Secure your business from today's sophisticated attacks.
Distributed denial-of-service (DDoS) attacks have changed in recent years. Motivations for aacks are increasingly financial or political, but the objective is the same: to cause a service outage. While there are still traditional aacks aimed at filling Internet pipes, aacks intended to exhaust application server resources are becoming more prevalent.
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
1. FERTILE GROUND FOR DDoS ATTACKS
DDoS attackers' tactics are evolving and causing damage in
multiple ways, continually affecting users around the globe.
The F5 DDoS Protection solution provides security against today’s multi-layer
DDoS attacks by combining the power of on-premises and cloud-based mitigation.
CONSTANT EVOLUTION OF ATTACKS
CHALLENGES
F5 MULTI-TIER ARCHITECTURE
SOLUTION
AN EVOLVING
THREAT NEEDS AN
EVOLVED DEFENSE
SECURE YOUR BUSINESS FROM
TODAY’S SOPHISTICATED ATTACKS
SOURCES: FTP.ISC.ORG, PHONEARENA.COM, NNGROUP.COM,
OPENRESOLVERPROJECT.ORG, CHANNELNOMICS.COM, BCG.COM
Distributed denial-of-service (DDoS) attacks
have changed in recent years. Motivations
for attacks are increasingly financial or
political, but the objective is the same: to
cause a service outage. While there are still
traditional attacks aimed at filling Internet
pipes, attacks intended to exhaust
application server resources are becoming
more prevalent.
F5 IS THE ONLY SOLUTION IN A POSITION TO COMBAT A DDoS ATTACK
while protecting the availability of an enterprise’s applications. This is what has enabled F5 customers around
the world to combat DDoS attacks every day for more than 10 years.
Connection speeds grow
by 50% per year.
More computational
horsepower is available
(Deep Blue 11.38 GFLOPS
1997 vs. Samsung Galaxy
S5 142 GFLOPS 2014).
Annual global Internet
economy will reach
US$4.2 trillion in 2016.
20+ million open DNS
resolvers can result in
amplification attacks.
DDoS attack tools
are easy to use or
cheap to rent.
An estimated 1 billion hosts
could mean an estimated
1 billion bots (local/mobile).
DAMAGES IN
ATTACKS CAN CAUSE:
Serious
financial loss
Loss of brand
reputation
Close to 90% of
enterprises attacked
were hit repeatedly
TIER 1
Cloud-Based Scrubbing On-Premises Volumetric and DNS
TIER 2
On-Premises Application and SSL
TIER 3
ATTACKS ARE:
Affecting various
layers of OSI
MULTI-LAYERED
111 attacks over
100Gbps in 2014
GROWING IN SIZE
DNS amplification,
SNMP, Internet
of Things
CHANGING VECTORS
Mitigates volumetric attacks
larger than inbound connection
limits
Serves as emergency backup for
existing on-premises solutions
Dedicated Security Operations
Center focused on evolving
threats
Protection against DNS and
network attacks
Provides local and global
traffic management
Defend applications with
zero-day attack protection
Protection from SSL and
HTTP attacks
Protection against
OWASP Top 10
application attacks
Strengthened security
with actionable attack
intelligence