SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS Engine: 
Strengthen the DNS Foundation
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Agenda 
Page 2 
Market Driver : BIND DNS Strengths and Weaknesses 
Hybrid DNS Engine : Next Generation DNS Appliance 
Hybrid DNS concept 
Using the Smart Architectures to deal with HDE 
Hybrid DNS Benefits 
Demo
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
DNS Security Risks Context 
Page 3 
DNS Attacks Are in Constant Growth: +200% 
Source: Quaterly Global DDoS Attack Reports, 1st Quarter 2013
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Bind is the Most Popular & Deployed DNS Engine 
Very flexible with the most comprehensive integration of RFCs 
De facto a “standard” 
Security Risks 
Most popular means main DNS server target for hackers 
Numerous security vulnerabilities (OS & DNS Service) 
Authoritative and recursive are not separated 
Performance Limitation 
BIND performances are not enough to efficiently mitigate DoS attacks 
Market Driver :BIND DNS Strengths & Weaknesses 
Page 4 
When compared with Q2 2012 (1.76 percent), Q1 2013 (6.97 percent), and Q2 2013 (7.25 percent), statistics indicate that DNS attacks are on the rise, both in the form of standard floods and Distributed Reflected Denial of Service (DrDoS) attacks. From Q2 2012 to Q2 2013, DNS attacks increased 5.49 percent. DNS attacks are usually directed at organizations with large infrastructures where oversight or misconfiguration of DNS services can cause severe impact to selected targets. Source: Prolexic Quaterly Global DDoS Attack Report
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS Technology: 3 DNS Engines in One Appliance 
DNS BIND (ISC), NSD and UNBOUND Cache (NLnetLAB) 
One Active DNS Engine at a Time 
The Hybrid DNS Engine is managed as a single entity: Automated synchronization 
Hybrid DNS Engine: Next Generation DNS Appliance 
Page 5 
NSD
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS takes advantage of SmartArchitectures 
Integrated Best Practices 
Configuration generated and pushed automatically 
No need to be a DNS expert 
Switching from one engine to another 
Is controlled by the Administrator 
Is done only if the underlying configuration is correct 
Is done without any DNS service interruption 
Dealing with Hybrid DNS : SmartArchitectures 
Page 6
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
3.Manage 
2.Deploy 
1.Design 
Master-Slave 
Template 
Service 
Master 
Slave 
Slave 
Architecture setup 
Slave 
Slave 
Master 
Master-Slave Template 
Master-Slave 
Template 
Management Appliance 
Available servers 
RR Zone Options … 
Management of the SmartArchitecture as one “Virtual server” 
Page 7 
SmartArchitecture™ Deployment & Management Automation
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS Engine for Hybrid DNS Architectures 
Simplify DNS Architecture Design, Deployment and Management with SmartArchitecture Templates 
The Hybrid DNS architecture is managed as a single entity 
HDE For Next Generation DNS Architecture 
Page 8 
Master 
Slave 
Slave 
Slave 
NSD 
NSD
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Block Zero-Day Vulnerabilities 
Eliminate single point of failure (SPoF) following security alerts 
Immediate remediation of security threats: Switch from a technology to another 
Strengthen DNS Architecture Security Foundation 
Baffle hackers with higher complexity of security footprint 
Enhance Agility & Risk Management to Security Threats 
No immediate need to update: Switch from a technology to another 
Test and plan before updating 
Improve Performances to Mitigate DoS Attacks 
Up to 300,000 qps 
Hybrid Technology Benefits 
Page 9
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
EfficientIP Company Overview 
Americas Headquarters- West Chester, Pennsylvania 
European Headquarters- Paris, France 
Since 2004 – Innovative DDI Software Company 
Smart DDI - SmartArchitecture, Hybrid DNS, Data Reconciliation, Compliancy Management, Unified Repository, VLAN & Device Management Integration 
Coverage in 60 Plus Countries 
Doubled Number of Employees in 2012 and Again in 2013 
Solid Financial Foundation – Organic Growth& Private Funding 
Full Value Add Services: Hardware Replacement & TAC access 24x7 
Strong Technological Alliances 
Page 10
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Customers 
Telecommunication 
Vodafone 
Colt 
T Mobile 
SFR 
Easynet 
KPN 
Telecom of Thailand 
Qatar Telecom 
Maskatel 
Virgin Mobile 
ONO 
Energy Repsol EDF GDF Suez Air Liquide Education Leeds University Hamburg University Paris University Utrecht University Pais Vasco University 
Banks & Insurances Allianz Zurich Financial Services Swiss Re Axa Wealth Standard Life Bank of France BRED Electronics-Defense Philips NXP Nokia Siemens Network Cassidian EADS Astrium 
Page 11 
Transportation 
Norbert Dentressangle 
SANEF 
APRR 
Metro of Madrid 
Metro of Paris 
Services 
Cap Gemini 
STERIA 
Adecco 
Sopra Group
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Page 12 
Demo

Weitere ähnliche Inhalte

Was ist angesagt?

The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Netpluz Asia Pte Ltd
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IPJisc
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderCloudflare
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition NetworkCollaborators
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůMarketingArrowECS_CZ
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensiveFidelis Cybersecurity
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureFidelis Cybersecurity
 

Was ist angesagt? (20)

The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 

Ähnlich wie EfficientIP webinar mitigate dns zero day vulnerability

Storage e Protezione dei Dati
Storage e Protezione dei DatiStorage e Protezione dei Dati
Storage e Protezione dei DatiJürgen Ambrosi
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSDevOps.com
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPROIDEA
 
FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...FusionLayer Inc.
 
IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017Andreas Taudte
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsF5 Networks
 
Hybrid Cloud – Live Demo
Hybrid Cloud – Live DemoHybrid Cloud – Live Demo
Hybrid Cloud – Live DemoAmit Gatenyo
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS ScalePeter Silva
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionDell EMC World
 
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerPresentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerIBM Switzerland
 
Dyna cloud algemeen
Dyna cloud   algemeenDyna cloud   algemeen
Dyna cloud algemeenOostNV
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalablePallavi Vyas
 
Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015VMUG IT
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventAruj Thirawat
 
Data Center Portfolio
Data Center PortfolioData Center Portfolio
Data Center PortfolioRobbie Rikard
 

Ähnlich wie EfficientIP webinar mitigate dns zero day vulnerability (20)

Storage e Protezione dei Dati
Storage e Protezione dei DatiStorage e Protezione dei Dati
Storage e Protezione dei Dati
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...
 
IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
Hybrid Cloud – Live Demo
Hybrid Cloud – Live DemoHybrid Cloud – Live Demo
Hybrid Cloud – Live Demo
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerPresentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
 
Dyna cloud algemeen
Dyna cloud   algemeenDyna cloud   algemeen
Dyna cloud algemeen
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely Scalable
 
Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Data Center Portfolio
Data Center PortfolioData Center Portfolio
Data Center Portfolio
 

Kürzlich hochgeladen

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 

Kürzlich hochgeladen (20)

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 

EfficientIP webinar mitigate dns zero day vulnerability

  • 1. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS Engine: Strengthen the DNS Foundation
  • 2. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Agenda Page 2 Market Driver : BIND DNS Strengths and Weaknesses Hybrid DNS Engine : Next Generation DNS Appliance Hybrid DNS concept Using the Smart Architectures to deal with HDE Hybrid DNS Benefits Demo
  • 3. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 DNS Security Risks Context Page 3 DNS Attacks Are in Constant Growth: +200% Source: Quaterly Global DDoS Attack Reports, 1st Quarter 2013
  • 4. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Bind is the Most Popular & Deployed DNS Engine Very flexible with the most comprehensive integration of RFCs De facto a “standard” Security Risks Most popular means main DNS server target for hackers Numerous security vulnerabilities (OS & DNS Service) Authoritative and recursive are not separated Performance Limitation BIND performances are not enough to efficiently mitigate DoS attacks Market Driver :BIND DNS Strengths & Weaknesses Page 4 When compared with Q2 2012 (1.76 percent), Q1 2013 (6.97 percent), and Q2 2013 (7.25 percent), statistics indicate that DNS attacks are on the rise, both in the form of standard floods and Distributed Reflected Denial of Service (DrDoS) attacks. From Q2 2012 to Q2 2013, DNS attacks increased 5.49 percent. DNS attacks are usually directed at organizations with large infrastructures where oversight or misconfiguration of DNS services can cause severe impact to selected targets. Source: Prolexic Quaterly Global DDoS Attack Report
  • 5. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS Technology: 3 DNS Engines in One Appliance DNS BIND (ISC), NSD and UNBOUND Cache (NLnetLAB) One Active DNS Engine at a Time The Hybrid DNS Engine is managed as a single entity: Automated synchronization Hybrid DNS Engine: Next Generation DNS Appliance Page 5 NSD
  • 6. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS takes advantage of SmartArchitectures Integrated Best Practices Configuration generated and pushed automatically No need to be a DNS expert Switching from one engine to another Is controlled by the Administrator Is done only if the underlying configuration is correct Is done without any DNS service interruption Dealing with Hybrid DNS : SmartArchitectures Page 6
  • 7. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 3.Manage 2.Deploy 1.Design Master-Slave Template Service Master Slave Slave Architecture setup Slave Slave Master Master-Slave Template Master-Slave Template Management Appliance Available servers RR Zone Options … Management of the SmartArchitecture as one “Virtual server” Page 7 SmartArchitecture™ Deployment & Management Automation
  • 8. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS Engine for Hybrid DNS Architectures Simplify DNS Architecture Design, Deployment and Management with SmartArchitecture Templates The Hybrid DNS architecture is managed as a single entity HDE For Next Generation DNS Architecture Page 8 Master Slave Slave Slave NSD NSD
  • 9. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Block Zero-Day Vulnerabilities Eliminate single point of failure (SPoF) following security alerts Immediate remediation of security threats: Switch from a technology to another Strengthen DNS Architecture Security Foundation Baffle hackers with higher complexity of security footprint Enhance Agility & Risk Management to Security Threats No immediate need to update: Switch from a technology to another Test and plan before updating Improve Performances to Mitigate DoS Attacks Up to 300,000 qps Hybrid Technology Benefits Page 9
  • 10. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 EfficientIP Company Overview Americas Headquarters- West Chester, Pennsylvania European Headquarters- Paris, France Since 2004 – Innovative DDI Software Company Smart DDI - SmartArchitecture, Hybrid DNS, Data Reconciliation, Compliancy Management, Unified Repository, VLAN & Device Management Integration Coverage in 60 Plus Countries Doubled Number of Employees in 2012 and Again in 2013 Solid Financial Foundation – Organic Growth& Private Funding Full Value Add Services: Hardware Replacement & TAC access 24x7 Strong Technological Alliances Page 10
  • 11. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Customers Telecommunication Vodafone Colt T Mobile SFR Easynet KPN Telecom of Thailand Qatar Telecom Maskatel Virgin Mobile ONO Energy Repsol EDF GDF Suez Air Liquide Education Leeds University Hamburg University Paris University Utrecht University Pais Vasco University Banks & Insurances Allianz Zurich Financial Services Swiss Re Axa Wealth Standard Life Bank of France BRED Electronics-Defense Philips NXP Nokia Siemens Network Cassidian EADS Astrium Page 11 Transportation Norbert Dentressangle SANEF APRR Metro of Madrid Metro of Paris Services Cap Gemini STERIA Adecco Sopra Group
  • 12. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Page 12 Demo