware Security Module (HSM) integration for FIPS 140-2 Level 3 compliant SSL key management
 Traffic steering to intelligently route traffic, optimize performance and reduce security appliance costs
 Validated interoperability with FireEye, RSA, IBM and other leading inspection products ensure that our solutions work together
Threat Protection System
High-performance, Network-wide DDoS Protection
11©A10 Networks, Inc.
DDoS Problems
Q3 2010
PayPal
Discloses cost
of attack £3.5M
(~$5.8 million)
Q1 2013
Credit Union Regulators
Recommend
DDoS protection to
all members
Q4 2012
Bank of the West
$900k stolen, DDoS
as a distraction
Q1 2013
al Qassam Cyber Fighters
10-40 Gbps attacks target
9 major banks
Q1 2014
CloudFlare
400 Gbps NTP
amplification
attack
Q4 2013
60 Gbps attacks regularly
seen,100 Gbps not
uncommon
Q4 2013
26% YoY attack
increase (17% L7, 28% L3-4)
Q4 2013
PPS reaches 35 million
Q4 2013
6.8 million mobile devices
are potential attackers
(LOIC and AnDOSid)
“High-bandwidth DDoS attacks are becoming the new norm and will
continue wreaking havoc on unprepared enterprises”
Source: Gartner
12©A10 Networks, Inc.
Thunder Threat Protection System (TPS)
Next Generation DDoS Protection
Multi-vector
Application & Network
Protection
High Performance
Mitigation
Broad Deployment
Options & 3rd Party
Integration
Multi-vector Protection
 Detect & mitigate application &
network attacks
 Flexible scripting & DPI for rapid
response
High Performance
 Mitigate 10 – 155 Gbps of attack
throughput, 200 M packets per
second (PPS) in 1 rack unit
Broad Deployment & 3rd Party
 Symmetric, asymmetric, out-of-band
 Open SDK/RESTful API for 3rd party
integration
13©A10 Networks, Inc.
Five principal methods for effective mitigation
Mitigating DDoS Attacks
Packet anomaly check:
Network level packet
sanity check
(conformance)
Authentication
challenge:
Network and application
level validation of client
origination integrity
Black and white lists:
Network level high speed
inspection and control
Traffic rate control:
Network and
application monitoring
to rate limit traffic
Protocol and
application check:
Network and
application
14©A10 Networks, Inc.
Real-time
DetectionFlood Thresholds
Protocol Anomalies
Behavioral Anomalies
Resource Starvation
L7 Scripts
Black Lists
HTTP DNSTCPUDP
 Symmetric Deployment
– Inline DDoS detection and mitigation in
one box
– Inspect both inbound and outbound traffic
– Suitable for Enterprises
 Protecting own services
 Permanent protection
 Sub-second detection-to-mitigation
 Profile
– Detect and inspect L3 – L7 traffic for both
inbound and outbound traffic
– Deep statistics sFlow export
– DDoS detection and mitigation at sub-second
scale
Symmetric Deployment
Telemetry
DDoS
Detection
System
Collection
Device
Services
15©A10 Networks, Inc.
 Asymmetric Reactive deployment
– Classic deployment model
– Scalable solution for DDoS mitigation
 Oversubscribed bandwidth deployment
 No additional latency in peace time
 Longer time to mitigate
– Suitable for Service Providers
 Protecting select services
 Large scale core network
 Profile
– Traffic redirected to TPS for scrubbing as needed
 Support BGP for route injection
– Valid traffic forwarded into network for services
 Support GRE & IP-in-IP tunneling
Asymmetric Reactive Deployment
Core
Network
End Customer
or Data Center
Services
DDoS
Detection
System
aXAPI /
Manual
Action
Traffic Redirection
Telemetry
16©A10 Networks, Inc.
MSSP
Network
 Asymmetric Reactive Model with CPE
– Recommended for Managed Security
Service Providers (MSSP)
– Enable a centralized scrubbing service with
high performance TPS
– CPE device at end customer site
 Symmetric or Out-of-band deployment
 Profile
– CPE provides full local mitigation
– Detection system analyses CPE data and
mitigate when needed
 BGP used to direct traffic to cloud based high
performance Thunder TPS for scrubbing
Asymmetric Reactive Deployment with CPE
ISP
Network
End
Customer
Services
DDoS Detection
System
aXAPI
Traffic
Redirection
TelemetryThunder TPS CPE
17©A10 Networks, Inc.
 Asymmetric Proactive Deployment
– For high performance DDoS detection and
mitigation
– DDoS detection and mitigation in one box
– Suitable for Large Enterprises and ISPs
 Protecting own services
 Protecting end customers
 Large-mid scale core network
 Profile
– Inbound traffic always routed toward TPS
 Insight in peace-time and war-time
– DDoS detection at sub-second scale
Asymmetric Proactive Deployment
Core Network
Services
End Customer
or Data Center
18©A10 Networks, Inc.
 Out-of-Band (TAP) Deployment
– High Speed DDoS Detection Capability
– Receive and analyze mirrored traffic data from routers
– Build dynamic Black/White lists
 Function as black/white list master
 Synchronize lists with cluster members
– Hybrid mode supported
– DDoS statistics and counters for DDoS detection
Out-of-Band (TAP) Deployment
Core Network
Data Center
Services
Mirrored Traffic
TAPTAP
Protocol Anomalies
Behavioral Analysis
Threat Intel Lists
Geolocation
Global Thresholds
User Thresholds
19©A10 Networks, Inc.
Thunder TPS Performance
Thunder
3030S TPS (CPE)
Thunder
4435 TPS
Thunder
5435 TPS
Thunder
6435 TPS
Mitigation Throughput 10 Gbps 38 Gbps 77 Gbps 155 Gbps
TCP SYN Auth/sec PPS* 6.5 million 35 million 40 million 70 million
SYN Cookies/sec PPS** 6.5 million 55 million 112 million 223 million
DDoS Attack Detection
and Mitigation
Software
Software
+ hardware assist
Software
+ hardware assist
Software
+ hardware assist
* Packets per second - CPU-based performance
** Packets per second - Hardware(FTA)-based performance
20©A10 Networks, Inc.
Thank you

Mais conteúdo relacionado

Mais procurados

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramBGA Cyber Security
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategyxKinAnx
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for merakiCisco Canada
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...Cisco Canada
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitShah Sheikh
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat IntelligenceCisco Canada
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsAnthony Daniel
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco Canada
 

Mais procurados (20)

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 

Destaque

A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Model relational
Model relationalModel relational
Model relationallikut101010
 
ISTSEC 2013 - Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini Atlatma
ISTSEC 2013 -  Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini AtlatmaISTSEC 2013 -  Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini Atlatma
ISTSEC 2013 - Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini AtlatmaBGA Cyber Security
 
Türkiye Sosyal Medya Pazarlama Trendleri
Türkiye Sosyal Medya Pazarlama TrendleriTürkiye Sosyal Medya Pazarlama Trendleri
Türkiye Sosyal Medya Pazarlama TrendleriErol Dizdar
 
State of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreState of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreErol Dizdar
 
TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...
TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...
TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...Erol Dizdar
 
Turkcell maxi iq
Turkcell maxi iqTurkcell maxi iq
Turkcell maxi iqErol Dizdar
 
Yurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecek
Yurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecekYurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecek
Yurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecekErol Dizdar
 
Facebook'taki Türk Bankaları
Facebook'taki Türk BankalarıFacebook'taki Türk Bankaları
Facebook'taki Türk BankalarıErol Dizdar
 
Normshield - Cloud Based Vulnerability Scan Service
Normshield - Cloud Based Vulnerability Scan Service Normshield - Cloud Based Vulnerability Scan Service
Normshield - Cloud Based Vulnerability Scan Service BGA Cyber Security
 
Never Settle: Reloaded
Never Settle: ReloadedNever Settle: Reloaded
Never Settle: ReloadedErol Dizdar
 
DevOps ile Siber Tehditler Karşısında 360 Derece Alan Hakimiyeti
DevOps ile Siber Tehditler Karşısında 360 Derece Alan HakimiyetiDevOps ile Siber Tehditler Karşısında 360 Derece Alan Hakimiyeti
DevOps ile Siber Tehditler Karşısında 360 Derece Alan HakimiyetiBGA Cyber Security
 
Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...
Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...
Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...Can K.
 
ISTSEC 2013 - Fuzzy Tabanlı Zaafiyet Araştırması
ISTSEC 2013 - Fuzzy Tabanlı Zaafiyet AraştırmasıISTSEC 2013 - Fuzzy Tabanlı Zaafiyet Araştırması
ISTSEC 2013 - Fuzzy Tabanlı Zaafiyet AraştırmasıBGA Cyber Security
 
Vim Cheatsheet penguen-efendi.com
Vim Cheatsheet penguen-efendi.comVim Cheatsheet penguen-efendi.com
Vim Cheatsheet penguen-efendi.comMert Hakki Bingol
 
Simtech mobil yarış simulatörü platformu
Simtech mobil yarış simulatörü platformuSimtech mobil yarış simulatörü platformu
Simtech mobil yarış simulatörü platformuErol Dizdar
 
ISTSEC 2013 - Garibanın APT Tespit Aracı
ISTSEC 2013 - Garibanın APT Tespit AracıISTSEC 2013 - Garibanın APT Tespit Aracı
ISTSEC 2013 - Garibanın APT Tespit AracıBGA Cyber Security
 
Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013
Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013
Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013Erol Dizdar
 

Destaque (20)

A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Model relational
Model relationalModel relational
Model relational
 
ISTSEC 2013 - Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini Atlatma
ISTSEC 2013 -  Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini AtlatmaISTSEC 2013 -  Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini Atlatma
ISTSEC 2013 - Kurumsal Ağlarda Kullanılan Güvenlik Sistemlerini Atlatma
 
Türkiye Sosyal Medya Pazarlama Trendleri
Türkiye Sosyal Medya Pazarlama TrendleriTürkiye Sosyal Medya Pazarlama Trendleri
Türkiye Sosyal Medya Pazarlama Trendleri
 
State of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is coreState of the Global Mobile Consumer: Connectivity is core
State of the Global Mobile Consumer: Connectivity is core
 
GRE Nedir
GRE NedirGRE Nedir
GRE Nedir
 
TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...
TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...
TBMM Bilişim ve İnternet Araştırma Komisyonu: Günümüz Dünyasında İnternetin S...
 
Turkcell maxi iq
Turkcell maxi iqTurkcell maxi iq
Turkcell maxi iq
 
Yurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecek
Yurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecekYurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecek
Yurt dışından getirilen telefonlar e-devlet'ten kayıt edilebilecek
 
Jmeter ile uygulama katmanında yük testi gerçekleştirme
Jmeter ile uygulama katmanında yük testi gerçekleştirmeJmeter ile uygulama katmanında yük testi gerçekleştirme
Jmeter ile uygulama katmanında yük testi gerçekleştirme
 
Facebook'taki Türk Bankaları
Facebook'taki Türk BankalarıFacebook'taki Türk Bankaları
Facebook'taki Türk Bankaları
 
Normshield - Cloud Based Vulnerability Scan Service
Normshield - Cloud Based Vulnerability Scan Service Normshield - Cloud Based Vulnerability Scan Service
Normshield - Cloud Based Vulnerability Scan Service
 
Never Settle: Reloaded
Never Settle: ReloadedNever Settle: Reloaded
Never Settle: Reloaded
 
DevOps ile Siber Tehditler Karşısında 360 Derece Alan Hakimiyeti
DevOps ile Siber Tehditler Karşısında 360 Derece Alan HakimiyetiDevOps ile Siber Tehditler Karşısında 360 Derece Alan Hakimiyeti
DevOps ile Siber Tehditler Karşısında 360 Derece Alan Hakimiyeti
 
Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...
Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...
Kısıtlar İçerecek Şekilde Revize Edilmiş Atama Algoritmasına Ait Bir Uygulama...
 
ISTSEC 2013 - Fuzzy Tabanlı Zaafiyet Araştırması
ISTSEC 2013 - Fuzzy Tabanlı Zaafiyet AraştırmasıISTSEC 2013 - Fuzzy Tabanlı Zaafiyet Araştırması
ISTSEC 2013 - Fuzzy Tabanlı Zaafiyet Araştırması
 
Vim Cheatsheet penguen-efendi.com
Vim Cheatsheet penguen-efendi.comVim Cheatsheet penguen-efendi.com
Vim Cheatsheet penguen-efendi.com
 
Simtech mobil yarış simulatörü platformu
Simtech mobil yarış simulatörü platformuSimtech mobil yarış simulatörü platformu
Simtech mobil yarış simulatörü platformu
 
ISTSEC 2013 - Garibanın APT Tespit Aracı
ISTSEC 2013 - Garibanın APT Tespit AracıISTSEC 2013 - Garibanın APT Tespit Aracı
ISTSEC 2013 - Garibanın APT Tespit Aracı
 
Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013
Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013
Türkiye'de Mobil Tüketiciyi Anlama Mayıs 2013
 

Semelhante a 8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applications & Networks

Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 RadwareINFOTIME
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
How to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsHow to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsShain Singh
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPROIDEA
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
iWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience SolutioniWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience Solutionxband
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlowAuditor
 

Semelhante a 8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applications & Networks (20)

Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
20070605 Radware
20070605 Radware20070605 Radware
20070605 Radware
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
How to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsHow to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted Threats
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
iWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience SolutioniWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience Solution
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 

Mais de BGA Cyber Security

WEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesiWEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesiBGA Cyber Security
 
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdfTatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdfBGA Cyber Security
 
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
Ücretsiz Bilgi Güvenliği Farkındalık EğitimiÜcretsiz Bilgi Güvenliği Farkındalık Eğitimi
Ücretsiz Bilgi Güvenliği Farkındalık EğitimiBGA Cyber Security
 
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?BGA Cyber Security
 
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware SaldırılarıBir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware SaldırılarıBGA Cyber Security
 
Webinar: Popüler black marketler
Webinar: Popüler black marketlerWebinar: Popüler black marketler
Webinar: Popüler black marketlerBGA Cyber Security
 
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıWebinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıBGA Cyber Security
 
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020BGA Cyber Security
 
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm ÖnerileriDNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm ÖnerileriBGA Cyber Security
 
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Webinar: Siber Güvenlikte Olgunluk Seviyesini ArttırmakWebinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Webinar: Siber Güvenlikte Olgunluk Seviyesini ArttırmakBGA Cyber Security
 
Open Source Soc Araçları Eğitimi 2020-II
Open Source Soc Araçları Eğitimi 2020-IIOpen Source Soc Araçları Eğitimi 2020-II
Open Source Soc Araçları Eğitimi 2020-IIBGA Cyber Security
 
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner GüvenliğiWebinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner GüvenliğiBGA Cyber Security
 
Hacklenmiş Windows Sistem Analizi
Hacklenmiş Windows Sistem AnaliziHacklenmiş Windows Sistem Analizi
Hacklenmiş Windows Sistem AnaliziBGA Cyber Security
 
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİRAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİBGA Cyber Security
 
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing RaporuBGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing RaporuBGA Cyber Security
 
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu ÇözümlerSOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu ÇözümlerBGA Cyber Security
 
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of SecretsVeri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of SecretsBGA Cyber Security
 
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi ToplamaAktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi ToplamaBGA Cyber Security
 

Mais de BGA Cyber Security (20)

WEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesiWEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
 
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdfTatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
 
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
Ücretsiz Bilgi Güvenliği Farkındalık EğitimiÜcretsiz Bilgi Güvenliği Farkındalık Eğitimi
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
 
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?
 
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware SaldırılarıBir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
 
Webinar: Popüler black marketler
Webinar: Popüler black marketlerWebinar: Popüler black marketler
Webinar: Popüler black marketler
 
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıWebinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
 
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
 
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm ÖnerileriDNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
 
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Webinar: Siber Güvenlikte Olgunluk Seviyesini ArttırmakWebinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
 
Open Source Soc Araçları Eğitimi 2020-II
Open Source Soc Araçları Eğitimi 2020-IIOpen Source Soc Araçları Eğitimi 2020-II
Open Source Soc Araçları Eğitimi 2020-II
 
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner GüvenliğiWebinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
 
Hacklenmiş Windows Sistem Analizi
Hacklenmiş Windows Sistem AnaliziHacklenmiş Windows Sistem Analizi
Hacklenmiş Windows Sistem Analizi
 
Open Source SOC Kurulumu
Open Source SOC KurulumuOpen Source SOC Kurulumu
Open Source SOC Kurulumu
 
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİRAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
 
Siber Fidye 2020 Raporu
Siber Fidye 2020 RaporuSiber Fidye 2020 Raporu
Siber Fidye 2020 Raporu
 
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing RaporuBGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
 
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu ÇözümlerSOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
 
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of SecretsVeri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
 
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi ToplamaAktif Dizin (Active Directory) Güvenlik Testleri - I:  Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applications & Networks

  • 1. ©A10 Networks, Inc. SSL Insight & TPS Accelerating and Securing Applications & Networks 09242014 Arzu Akkaya aakkaya@a10networks.com Sinan İlkiz silkiz@a10networks.com
  • 2. 2©A10 Networks, Inc. 3400+ Customers in 65 Countries Web GiantsEnterprisesService Providers 3 of Top 4 U.S. WIRELESS CARRIERS 7 of Top 10 U.S. CABLE PROVIDERS Top 3 WIRELESS CARRIERS IN JAPAN
  • 3. SSL Insight Uncover Hidden Threats in Encrypted Traffic
  • 4. 4©A10 Networks, Inc. Uncover Hidden Threats in Encrypted Traffic of Internet traffic is encrypted with SSL 25% 35% of all attacks will use encrypted traffic to bypass controls by 2017 More than 50% of organizations with a firewall, IPS or UTM appliance decrypt inbound or outbound SSL traffic Less than 20% average performance loss of leading firewalls when decrypting traffic 81% more of the most popular websites use SSL in 2014 than 2013 48%  NSS Labs, “SSL Performance Problems"  StackExchange analysis on key lengths  NetCraft SSL Survey
  • 5. 5©A10 Networks, Inc. Challenge Malicious users leverage SSL encryption to conceal their exploits. Organizations need a powerful, high-performance platform to decrypt SSL traffic. Solution A10 Networks enables organizations to analyze all data, including encrypted data, by intercepting SSL communications and sending it to 3rd party security devices such as firewalls, threat prevention platforms and forensic tools for inspection. Uncover Hidden Threats in Encrypted Traffic
  • 6. 6©A10 Networks, Inc. SSL Insight Traffic Flow 1. Encrypted traffic from the client is decrypted by the internal, client-side Thunder ADC 2. Thunder ADC sends the unencrypted data to a security appliance which inspects the data in clear text 3. The external Thunder ADC re-encrypts the data and sends it to the server 4. The server sends an encrypted response to the external Thunder ADC 5. Thunder ADC decrypts the response and forwards it to the security device for inspection 6. The internal ADC receives traffic from the security device, re-encrypts it and sends it to the client
  • 7. 7©A10 Networks, Inc. SSL Insight With SSL Insight, organizations can,  Achieve high performance with SSL acceleration hardware  Scale security with load balancing  Reduce load on security infrastructure by controlling which types of traffic to decrypt  Granularly control traffic with aFleX policies  Selectively bypass sensitive web applications* * With ACOS 4.0.1
  • 8. 8©A10 Networks, Inc. A Single Point for Decryption and Analysis Thunder ADC can work with – Firewalls – Intrusion Prevention Systems (IPS) – Unified Threat Management (UTM) platforms – Data Loss Prevention (DLP) products – Threat prevention platforms – Network forensics and web monitoring tools Inline Non-Inline
  • 9. 9©A10 Networks, Inc. SSL Insight Performance & Summary  Scalability, with up to 23.8 Gbps of SSL inspection performance in a standard configuration  Load Balancing of security devices to maximize uptime and scale security  Advanced SSL Insight features like URL classification subscriptions, untrusted certificate handling,1 and more  Hardware Security Module (HSM) integration for FIPS 140-2 Level 3 compliant SSL key management  Traffic steering to intelligently route traffic, optimize performance and reduce security appliance costs  Validated interoperability with FireEye, RSA, IBM and other leading inspection products ensure that our solutions work together
  • 10. Threat Protection System High-performance, Network-wide DDoS Protection
  • 11. 11©A10 Networks, Inc. DDoS Problems Q3 2010 PayPal Discloses cost of attack £3.5M (~$5.8 million) Q1 2013 Credit Union Regulators Recommend DDoS protection to all members Q4 2012 Bank of the West $900k stolen, DDoS as a distraction Q1 2013 al Qassam Cyber Fighters 10-40 Gbps attacks target 9 major banks Q1 2014 CloudFlare 400 Gbps NTP amplification attack Q4 2013 60 Gbps attacks regularly seen,100 Gbps not uncommon Q4 2013 26% YoY attack increase (17% L7, 28% L3-4) Q4 2013 PPS reaches 35 million Q4 2013 6.8 million mobile devices are potential attackers (LOIC and AnDOSid) “High-bandwidth DDoS attacks are becoming the new norm and will continue wreaking havoc on unprepared enterprises” Source: Gartner
  • 12. 12©A10 Networks, Inc. Thunder Threat Protection System (TPS) Next Generation DDoS Protection Multi-vector Application & Network Protection High Performance Mitigation Broad Deployment Options & 3rd Party Integration Multi-vector Protection  Detect & mitigate application & network attacks  Flexible scripting & DPI for rapid response High Performance  Mitigate 10 – 155 Gbps of attack throughput, 200 M packets per second (PPS) in 1 rack unit Broad Deployment & 3rd Party  Symmetric, asymmetric, out-of-band  Open SDK/RESTful API for 3rd party integration
  • 13. 13©A10 Networks, Inc. Five principal methods for effective mitigation Mitigating DDoS Attacks Packet anomaly check: Network level packet sanity check (conformance) Authentication challenge: Network and application level validation of client origination integrity Black and white lists: Network level high speed inspection and control Traffic rate control: Network and application monitoring to rate limit traffic Protocol and application check: Network and application
  • 14. 14©A10 Networks, Inc. Real-time DetectionFlood Thresholds Protocol Anomalies Behavioral Anomalies Resource Starvation L7 Scripts Black Lists HTTP DNSTCPUDP  Symmetric Deployment – Inline DDoS detection and mitigation in one box – Inspect both inbound and outbound traffic – Suitable for Enterprises  Protecting own services  Permanent protection  Sub-second detection-to-mitigation  Profile – Detect and inspect L3 – L7 traffic for both inbound and outbound traffic – Deep statistics sFlow export – DDoS detection and mitigation at sub-second scale Symmetric Deployment Telemetry DDoS Detection System Collection Device Services
  • 15. 15©A10 Networks, Inc.  Asymmetric Reactive deployment – Classic deployment model – Scalable solution for DDoS mitigation  Oversubscribed bandwidth deployment  No additional latency in peace time  Longer time to mitigate – Suitable for Service Providers  Protecting select services  Large scale core network  Profile – Traffic redirected to TPS for scrubbing as needed  Support BGP for route injection – Valid traffic forwarded into network for services  Support GRE & IP-in-IP tunneling Asymmetric Reactive Deployment Core Network End Customer or Data Center Services DDoS Detection System aXAPI / Manual Action Traffic Redirection Telemetry
  • 16. 16©A10 Networks, Inc. MSSP Network  Asymmetric Reactive Model with CPE – Recommended for Managed Security Service Providers (MSSP) – Enable a centralized scrubbing service with high performance TPS – CPE device at end customer site  Symmetric or Out-of-band deployment  Profile – CPE provides full local mitigation – Detection system analyses CPE data and mitigate when needed  BGP used to direct traffic to cloud based high performance Thunder TPS for scrubbing Asymmetric Reactive Deployment with CPE ISP Network End Customer Services DDoS Detection System aXAPI Traffic Redirection TelemetryThunder TPS CPE
  • 17. 17©A10 Networks, Inc.  Asymmetric Proactive Deployment – For high performance DDoS detection and mitigation – DDoS detection and mitigation in one box – Suitable for Large Enterprises and ISPs  Protecting own services  Protecting end customers  Large-mid scale core network  Profile – Inbound traffic always routed toward TPS  Insight in peace-time and war-time – DDoS detection at sub-second scale Asymmetric Proactive Deployment Core Network Services End Customer or Data Center
  • 18. 18©A10 Networks, Inc.  Out-of-Band (TAP) Deployment – High Speed DDoS Detection Capability – Receive and analyze mirrored traffic data from routers – Build dynamic Black/White lists  Function as black/white list master  Synchronize lists with cluster members – Hybrid mode supported – DDoS statistics and counters for DDoS detection Out-of-Band (TAP) Deployment Core Network Data Center Services Mirrored Traffic TAPTAP Protocol Anomalies Behavioral Analysis Threat Intel Lists Geolocation Global Thresholds User Thresholds
  • 19. 19©A10 Networks, Inc. Thunder TPS Performance Thunder 3030S TPS (CPE) Thunder 4435 TPS Thunder 5435 TPS Thunder 6435 TPS Mitigation Throughput 10 Gbps 38 Gbps 77 Gbps 155 Gbps TCP SYN Auth/sec PPS* 6.5 million 35 million 40 million 70 million SYN Cookies/sec PPS** 6.5 million 55 million 112 million 223 million DDoS Attack Detection and Mitigation Software Software + hardware assist Software + hardware assist Software + hardware assist * Packets per second - CPU-based performance ** Packets per second - Hardware(FTA)-based performance