SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Arbor Networks
Poland. 3rd October 2013
Simon Cartwright
Director of Security Services!
Agenda	
  
	
  
•  Who	
  is	
  Arbor	
  ?	
  
•  What	
  is	
  DDoS	
  
•  Evolu3on	
  of	
  DDoS	
  	
  
•  Trends	
  in	
  DDoS	
  
•  A9ack	
  Traffic	
  Details	
  Poland	
  
•  Protec3on	
  Op3ons	
  
•  The	
  Enterprise	
  Ques3on	
  
•  Visibility	
  &	
  Control	
  
•  Ne3a/Arbor/NCR	
  Partnership	
  
•  Ques3ons.	
  At	
  Booth	
  
4	
  
Arbor - a Trusted & Proven Vendor Securing the World’s
Largest and Most Demanding Networks
90%
Percentage	
  of	
  world’s	
  	
  
Tier	
  1	
  service	
  providers	
  	
  
who	
  are	
  Arbor	
  customers	
  
107
Number	
  of	
  countries	
  
with	
  Arbor	
  products	
  
deployed	
  
47.1
Tbps
Amount	
  of	
  global	
  traffic	
  
monitored	
  by	
  the	
  ATLAS	
  security	
  
intelligence	
  ini3a3ve	
  right	
  now	
  –	
  
25%	
  of	
  global	
  Internet	
  traffic!	
  
#1
Arbor	
  market	
  posi3on	
  in	
  Carrier,	
  
Enterprise	
  and	
  Mobile	
  DDoS	
  
equipment	
  market	
  segments	
  –	
  	
  
61%	
  of	
  total	
  market	
  	
  
[Infone3cs	
  Research	
  Dec	
  2011]	
  
Number	
  of	
  years	
  Arbor	
  has	
  been	
  delivering	
  
innova3ve	
  security	
  and	
  network	
  visibility	
  
technologies	
  &	
  products	
  
13
$16B
2011	
  GAAP	
  revenues	
  [USD]	
  of	
  
Danaher	
  –	
  Arbor’s	
  parent	
  company	
  
providing	
  deep	
  financial	
  backing	
  
Arbor’s proud history of

productizing innovation

in distributed networks.#
Arbor is the most

trusted and widely

deployed solution for

DDoS & Botnets.#
Arbor sees more global

traffic and threats than

anyone else on the planet."
Only Arbor has a fully
integrated solution to
quickly detect & stop

advanced threats."
•  Honored as a top 10 global innovations#
•  Key patents in networking & security.#
•  Analyzing over 48TB of data per second#
•  Monitoring over 110K malware families#
•  Integrated to detect & stop threats anywhere#
•  See beyond the network through ATLAS#
•  Over 90% of the world’s Tier 1 ISPs#
•  9 of the top 10 largest business networks#
Arbor Networks Overview
Threat Landscape Era’s
Network	
  
Protocol	
  
Content	
  
Advanced	
  
Threats	
  
1999-­‐2005	
   2006-­‐2010	
   2010-­‐Today	
  
§  Synflood (Trinoo/TFN)
§  Code Red
§  Slammer
§  Zotob
§  Conficker (2008)
§  Web Browser
§  Web Applications
§  Doc/PDF/etc.
§  Flash/Shockwave
§  Java
§  Aurora
§  Operation Payback
§  Stuxnet/Flame/Duqu
§  APT
§  Cyber Warfare
During a Distributed Denial of Service (DDoS) attack,
compromised hosts or bots coming from distributed sources
overwhelm the target with illegitimate traffic so that the servers
can not respond to legitimate clients.
What is a DDoS Attack?
7	
  
DDoS
The DDoS weapon of
choice for Anonymous
activists LOIC, was
downloaded from the
internet 1.167.305 times
during 2011/12(sourceforge.net)
DDoS Motivations
9	
  
Everyone is a Target
10	
  
DDoS Devastating Costs
11	
  
*Neustar	
  Insights	
  DDoS	
  Survey:	
  Q1	
  2012	
  
The	
  impact	
  of	
  loss	
  of	
  service	
  availability	
  goes	
  beyond	
  financials:	
  
Opera@ons	
   Help	
  Desk	
   Recovery	
  
Employee	
  
Output	
  
Penal@es	
   Lost	
  Business	
  
Brand	
  &	
  
Reputa@on	
  
Damage	
  
35%	
  of	
  those	
  a9acked	
  
said	
  it	
  lasted	
  
More	
  than	
  a	
  day	
  
67%	
  of	
  retailers	
  said	
  outages	
  cost	
  
$100,000	
  	
  
per	
  hour	
  
21%	
  overall	
  said	
  outages	
  cost	
  
$50,000	
  	
  
per	
  hour	
  
Today’s Attacks are More Frequent
12	
  
Today’s Attacks
13	
  
2012	
   2013	
  (so	
  far….)	
  
Number	
  of	
  A9acks	
   713	
   986	
  
Average	
  Dura3on	
   38mins	
  37secs	
   29mins	
  50secs	
  
Longest	
  A9ack	
   1day	
  16hrs	
  07secs	
   1day	
  4hrs	
  45mins	
  58secs	
  
Volumetric
DDoS"
Bots &

Botnets"
Mobile

Malware"
Availability# Confidentiality#IMPACT"
THREAT

SPECTRUM"
The Next Generation of Threats
Netia’s Unique Threat Ecosystem
16	
  
The	
  ecosystem	
  between	
  smart	
  providers	
  &	
  enterprises	
  to	
  offer	
  
comprehensive	
  protec3on	
  from	
  ac3ve	
  threats	
  
Enterprise NetworksNetia
D	
  
Enterprise	
  data	
  center	
  services	
  are	
  now	
  fully	
  available	
  	
  
and	
  secure	
  from	
  advanced	
  threats!	
  
Diverse end-points are accessing
your network from anywhere."
Your assets are
distributed everywhere."
Corporate

Offices"
Broadband"Mobile"
Content" Corporate

Servers &

Applications"
SaaS"
A Global, Hybrid infrastructure"
Private

Network"
Public

Clouds"
Internet"
The Global Network is Your Business
CDNs"
Mobile

Carriers"
Service

Providers"
SaaS"
Cloud

Providers"
Enterprise

Perimeter"
Mobile

WiFi"
Employees"
Corporate

Servers"
Remote

Offices"
Internal

Apps"
Never see

the external

threat traffic"
Can’t

withstand a

direct attack"
Never see the

threat already

inside enterprise

"
Existing Solutions Have Critical Gaps
Cloud"
Pravail"
Availability Protection System"
Pravail"
Network Security Intelligence"
See and stop the

threat anywhere#
Stop

the threat#
See the threat lurking

inside the enterprise#
CDNs"
Mobile

Carriers"
Service

Providers"
SaaS"
Cloud

Providers"
Enterprise

Perimeter"
Mobile

WiFi"
Employees"
Corporate

Servers"
Remote

Offices"
Threat Dashboard"
Netia’s Solution Bridges the Gaps
Internal

Apps"
Users	
  
An@-­‐Virus	
  
IDS/IPS	
  
NAC	
  
Firewall	
  
	
  Secure	
  Trust	
  Perimeter	
  
Mobile	
  Users	
  
Malware	
  
BYOD	
  
Internet	
  
Mobile	
  Users	
  
Secure	
  Trust	
  Perimeter	
  
Insider	
  
Misuse	
  
Home	
  Office(s)	
  
Cloud	
  Services	
   VPN	
  
Malware	
  
Advanced Threats: From Outside AND Inside
Network boundaries are harder to define
–  Cloud based data and applications
–  Employee mobility / BYOD
–  Home Working 	
  	
  	
  	
  
Threats are harder to keep out
–  Targeted threats
–  Walk-in threats (on portable devices)
–  Malicious insider
Challenge: Control & Security of business data, applications and services
as businesses evolve.
Data	
  Center	
  
Attack Mitigation. In Poland
CP
TMS
Attack Mitigation. In Poland
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
2. Activate Mitigation (TMS)
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
2. Activate Mitigation (TMS)
3. Divert Traffic (Network wide: BGP OFF-Ramp announcement)
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
2. Activate Mitigation (TMS)
4. Clean the Traffic and forward the legitimate
(Network wide: using ON-Ramp Technique [e.g. MPLS, GRE, VLAN, …])
5. Protected
3. Divert Traffic (Network wide: BGP OFF-Ramp announcement)
CP
TMS
Thank You
Questions?
Nas nie zaatakują!

Más contenido relacionado

La actualidad más candente

Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
Real-Time Innovations (RTI)
 

La actualidad más candente (20)

Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
APrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of Things
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Open Source and the Internet of Things
Open Source and the Internet of ThingsOpen Source and the Internet of Things
Open Source and the Internet of Things
 
PANDI Meeting 12: Supporting resilience and security in Internet routing
PANDI Meeting 12: Supporting resilience and security in Internet routingPANDI Meeting 12: Supporting resilience and security in Internet routing
PANDI Meeting 12: Supporting resilience and security in Internet routing
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Ciena - the journey to the adaptive network
Ciena - the journey to the adaptive networkCiena - the journey to the adaptive network
Ciena - the journey to the adaptive network
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 

Similar a Nas nie zaatakują!

Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
ssusera76ea9
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 

Similar a Nas nie zaatakują! (20)

Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUSDETENIENDO LOS ATAQUES DDOS CON NSFOCUS
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 

Más de Biznes to Rozmowy

Más de Biznes to Rozmowy (20)

Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz AntoniewiczBezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
 
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
 
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek BrzoskowskiWarto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
 
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
 
Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?
 
The future of human: brand interface
The future of human: brand interfaceThe future of human: brand interface
The future of human: brand interface
 
Brand video
Brand videoBrand video
Brand video
 
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
 
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
 
Komunikacja po prostu.
Komunikacja po prostu.Komunikacja po prostu.
Komunikacja po prostu.
 
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjnośćKreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
 
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
 
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
 
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
 
Video will touch us all.
Video will touch us all.Video will touch us all.
Video will touch us all.
 
WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.
 
Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.
 
What's Next
What's NextWhat's Next
What's Next
 
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
 
Megatrendy – nowoczesne technologie zmieniające przyszłość
Megatrendy – nowoczesne technologie zmieniające przyszłośćMegatrendy – nowoczesne technologie zmieniające przyszłość
Megatrendy – nowoczesne technologie zmieniające przyszłość
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Nas nie zaatakują!

  • 1. Arbor Networks Poland. 3rd October 2013 Simon Cartwright Director of Security Services!
  • 2. Agenda     •  Who  is  Arbor  ?   •  What  is  DDoS   •  Evolu3on  of  DDoS     •  Trends  in  DDoS   •  A9ack  Traffic  Details  Poland   •  Protec3on  Op3ons   •  The  Enterprise  Ques3on   •  Visibility  &  Control   •  Ne3a/Arbor/NCR  Partnership   •  Ques3ons.  At  Booth  
  • 3. 4   Arbor - a Trusted & Proven Vendor Securing the World’s Largest and Most Demanding Networks 90% Percentage  of  world’s     Tier  1  service  providers     who  are  Arbor  customers   107 Number  of  countries   with  Arbor  products   deployed   47.1 Tbps Amount  of  global  traffic   monitored  by  the  ATLAS  security   intelligence  ini3a3ve  right  now  –   25%  of  global  Internet  traffic!   #1 Arbor  market  posi3on  in  Carrier,   Enterprise  and  Mobile  DDoS   equipment  market  segments  –     61%  of  total  market     [Infone3cs  Research  Dec  2011]   Number  of  years  Arbor  has  been  delivering   innova3ve  security  and  network  visibility   technologies  &  products   13 $16B 2011  GAAP  revenues  [USD]  of   Danaher  –  Arbor’s  parent  company   providing  deep  financial  backing  
  • 4. Arbor’s proud history of
 productizing innovation
 in distributed networks.# Arbor is the most
 trusted and widely
 deployed solution for
 DDoS & Botnets.# Arbor sees more global
 traffic and threats than
 anyone else on the planet." Only Arbor has a fully integrated solution to quickly detect & stop
 advanced threats." •  Honored as a top 10 global innovations# •  Key patents in networking & security.# •  Analyzing over 48TB of data per second# •  Monitoring over 110K malware families# •  Integrated to detect & stop threats anywhere# •  See beyond the network through ATLAS# •  Over 90% of the world’s Tier 1 ISPs# •  9 of the top 10 largest business networks# Arbor Networks Overview
  • 5. Threat Landscape Era’s Network   Protocol   Content   Advanced   Threats   1999-­‐2005   2006-­‐2010   2010-­‐Today   §  Synflood (Trinoo/TFN) §  Code Red §  Slammer §  Zotob §  Conficker (2008) §  Web Browser §  Web Applications §  Doc/PDF/etc. §  Flash/Shockwave §  Java §  Aurora §  Operation Payback §  Stuxnet/Flame/Duqu §  APT §  Cyber Warfare
  • 6. During a Distributed Denial of Service (DDoS) attack, compromised hosts or bots coming from distributed sources overwhelm the target with illegitimate traffic so that the servers can not respond to legitimate clients. What is a DDoS Attack? 7  
  • 7. DDoS The DDoS weapon of choice for Anonymous activists LOIC, was downloaded from the internet 1.167.305 times during 2011/12(sourceforge.net)
  • 9. Everyone is a Target 10  
  • 10. DDoS Devastating Costs 11   *Neustar  Insights  DDoS  Survey:  Q1  2012   The  impact  of  loss  of  service  availability  goes  beyond  financials:   Opera@ons   Help  Desk   Recovery   Employee   Output   Penal@es   Lost  Business   Brand  &   Reputa@on   Damage   35%  of  those  a9acked   said  it  lasted   More  than  a  day   67%  of  retailers  said  outages  cost   $100,000     per  hour   21%  overall  said  outages  cost   $50,000     per  hour  
  • 11. Today’s Attacks are More Frequent 12  
  • 12. Today’s Attacks 13   2012   2013  (so  far….)   Number  of  A9acks   713   986   Average  Dura3on   38mins  37secs   29mins  50secs   Longest  A9ack   1day  16hrs  07secs   1day  4hrs  45mins  58secs  
  • 14. Netia’s Unique Threat Ecosystem 16   The  ecosystem  between  smart  providers  &  enterprises  to  offer   comprehensive  protec3on  from  ac3ve  threats   Enterprise NetworksNetia D   Enterprise  data  center  services  are  now  fully  available     and  secure  from  advanced  threats!  
  • 15. Diverse end-points are accessing your network from anywhere." Your assets are distributed everywhere." Corporate
 Offices" Broadband"Mobile" Content" Corporate
 Servers &
 Applications" SaaS" A Global, Hybrid infrastructure" Private
 Network" Public
 Clouds" Internet" The Global Network is Your Business
  • 16. CDNs" Mobile
 Carriers" Service
 Providers" SaaS" Cloud
 Providers" Enterprise
 Perimeter" Mobile
 WiFi" Employees" Corporate
 Servers" Remote
 Offices" Internal
 Apps" Never see
 the external
 threat traffic" Can’t
 withstand a
 direct attack" Never see the
 threat already
 inside enterprise
 " Existing Solutions Have Critical Gaps
  • 17. Cloud" Pravail" Availability Protection System" Pravail" Network Security Intelligence" See and stop the
 threat anywhere# Stop
 the threat# See the threat lurking
 inside the enterprise# CDNs" Mobile
 Carriers" Service
 Providers" SaaS" Cloud
 Providers" Enterprise
 Perimeter" Mobile
 WiFi" Employees" Corporate
 Servers" Remote
 Offices" Threat Dashboard" Netia’s Solution Bridges the Gaps Internal
 Apps"
  • 18. Users   An@-­‐Virus   IDS/IPS   NAC   Firewall    Secure  Trust  Perimeter   Mobile  Users   Malware   BYOD   Internet   Mobile  Users   Secure  Trust  Perimeter   Insider   Misuse   Home  Office(s)   Cloud  Services   VPN   Malware   Advanced Threats: From Outside AND Inside Network boundaries are harder to define –  Cloud based data and applications –  Employee mobility / BYOD –  Home Working         Threats are harder to keep out –  Targeted threats –  Walk-in threats (on portable devices) –  Malicious insider Challenge: Control & Security of business data, applications and services as businesses evolve. Data  Center  
  • 19. Attack Mitigation. In Poland CP TMS
  • 20. Attack Mitigation. In Poland CP TMS
  • 21. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) CP TMS
  • 22. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) 2. Activate Mitigation (TMS) CP TMS
  • 23. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) 2. Activate Mitigation (TMS) 3. Divert Traffic (Network wide: BGP OFF-Ramp announcement) CP TMS
  • 24. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) 2. Activate Mitigation (TMS) 4. Clean the Traffic and forward the legitimate (Network wide: using ON-Ramp Technique [e.g. MPLS, GRE, VLAN, …]) 5. Protected 3. Divert Traffic (Network wide: BGP OFF-Ramp announcement) CP TMS