SlideShare ist ein Scribd-Unternehmen logo
1 von 39
DefensePro Sales Presentation
APSolute Attack
Prevention
October 2010
Name, Title
Agenda
• Data center security challenges and threats
• The solution: APSolute attack prevention with DefensePro
• Introducing DefensePro building blocks
– Protections set
– OnDemand switch platform
– APSolute Vision
• Emergency Response Team
• Customer success
• Summary
Slide 2
Network & Data Center Security Challenges
• Availability
– How do you ensure business applications are
delivered under attacks?
• Performance
– How do you ensure consistent user experience when
your network is under attack?
• Security
– What is the cost of data loss or abuse of your
resources?
• Scalability
– How do you ensure future growth while minimizing
initial spending?
• Cost reduction
– How to address all the above while reducing costs?
Slide 3
We focus on data center application delivery and security
Protection tools
Intrusion Prevention
Network & Data Center Threats
Slide 4
Threats
Application vulnerability
Information theft
Authentication defeat
Malware spread
Network anomalies
Application downtime
Network downtime
Phishing, Trojans,
Spam, Botnets
Behavioral Analysis
DoS Protection
Reputation Services
July 2009 Cyber Attacks – From The News
Slide 5
Slide 6
July 2009 Cyber Attacks: Mapping The Attacks
Internet
Public Web Servers
Bot
(Infected host)
Bot
(Infected host)
Attacker
BOT Command
C&C Server
Bot
(Infected host)
Bot
(Infected host)
Legitimate User
Mydoom.EA Botnet Characteristics
• ~50,000 zombie computers
• Diversified attacks:
• HTTP page flood
• SYN flood with packet anomalies
• UDP flood
• ICMP flood
• Destinations in US and S/Korea
• ~ 6-7 Gbps inbound traffic (>2 Million PPS)
July 2009 Cyber Attacks: Fighting Back
Slide 7
Attack Vector Solution
Bot malware spread IPS or
Network Behavior
Analysis
Bot Command & Control messages IPS
Application flooding
- HTTP page flood attack
Network Behavior
Analysis
Network flooding
- SYN/UDP/ICMP flood attack
DoS Protection
No single protection tool can handle
today’s data center threats
The Solution
Network & data center security: mapping the solutions
Slide 9
IPS DoS
Protection
NBA Reputation
Engine
APSolute attack prevention
for data centers
Internet
Access
Router
Web Servers
Application Servers
FirewallDoS
Protection
IPS
NBA
Anti Trojan /
phishing
DefensePro
 IPS
 DoS Protection
 NBA
 Anti Trojan, Anti Phishing
DefensePro
 IPS
 DoS Protection
 NBA
 Anti Trojan, Anti Phishing
Network & data center security: mapping the technologies
Slide 10
IPS DoS Protection NBA Reputation
Engine
Signature
Detection
Rate-based
Rate-based
Behavioral
Analysis
Signature
Detection
Anti Trojan,
Anti PhishingStateful
Inspection








SYN Cookies

User
Behavioral
Analysis
Application
Behavioral
Analysis


Slide 11
Introducing DefensePro
DefensePro is a real-time attack prevention device that protects
your application infrastructure against network and application
downtime, application vulnerability exploitation, malware spread,
network anomalies and information theft
DefensePro building blocks
Slide 12
DefensePro feature set
Slide 13
IPS: Static Signature Protection
• Signature protection
– Leading security research team
– Protection against known
application vulnerability exploits
– Weekly and emergency signature
updates
• Enables protection against
– Worms, Bots, Trojans, Phishing,
Spyware
– Web, Mail, SQL, VoIP (SIP), DNS
vulnerabilities
– Anonymizers, IPv6 attacks
– Microsoft vulnerabilities
– Protocol anomalies
Slide 14
DoS Protection: Real-time Signatures Protection
• Automatic real-time signature protection against network DDoS attacks:
– SYN floods
– TCP floods
– UDP/ICMP floods
• Value proposition
– Maintain critical application availability even under attack
– Block attacks without blocking legitimate user traffic
– Automatic, real-time protection against network flooding with no need for
human intervention
Slide 15
Network Behavioral Analysis: Real-time Signatures Protection
• NBA (Network behavioral analysis) detects abnormal user and
application transactions
• Automatic real-time signature protection against :
– Zero-minute Malware spread
– Application resource misuse such as:
• Brute force attacks
• Web application scanning
• HTTP page floods
• SIP Scans
• SIP Floods
• Value proposition
– Maintain critical application availability even under attack
– Block attacks without blocking legitimate user traffic
– Automatic, real-time protection against user and application resource
misuse with no need for human intervention
Slide 16
The Secret Sauce – Real-time Signatures
Public Network
Inbound Traffic
Outbound Traffic
Behavioral
Analysis
Abnormal
Activity
Detection
Inspection
Module
Real-Time
Signature
Inputs
- Network
- Servers
- Clients
Real-Time
Signature
Generation
Closed
Feedback
Enterprise
Network
Optimize Signature
Remove when attack
is over
Slide 17
DoS & DDoS
Application level threats
Zero-Minute
malware propagation
Standard Security Tools: HTTP Flood Example
Internet
Public Web Servers
HTTP Bot
(Infected host)
HTTP Bot
(Infected host)
Attacker
BOT Command
IRC Server
Misuse of Service
Resources
HTTP Bot
(Infected host)
HTTP Bot
(Infected host)
Static Signatures Approach
- No solution for low-volume attacks as requests
are legitimate
- Connection limit against high volume attacks
 Agnostic to the attacked page
 Blocks legitimate traffic
 High false-positives
Slide 18
Real-Time Signatures: Accurate Mitigation
Case: HTTP Page Flood Attack
Internet
Public Web Servers
HTTP Bot
(Infected host)
HTTP Bot
(Infected host)
Attacker
BOT Command
IRC Server
Misuse of Service
Resources
HTTP Bot
(Infected host)
HTTP Bot
(Infected host)
Behavioral Pattern Detection (1)
 Based on probability analysis identify which Web page
(or pages) has higher than normal hits
Behavioral Pattern Detection (2)
 Identify abnormal user activity
For example:
- Normal users download few pages per connection
- Abnormal users download many pages per connection
Real Time Signature:
 Block abnormal users’ access to the specific
page(s) under attack
Slide 19
Real-Time Signatures: Resistance to False Positive
Case: Flash Crowd Access
Internet
Public Web Servers
Legitimate User
Legitimate User
Legitimate User
Legitimate User
Behavioral Pattern Detection (1)
 Based on probability analysis identify which web page
(or pages) has higher than normal hits
Behavioral Pattern Detection (2)
 No detection of abnormal user activity
Attack not detected
 No real time signature is generated
 No user is blocked
Slide 20
Reputation Engine: real time feeds
• Protect network users from:
– Financial fraud
– Information theft
– Known & zero-minute malware spread
• Real time feeds from RSA Anti Fraud Command Center (AFCC)
– The industry’s largest, and most experienced anti-fraud team
• Preventing:
– Trojan installs & remote communications
– Communication with drop point (leak of user privileged information)
– Phishing attempts
• Availability: version 5.10 / October 2010
Slide 21
DefensePro feature set
Slide 22
OnDemand Switch: Architecture Designed for Attacks Prevention
Slide 23
OnDemand Switch
Platform Capacity up to
12Gbps
DoS Mitigation Engine
• ASIC based
• Prevent high volume
attacks
• Up to 10 Million PPS of
attack protection
NBA Protections
• Prevent application
resource misuse
• Prevent zero-minute
malware
Reputation Engine
• Anti Trojan & Phishing
IPS
• ASIC based String Match
Engine performing deep
packet inspection
• Prevent application
vulnerability exploits
Slide 24
The Competitive Advantage: Performance Under Attack
Multi-Gbps
Capacity
Legitimate
Traffic
10 Million
PPS
Attack
Traffic
Other Network Security Solutions
Multi-Gbps
Capacity
Legitimate
Traffic
+ Attack
Attack
Attack
Attack
Traffic
DefensePro
Device handles attack
traffic at the expense of
legitimate traffic!
Attack traffic does
not impact legitimate
traffic
OnDemand Attack Prevention: Models up to 12Gbps
• DefensePro x412 Behavioral Protection
– Models:
• DefensePro 4412 (4Gbps)
• DefensePro 8412 (8Gbps)
• DefensePro 12412 (12Gbps)
• DefensePro x412 IPS & Behavioral Protection
– Models:
• DefensePro 4412 (4Gbps)
• DefensePro 8412 (8Gbps)
• DefensePro x016 IPS & Behavioral Protection
– Models:
• DefensePro 1016 (1Gbps)
• DefensePro 2016 (2Gbps)
• DefensePro 3016 (3Gbps)
License Key Upgrade
Slide 25
On-Demand Attack Prevention: Value Proposition
• Unmatched Performance
– Leading industry performance up to 12Gbps with active
network security profiles
• OnDemand Scalability
– Scale up performance by increasing throughput using a
simple license upgrade
– No hardware replacement needed
• Investment Protection
– Buy what you need – prevent overspending for capacity
you don’t need now
– Pay-as-you-grow and only for the added throughput license
• No Upgrade Projects
– No hardware replacement, staging and network downtime
– Huge cost saving and best TCO
• Operational Simplicity and Standardization
– A standard, unified platform suitable for all throughput levels
– Savings on training, spares and maintenance
Slide 26
“Radware offers
low product and
maintenance
costs, as
compared with
most competitors.”
Greg Young & John Pescatore,
Gartner, April 2009
DefensePro: Monitoring and Reporting
Slide 27
APSolute Vision: Advanced Monitoring and Reporting
Slide 28
• Real-time monitoring
– Active attack details
• Historical reporting
– Per customer dashboards
– Custom reports
APSolute Vision: The Value Proposition
Slide 29
APSolute Vision helps Data Center IT managers improve business:
• Resilience
– Real-time identification, prioritization, and response to policy breaches,
cyber attacks and insider threats
• Agility
– Per user customization of real-time dashboards and historical reports.
• Efficiency
– Simplifies data center management
– Improves IT productivity
Emergency Response Team
ERT
Slide 31
ERT – Emergency Response Team
• Background: July 2009
– Massive DDoS Incidents in USA and Korea
– A new level of attacks both in terms of quality and quantity
– Radware decided to address such cases and to provide help for customers
under attack
• ERT’s Goal
– To provide swift and professional response that allows customers to
neutralize attacks and to restore network and service operational status
• Characteristics
– 24x7 Service
– Immediate Response
– Neutralize DoS/DDoS attacks and malware outbreaks
Slide 32
Customer success
Customer Case: Gmarket (1 of 2)
• About the Customer
– Gmarket Inc. (Nasdaq: GMKT) is Korea’s leading e-
commerce marketplace
– Gmarket derives their revenues from transaction fees
on the sale of products on their website and from
advertising
• The Need
– Web service protection
• Prevent Web vulnerabilities exploitation
• Prevent Web cracking (Web Scans & Brute Force)
• Prevent HTTP Page floods misusing web servers
– Anti-DoS solution
• Protect against unexpected high volume DDoS
attack which stop all web transaction services
– Secure Firewalls, L3 switches and web servers from
high volume attacks
“Radware’s DefensePro
is the only solution that
was able to provide us
with the most complete
intelligent solution to
protect our website and
our business "
– Park Eui-Won, Security
Team Leader
Slide 34
Customer Case: Gmarket (2 of 2)
• The Solution
Internet
Access
Router
Web
Servers
Firewall
Switch
Multiple
DefensePro
DoS Protection:
• Prevent high volume DoS/DDoS attacks
• Infrastructure Protection: Firewalls,
Switches, etc.
NBA protections:
• Prevent HTTP Page Flood attacks
• Brute Force attacks, Web vulnerability Scans
IPS:
• Prevent Web vulnerabilities exploitations
Slide 35
Summary
• “DefensePro 8412 is rated at 8Gbps and offers good performance coupled
with low latency under all normal and extreme traffic conditions.”
• “Performance in the high volume detection and mitigation tests was also
impeccable across the board, with perfect detection and mitigation at all load
levels.”
• “DefensePro’s dedicated DoS Mitigation Engine ensures that it will not become
the bottleneck under high volume attacks”
• “DefensePro completed all our tests without raising a single false positive alert”
• “Brute force attacks, slow port scans, web vulnerability scans and application
scanning… Network behavioural analysis technology is used to differentiate
the low and slow attack patterns from the legitimate network traffic.
DefensePro flawlessly handled these attacks”
• NSS Labs’ Rating: Recommended
– “Only the top technical products earn a recommend rating from NSS Labs”
NSS Report 2010 Highlight
Slide 37
DefensePro Differentiators
• Best security solution for networks and data centers in a
single box:
– Intrusion prevention (IPS)
– DoS protection
– Network behavioral analysis (NBA)
– Reputation Engine service
• Multi-patents security technology
• Best performing solution
– DoS Mitigator Engine - maintain throughput when under attack
• Best in class unified monitoring and reporting
• Lowest CapEx
– Multitude of security tools in a single box
– Pay-As-You-Grow – scalable platform selection
with license upgrade for throughput
• Lowest OpEx
– Automatic real-time signatures protection with
no need for human intervention
Slide 38
“Radware offers low product
and maintenance cost, as
compared with most
competitors.”
Greg Young & John Pescatore, Gartner,
April 2009
Attack Prevention Solution for RADWARE

Weitere ähnliche Inhalte

Was ist angesagt?

The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...Plain Concepts
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionCisco Canada
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
Why DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt TechnologiesWhy DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt TechnologiesMazeBolt Technologies
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltdos
 
Automatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesAutomatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesMazeBolt Technologies
 
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, LatviaDSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, LatviaAndris Soroka
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataCloudflare
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101Cloudflare
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedNetpluz Asia Pte Ltd
 

Was ist angesagt? (19)

The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Why DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt TechnologiesWhy DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt Technologies
 
Forti web
Forti webForti web
Forti web
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 
Automatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesAutomatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt Technologies
 
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, LatviaDSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 

Ähnlich wie Attack Prevention Solution for RADWARE

ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfTuPhan66
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...Ziv Ichilov
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...Amazon Web Services
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
 

Ähnlich wie Attack Prevention Solution for RADWARE (20)

ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
Information Security
Information SecurityInformation Security
Information Security
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 

Kürzlich hochgeladen

🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...
🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...
🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...rajputriyana310
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)Delhi Call girls
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)Delhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)Delhi Call girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Delhi Call girls
 
Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...
Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...
Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...rajputriyana310
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...Delhi Call girls
 
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Sector 5, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 5, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 5, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 5, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)Delhi Call girls
 
Professional Basic Selling Skills - 3.5.pdf
Professional Basic Selling Skills - 3.5.pdfProfessional Basic Selling Skills - 3.5.pdf
Professional Basic Selling Skills - 3.5.pdfAbddul Rahman Samir
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Delhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)Delhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)Delhi Call girls
 

Kürzlich hochgeladen (20)

🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...
🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...
🎢🎄🎃 Call Girls In The Orion Plaza Nehru Place ₭☎_9990431115_☎₭ Escorts ServiC...
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 57 (Gurgaon)
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 51 (Gurgaon)
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
 
Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...
Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...
Vip Call Girls In The Imperial New Delhi ₭☎_9990431115_☎₭ Escorts ServiCe Del...
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
 
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Sector 5, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 5, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 5, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 5, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 61 (Gurgaon)
 
Professional Basic Selling Skills - 3.5.pdf
Professional Basic Selling Skills - 3.5.pdfProfessional Basic Selling Skills - 3.5.pdf
Professional Basic Selling Skills - 3.5.pdf
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 65 (Gurgaon)
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 67 (Gurgaon)
 

Attack Prevention Solution for RADWARE

  • 1. DefensePro Sales Presentation APSolute Attack Prevention October 2010 Name, Title
  • 2. Agenda • Data center security challenges and threats • The solution: APSolute attack prevention with DefensePro • Introducing DefensePro building blocks – Protections set – OnDemand switch platform – APSolute Vision • Emergency Response Team • Customer success • Summary Slide 2
  • 3. Network & Data Center Security Challenges • Availability – How do you ensure business applications are delivered under attacks? • Performance – How do you ensure consistent user experience when your network is under attack? • Security – What is the cost of data loss or abuse of your resources? • Scalability – How do you ensure future growth while minimizing initial spending? • Cost reduction – How to address all the above while reducing costs? Slide 3 We focus on data center application delivery and security
  • 4. Protection tools Intrusion Prevention Network & Data Center Threats Slide 4 Threats Application vulnerability Information theft Authentication defeat Malware spread Network anomalies Application downtime Network downtime Phishing, Trojans, Spam, Botnets Behavioral Analysis DoS Protection Reputation Services
  • 5. July 2009 Cyber Attacks – From The News Slide 5
  • 6. Slide 6 July 2009 Cyber Attacks: Mapping The Attacks Internet Public Web Servers Bot (Infected host) Bot (Infected host) Attacker BOT Command C&C Server Bot (Infected host) Bot (Infected host) Legitimate User Mydoom.EA Botnet Characteristics • ~50,000 zombie computers • Diversified attacks: • HTTP page flood • SYN flood with packet anomalies • UDP flood • ICMP flood • Destinations in US and S/Korea • ~ 6-7 Gbps inbound traffic (>2 Million PPS)
  • 7. July 2009 Cyber Attacks: Fighting Back Slide 7 Attack Vector Solution Bot malware spread IPS or Network Behavior Analysis Bot Command & Control messages IPS Application flooding - HTTP page flood attack Network Behavior Analysis Network flooding - SYN/UDP/ICMP flood attack DoS Protection No single protection tool can handle today’s data center threats
  • 9. Network & data center security: mapping the solutions Slide 9 IPS DoS Protection NBA Reputation Engine APSolute attack prevention for data centers Internet Access Router Web Servers Application Servers FirewallDoS Protection IPS NBA Anti Trojan / phishing DefensePro  IPS  DoS Protection  NBA  Anti Trojan, Anti Phishing
  • 10. DefensePro  IPS  DoS Protection  NBA  Anti Trojan, Anti Phishing Network & data center security: mapping the technologies Slide 10 IPS DoS Protection NBA Reputation Engine Signature Detection Rate-based Rate-based Behavioral Analysis Signature Detection Anti Trojan, Anti PhishingStateful Inspection         SYN Cookies  User Behavioral Analysis Application Behavioral Analysis  
  • 11. Slide 11 Introducing DefensePro DefensePro is a real-time attack prevention device that protects your application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, network anomalies and information theft
  • 14. IPS: Static Signature Protection • Signature protection – Leading security research team – Protection against known application vulnerability exploits – Weekly and emergency signature updates • Enables protection against – Worms, Bots, Trojans, Phishing, Spyware – Web, Mail, SQL, VoIP (SIP), DNS vulnerabilities – Anonymizers, IPv6 attacks – Microsoft vulnerabilities – Protocol anomalies Slide 14
  • 15. DoS Protection: Real-time Signatures Protection • Automatic real-time signature protection against network DDoS attacks: – SYN floods – TCP floods – UDP/ICMP floods • Value proposition – Maintain critical application availability even under attack – Block attacks without blocking legitimate user traffic – Automatic, real-time protection against network flooding with no need for human intervention Slide 15
  • 16. Network Behavioral Analysis: Real-time Signatures Protection • NBA (Network behavioral analysis) detects abnormal user and application transactions • Automatic real-time signature protection against : – Zero-minute Malware spread – Application resource misuse such as: • Brute force attacks • Web application scanning • HTTP page floods • SIP Scans • SIP Floods • Value proposition – Maintain critical application availability even under attack – Block attacks without blocking legitimate user traffic – Automatic, real-time protection against user and application resource misuse with no need for human intervention Slide 16
  • 17. The Secret Sauce – Real-time Signatures Public Network Inbound Traffic Outbound Traffic Behavioral Analysis Abnormal Activity Detection Inspection Module Real-Time Signature Inputs - Network - Servers - Clients Real-Time Signature Generation Closed Feedback Enterprise Network Optimize Signature Remove when attack is over Slide 17 DoS & DDoS Application level threats Zero-Minute malware propagation
  • 18. Standard Security Tools: HTTP Flood Example Internet Public Web Servers HTTP Bot (Infected host) HTTP Bot (Infected host) Attacker BOT Command IRC Server Misuse of Service Resources HTTP Bot (Infected host) HTTP Bot (Infected host) Static Signatures Approach - No solution for low-volume attacks as requests are legitimate - Connection limit against high volume attacks  Agnostic to the attacked page  Blocks legitimate traffic  High false-positives Slide 18
  • 19. Real-Time Signatures: Accurate Mitigation Case: HTTP Page Flood Attack Internet Public Web Servers HTTP Bot (Infected host) HTTP Bot (Infected host) Attacker BOT Command IRC Server Misuse of Service Resources HTTP Bot (Infected host) HTTP Bot (Infected host) Behavioral Pattern Detection (1)  Based on probability analysis identify which Web page (or pages) has higher than normal hits Behavioral Pattern Detection (2)  Identify abnormal user activity For example: - Normal users download few pages per connection - Abnormal users download many pages per connection Real Time Signature:  Block abnormal users’ access to the specific page(s) under attack Slide 19
  • 20. Real-Time Signatures: Resistance to False Positive Case: Flash Crowd Access Internet Public Web Servers Legitimate User Legitimate User Legitimate User Legitimate User Behavioral Pattern Detection (1)  Based on probability analysis identify which web page (or pages) has higher than normal hits Behavioral Pattern Detection (2)  No detection of abnormal user activity Attack not detected  No real time signature is generated  No user is blocked Slide 20
  • 21. Reputation Engine: real time feeds • Protect network users from: – Financial fraud – Information theft – Known & zero-minute malware spread • Real time feeds from RSA Anti Fraud Command Center (AFCC) – The industry’s largest, and most experienced anti-fraud team • Preventing: – Trojan installs & remote communications – Communication with drop point (leak of user privileged information) – Phishing attempts • Availability: version 5.10 / October 2010 Slide 21
  • 23. OnDemand Switch: Architecture Designed for Attacks Prevention Slide 23 OnDemand Switch Platform Capacity up to 12Gbps DoS Mitigation Engine • ASIC based • Prevent high volume attacks • Up to 10 Million PPS of attack protection NBA Protections • Prevent application resource misuse • Prevent zero-minute malware Reputation Engine • Anti Trojan & Phishing IPS • ASIC based String Match Engine performing deep packet inspection • Prevent application vulnerability exploits
  • 24. Slide 24 The Competitive Advantage: Performance Under Attack Multi-Gbps Capacity Legitimate Traffic 10 Million PPS Attack Traffic Other Network Security Solutions Multi-Gbps Capacity Legitimate Traffic + Attack Attack Attack Attack Traffic DefensePro Device handles attack traffic at the expense of legitimate traffic! Attack traffic does not impact legitimate traffic
  • 25. OnDemand Attack Prevention: Models up to 12Gbps • DefensePro x412 Behavioral Protection – Models: • DefensePro 4412 (4Gbps) • DefensePro 8412 (8Gbps) • DefensePro 12412 (12Gbps) • DefensePro x412 IPS & Behavioral Protection – Models: • DefensePro 4412 (4Gbps) • DefensePro 8412 (8Gbps) • DefensePro x016 IPS & Behavioral Protection – Models: • DefensePro 1016 (1Gbps) • DefensePro 2016 (2Gbps) • DefensePro 3016 (3Gbps) License Key Upgrade Slide 25
  • 26. On-Demand Attack Prevention: Value Proposition • Unmatched Performance – Leading industry performance up to 12Gbps with active network security profiles • OnDemand Scalability – Scale up performance by increasing throughput using a simple license upgrade – No hardware replacement needed • Investment Protection – Buy what you need – prevent overspending for capacity you don’t need now – Pay-as-you-grow and only for the added throughput license • No Upgrade Projects – No hardware replacement, staging and network downtime – Huge cost saving and best TCO • Operational Simplicity and Standardization – A standard, unified platform suitable for all throughput levels – Savings on training, spares and maintenance Slide 26 “Radware offers low product and maintenance costs, as compared with most competitors.” Greg Young & John Pescatore, Gartner, April 2009
  • 27. DefensePro: Monitoring and Reporting Slide 27
  • 28. APSolute Vision: Advanced Monitoring and Reporting Slide 28 • Real-time monitoring – Active attack details • Historical reporting – Per customer dashboards – Custom reports
  • 29. APSolute Vision: The Value Proposition Slide 29 APSolute Vision helps Data Center IT managers improve business: • Resilience – Real-time identification, prioritization, and response to policy breaches, cyber attacks and insider threats • Agility – Per user customization of real-time dashboards and historical reports. • Efficiency – Simplifies data center management – Improves IT productivity
  • 32. ERT – Emergency Response Team • Background: July 2009 – Massive DDoS Incidents in USA and Korea – A new level of attacks both in terms of quality and quantity – Radware decided to address such cases and to provide help for customers under attack • ERT’s Goal – To provide swift and professional response that allows customers to neutralize attacks and to restore network and service operational status • Characteristics – 24x7 Service – Immediate Response – Neutralize DoS/DDoS attacks and malware outbreaks Slide 32
  • 34. Customer Case: Gmarket (1 of 2) • About the Customer – Gmarket Inc. (Nasdaq: GMKT) is Korea’s leading e- commerce marketplace – Gmarket derives their revenues from transaction fees on the sale of products on their website and from advertising • The Need – Web service protection • Prevent Web vulnerabilities exploitation • Prevent Web cracking (Web Scans & Brute Force) • Prevent HTTP Page floods misusing web servers – Anti-DoS solution • Protect against unexpected high volume DDoS attack which stop all web transaction services – Secure Firewalls, L3 switches and web servers from high volume attacks “Radware’s DefensePro is the only solution that was able to provide us with the most complete intelligent solution to protect our website and our business " – Park Eui-Won, Security Team Leader Slide 34
  • 35. Customer Case: Gmarket (2 of 2) • The Solution Internet Access Router Web Servers Firewall Switch Multiple DefensePro DoS Protection: • Prevent high volume DoS/DDoS attacks • Infrastructure Protection: Firewalls, Switches, etc. NBA protections: • Prevent HTTP Page Flood attacks • Brute Force attacks, Web vulnerability Scans IPS: • Prevent Web vulnerabilities exploitations Slide 35
  • 37. • “DefensePro 8412 is rated at 8Gbps and offers good performance coupled with low latency under all normal and extreme traffic conditions.” • “Performance in the high volume detection and mitigation tests was also impeccable across the board, with perfect detection and mitigation at all load levels.” • “DefensePro’s dedicated DoS Mitigation Engine ensures that it will not become the bottleneck under high volume attacks” • “DefensePro completed all our tests without raising a single false positive alert” • “Brute force attacks, slow port scans, web vulnerability scans and application scanning… Network behavioural analysis technology is used to differentiate the low and slow attack patterns from the legitimate network traffic. DefensePro flawlessly handled these attacks” • NSS Labs’ Rating: Recommended – “Only the top technical products earn a recommend rating from NSS Labs” NSS Report 2010 Highlight Slide 37
  • 38. DefensePro Differentiators • Best security solution for networks and data centers in a single box: – Intrusion prevention (IPS) – DoS protection – Network behavioral analysis (NBA) – Reputation Engine service • Multi-patents security technology • Best performing solution – DoS Mitigator Engine - maintain throughput when under attack • Best in class unified monitoring and reporting • Lowest CapEx – Multitude of security tools in a single box – Pay-As-You-Grow – scalable platform selection with license upgrade for throughput • Lowest OpEx – Automatic real-time signatures protection with no need for human intervention Slide 38 “Radware offers low product and maintenance cost, as compared with most competitors.” Greg Young & John Pescatore, Gartner, April 2009