SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
DDoS Protection Services
1 DDoS Protection
2 About us & global reach
3 Services & Solutions
4 Traffic Diversion
5 Response Time
6 Control Center
7 Capacity Backup
8 Partners
CONTENT
overview
9 Summary
1
DDoS Protection Strategies – General
Traditional Approaches
On Premises
Dedicated appliances
Pros
• Good for layer 7 attacks
• Enterprise control
Cons
• Vol. attacks (upstream)
• Requires in-house skills
Clean Pipe
ISP detects and mitigates.
Pros
• Cost effective
• Mature offering
Cons
• Low capacity ISP
• ISP agnostic
2
DDoS Protection Strategies – Providers
Traditional Approaches
CDN Provider
Web content is distributed,
mitigation done at the edge.
Web only.
Pros
• Always On
• New services (e.g.WAF)
Cons
• No DMZ protection
• Limited to Web
Scrubbing Center
Traffic redirection to closest
cleaning facility. Forward
good traffic.
Pros
• Effects ALL traffic
• Interact with CPE
Cons
• No auto-diversion*
• Require testing
3
SecurityDAM
overview
SecurityDAM offers
Managed Security Service
Providers (MSSPs) a quick
and easy way of adding
comprehensive Distributed
Denial of Service (DDoS)
protection service to their
security portfolio.
ABOUT US
SecurityDAM
Worldwide Resources
Radware Partner
SecurityDAM
Control Center
Monitoring & Alerting
MSSP Solutions
RAD Group
DDoS Protection
NOC/ERT Services
Hybrid Approach
Comprehensive evolving managed
DDoS Protection Services
5
OUR GLOBAL REACH
Global Network of Scrubbing Centers
US
>100 Gbps
Hong Kong
>20Gbps
Frankfurt
>100 Gbps
Current: >200 Gbps
200G
OUR NETWORK IS EXPANDING
Russia
<partner>
UK
<partner>
Hong Kong
<partner>
US
>50Gbps
Singapore
>20Gbps
Partners: >50 Gbps
250G
2014 Plans: >+100 Gbps
350G
SERVICES & SOLUTIONS
SecurityDAM Offering
SecurityDAM offers a complete DDoS Protection Services suit, with a flexible deployment
and responsibility offering, matching your current and future needs.
 White Label Service
Brand on SecurityDAM system
 Turnkey Service
Independent local system
 Backup Service
Mitigation capacity backup
SecurityDAM suite of services enables flexible provisioning of DDoS Protection Services
 Full Operational Services
SecurityDAM NOC and ERT
 Partial Operational Services
NOC / ERT / Support
 On Demand Service
for registered end-customers
7
OUR SERVICES
System and Team
Analysis
Real-time analysis and
adjustment of protection settings
Accounting
Flexible protection plans definitions
to match customer and market needs
Flexible Environment
Cloud-based environment
Best of bread flexible integration
Development
Evolving proprietary
mitigation tools
24x7 Support
NOC – monitoring, mitigation
and past mortem analysis
Research
DDoS tools and mitigation
techniques research
8
Traffic Diversion
Automated from the Control Center
Traffic diversion to Scrubbing Centers
BGP
AS / (/24)
network diversion
Route Change
direct route
changes
9
DNS
website diversion
(reverse-proxy)
RESPONSE TIME #1
Shortest Time-to-Mitigate
24x7 Monitoring
Real-time / Inline
Detection time measured in
seconds.
Alert
NOC / Customer
Analysis of attack
and mitigation measures.
CPE Only
Monitor on
premises
actions
Divert
Decide on
diversion
and engage
10
TIME TO MITIGATE
< 15 minutes, when diversion is needed
Time to mitigate
RESPONSE TIME
Short response time to new threats
SOFTWARE
Cloud Deployment
Quick deployment
of new measures
IDEA
New threats
Real-time analysis of
mitigation efficiency
DEVELOPING
New protections
COTS and custom mitigation
tools integration
12
13
Figure 1 Customer Dashboard
Real-time monitoring
 Traffic
 Setting
 Security & Operational
Signaling based Alerting
Diversion requests
Control Center
Managing DDoS Protection Service
14
Figure 2 Operator Dashboard
Global real-time views
 Traffic
 Setting
 Security & Operational
Signaling based Alerting
Control Center
Managing DDoS Protection Service
15
Figure 3 Reports
Summary Report
Account report aggregating
CPE and Scrubbing Center data
Detailed Report
Attack report per incident (with
aggregation)
Enhanced Reports (future)
External source integration to
produced reports.
Control Center
Managing DDoS Protection Service
CAPACITY BACKUP SERVICE
High rate attack mitigation via SecurityDAM
SD Net
Capacity backup
services for supporting
local scrubbing center
resource limitation.
Unified
Unified reporting cross
levels, with
aggregated date from
multiple mitigation
points.
IncreaseValue
ReduceCapEx
DDoS attack rate can be overwhelming
80/20 still apply  rely on cloud backup 16
Partners – JT Global
Operating SecurityDAM Independent System
Image
Placeholder 1
 UK Channel Island operator
 Customer DDoS Protection
 Banking
 Online businesses
 Stand-alone Control Center
 Stand-alone Scrubbing Center
Mark Stuchfield, (Head of Innovation
and Strategy, JT):
“SecurityDAM allows us to provide
these cloud security services to
multiple customers and at the same
time give them a visual indication of
what is going on”
17
Partners – Defense Center LLC
Operating SecurityDAM Independent System
 Russian MSSP
 Customer DDoS Protection
 Small businesses
 Enterprise networks
 Domestic Control Center
 Mitigation capacity backup
Valery Kirillov, (CEO):
“Business continuity is a prime
concern to our customers. Our multi-
layered DDoS protection will allow us
to provide the highest level of
mitigation capacity, backup by
SecurityDAM Emergency Response
Team service.”
18
SUMMARY
Basic flow
Clean
Reinjection
CC
51
Monitor
CPE
Mitigate / Alert
CPECC
2
Divert
To CC
3
Cloud
Mitigation
CC
4
Attack
End
CPE
6
19
SUMMARY
Attack Management Flow
20
On-premise CPE
mitigates the attack
Protected Organization
Signaling Messaging
Volumetric DDoS attack
blocks the Internet pipe
Clean traffic
Sharing essential
information for
attack mitigation
MSSP Scrubbing Center & NOC
SecurityDAM Global
Scrubbing Centers
MSSP/customer decide to
divert the traffic
MSSP local capacity exhausted;
initiate Capacity Backup
SUMMARY
SecurityDAM DDoS Protection Platform and Services
Customer
Portal
Operator
provisioning
and
management
Audit and
Accounting
Monitoring
End-to-End
Protection
Integrated Layered
DDoS protection
Smooth operation
Experts assistance
21
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

Weitere ähnliche Inhalte

Was ist angesagt?

DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDeivid Toledo
 
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDSorensenCPR
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application SecurityCloudflare
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREDeivid Toledo
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
momentum dns security case study
momentum dns security case studymomentum dns security case study
momentum dns security case studyJim Zhang
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsSteven_Jackson
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesCloudflare
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingCloudflare
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataGreat Wide Open
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceSagi Brody
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesCloudflare
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackCloudflare
 

Was ist angesagt? (20)

DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWARE
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
 
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic ManagerDNS Security (DNSSEC) With BIG-IP Global Traffic Manager
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
 
Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5Protection and Visibitlity of Encrypted Traffic by F5
Protection and Visibitlity of Encrypted Traffic by F5
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
momentum dns security case study
momentum dns security case studymomentum dns security case study
momentum dns security case study
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer Games
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart Routing
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
 
What You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS AttackWhat You Should Know Before The Next DDoS Attack
What You Should Know Before The Next DDoS Attack
 

Ähnlich wie SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPROIDEA
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...MazeBolt Technologies
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementRethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementCorsa Technology
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureCloudflare
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfTuPhan66
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPROIDEA
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centersNarendran Vaideeswaran
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...Sergiy Pitel
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 

Ähnlich wie SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK) (20)

PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementRethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security Enforcement
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking Infrastructure
 
Datacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter SchjøttDatacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter Schjøtt
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
 
Next-Gen DDoS Detection
Next-Gen DDoS DetectionNext-Gen DDoS Detection
Next-Gen DDoS Detection
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 

Kürzlich hochgeladen

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

  • 2. 1 DDoS Protection 2 About us & global reach 3 Services & Solutions 4 Traffic Diversion 5 Response Time 6 Control Center 7 Capacity Backup 8 Partners CONTENT overview 9 Summary 1
  • 3. DDoS Protection Strategies – General Traditional Approaches On Premises Dedicated appliances Pros • Good for layer 7 attacks • Enterprise control Cons • Vol. attacks (upstream) • Requires in-house skills Clean Pipe ISP detects and mitigates. Pros • Cost effective • Mature offering Cons • Low capacity ISP • ISP agnostic 2
  • 4. DDoS Protection Strategies – Providers Traditional Approaches CDN Provider Web content is distributed, mitigation done at the edge. Web only. Pros • Always On • New services (e.g.WAF) Cons • No DMZ protection • Limited to Web Scrubbing Center Traffic redirection to closest cleaning facility. Forward good traffic. Pros • Effects ALL traffic • Interact with CPE Cons • No auto-diversion* • Require testing 3
  • 5. SecurityDAM overview SecurityDAM offers Managed Security Service Providers (MSSPs) a quick and easy way of adding comprehensive Distributed Denial of Service (DDoS) protection service to their security portfolio.
  • 6. ABOUT US SecurityDAM Worldwide Resources Radware Partner SecurityDAM Control Center Monitoring & Alerting MSSP Solutions RAD Group DDoS Protection NOC/ERT Services Hybrid Approach Comprehensive evolving managed DDoS Protection Services 5
  • 7. OUR GLOBAL REACH Global Network of Scrubbing Centers US >100 Gbps Hong Kong >20Gbps Frankfurt >100 Gbps Current: >200 Gbps 200G OUR NETWORK IS EXPANDING Russia <partner> UK <partner> Hong Kong <partner> US >50Gbps Singapore >20Gbps Partners: >50 Gbps 250G 2014 Plans: >+100 Gbps 350G
  • 8. SERVICES & SOLUTIONS SecurityDAM Offering SecurityDAM offers a complete DDoS Protection Services suit, with a flexible deployment and responsibility offering, matching your current and future needs.  White Label Service Brand on SecurityDAM system  Turnkey Service Independent local system  Backup Service Mitigation capacity backup SecurityDAM suite of services enables flexible provisioning of DDoS Protection Services  Full Operational Services SecurityDAM NOC and ERT  Partial Operational Services NOC / ERT / Support  On Demand Service for registered end-customers 7
  • 9. OUR SERVICES System and Team Analysis Real-time analysis and adjustment of protection settings Accounting Flexible protection plans definitions to match customer and market needs Flexible Environment Cloud-based environment Best of bread flexible integration Development Evolving proprietary mitigation tools 24x7 Support NOC – monitoring, mitigation and past mortem analysis Research DDoS tools and mitigation techniques research 8
  • 10. Traffic Diversion Automated from the Control Center Traffic diversion to Scrubbing Centers BGP AS / (/24) network diversion Route Change direct route changes 9 DNS website diversion (reverse-proxy)
  • 11. RESPONSE TIME #1 Shortest Time-to-Mitigate 24x7 Monitoring Real-time / Inline Detection time measured in seconds. Alert NOC / Customer Analysis of attack and mitigation measures. CPE Only Monitor on premises actions Divert Decide on diversion and engage 10
  • 12. TIME TO MITIGATE < 15 minutes, when diversion is needed Time to mitigate
  • 13. RESPONSE TIME Short response time to new threats SOFTWARE Cloud Deployment Quick deployment of new measures IDEA New threats Real-time analysis of mitigation efficiency DEVELOPING New protections COTS and custom mitigation tools integration 12
  • 14. 13 Figure 1 Customer Dashboard Real-time monitoring  Traffic  Setting  Security & Operational Signaling based Alerting Diversion requests Control Center Managing DDoS Protection Service
  • 15. 14 Figure 2 Operator Dashboard Global real-time views  Traffic  Setting  Security & Operational Signaling based Alerting Control Center Managing DDoS Protection Service
  • 16. 15 Figure 3 Reports Summary Report Account report aggregating CPE and Scrubbing Center data Detailed Report Attack report per incident (with aggregation) Enhanced Reports (future) External source integration to produced reports. Control Center Managing DDoS Protection Service
  • 17. CAPACITY BACKUP SERVICE High rate attack mitigation via SecurityDAM SD Net Capacity backup services for supporting local scrubbing center resource limitation. Unified Unified reporting cross levels, with aggregated date from multiple mitigation points. IncreaseValue ReduceCapEx DDoS attack rate can be overwhelming 80/20 still apply  rely on cloud backup 16
  • 18. Partners – JT Global Operating SecurityDAM Independent System Image Placeholder 1  UK Channel Island operator  Customer DDoS Protection  Banking  Online businesses  Stand-alone Control Center  Stand-alone Scrubbing Center Mark Stuchfield, (Head of Innovation and Strategy, JT): “SecurityDAM allows us to provide these cloud security services to multiple customers and at the same time give them a visual indication of what is going on” 17
  • 19. Partners – Defense Center LLC Operating SecurityDAM Independent System  Russian MSSP  Customer DDoS Protection  Small businesses  Enterprise networks  Domestic Control Center  Mitigation capacity backup Valery Kirillov, (CEO): “Business continuity is a prime concern to our customers. Our multi- layered DDoS protection will allow us to provide the highest level of mitigation capacity, backup by SecurityDAM Emergency Response Team service.” 18
  • 20. SUMMARY Basic flow Clean Reinjection CC 51 Monitor CPE Mitigate / Alert CPECC 2 Divert To CC 3 Cloud Mitigation CC 4 Attack End CPE 6 19
  • 21. SUMMARY Attack Management Flow 20 On-premise CPE mitigates the attack Protected Organization Signaling Messaging Volumetric DDoS attack blocks the Internet pipe Clean traffic Sharing essential information for attack mitigation MSSP Scrubbing Center & NOC SecurityDAM Global Scrubbing Centers MSSP/customer decide to divert the traffic MSSP local capacity exhausted; initiate Capacity Backup
  • 22. SUMMARY SecurityDAM DDoS Protection Platform and Services Customer Portal Operator provisioning and management Audit and Accounting Monitoring End-to-End Protection Integrated Layered DDoS protection Smooth operation Experts assistance 21