G-Cloud Service Definition. Atos KONA Site Defender for Cloud IaaS

Size: px
Start display at page:

Download "G-Cloud Service Definition. Atos KONA Site Defender for Cloud IaaS"

Transcription

1 G-Cloud Service Definition Atos KONA Site Defender for Cloud IaaS

2 Atos Kona Site Defender for Cloud IaaS Atos Kona Site Defender for Cloud IaaS delivers web security without compromise, leveraging the power of Akamai's Intelligent Platform to provide detection, identification, and mitigation of Distributed Denial of Service (DDoS) and Application Layer attacks while preserving site performance and availability. Manages Risk Reduces risk of downtime, extortion and data theft to protect revenue, customer loyalty and brand equity Protects Web Applications Identifies and mitigates the effects of Distributed Denial of Service (DDoS) attacks to preserve web site availability and performance Provides protection for web applications Reduces costs Reduces costs associated with DDoS mitigation Reduces capital expenditure on the hardware and software that provides DDoS protection What is it? Atos Kona Site Defender defends against all types of DDoS, web applications and directto-origin attacks. It is deployed across the Akamai Intelligent Platform, which consists of tens of thousands of servers deployed across over 1,100 networks in more than 75 countries. It is designed to thwart DDoS attacks by absorbing DDoS traffic targeted at the application layer, deflecting all DDoS traffic targeted at the network layer such as SYN Floods or UDP Floods, and authenticating valid traffic at the network edge. Features of the service include: Simple integration with existing IT infrastructure Maximize uptime and availability during DDoS attacks Defend Web application infrastructure Protect against direct-to-origin attacks Improve availability of DNS infrastructure Scale on demand Access best-in-class application security expertise ii

3 The UK based Atos service team will be ready to assist with any queries relating to the service. Quality and resilience are a critical element to meeting the 24x7 demands of today s information needs. Our approach to service delivery ensures high performance, availability and a commitment to service continuity through fully redundant infrastructure and systems. Partnering with Akamai, Atos brings the Akamai Intelligent Platform to the public sector, providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Atos and Akamai allow customers to securely and reliably leverage the cloud in an increasingly connected and mobile world. DDoS Mitigation: absorbs DDoS traffic targeted at the application layer, deflects all DDoS traffic targeted at the network layer such as SYN Floods or UDP Floods, and authenticates valid traffic at the network edge. Application Layer Protection: incorporating a full featured Web Application Firewall (WAF) based upon proprietary technology that provides customers with a highly-scalable layer of protection against application layer attacks. Application Layer Controls include a collection of pre-defined yet configurable Web application firewall rules for different types of attack categories. Network Layer Controls give the ability to enforce customer-defined IP whitelists and blacklists. Rate Controls provide protection against application layer DDoS attacks by monitoring and controlling the rate of requests within the network and at the customer origin. Site Shield: Atos Kona Site Defender also includes the ability to cloak (hide) a customer origin from the public Internet. This adds an additional layer of security protection without impeding the quick and reliable delivery of content. Advanced Security Monitor: Kona Site Defender provides security professionals with real time visibility into security events iii

4 iv

5 Contents 1. Introduction Service summary Service overview Information assurance Backup/restore and disaster recovery On-boarding and off-boarding Pricing Clarification of Terms Discount Service management Service constraints Service levels Financial recompense Training Ordering and invoicing process Termination terms By consumers (i.e. consumption) By the Supplier (removal of the G-Cloud Service) Data restoration / service migration Technical requirements Trial service Glossary v

6 1. Introduction In recent years, there has been a dramatic rise in the scale and severity of attacks launched on Web sites and Web applications. According to Arbor Networks, 2011 Worldwide Infrastructure Security Report*, among the wide range of attack methods, SQL Injection attacks have emerged as the most popular attack method making up 27% of all attack methods with Denial of Service (DoS) attacks close behind. These attacks are occurring more frequently than ever, and the DoS attacks are happening on a much larger scale. Further according to Arbor Networks, the largest reported attack size doubled year-on-year reaching up to more than 60Gbps in an astonishing 600% increase compared to Attacks of this magnitude can cripple any centralized origin-based infrastructure. The effects of these attacks extend long past the assault itself not just in terms of loss of revenue, resources, and productivity, but also in terms of damage to brand reputation and customer trust. 1.1 Service summary Provided by Atos in partnership with Akamai, Site Defender is a security solution that combines a range of security product capabilities and optional services to provide a simplified, flexible and robust defence against Distributed Denial of Service (DDoS), Web application, and Direct-to-Origin attacks. The service leverages a multi-layered tool-set designed to defend against sophisticated attacks employing multiple methodologies. Once deployed, the solution has Akamai DDoS defence capabilities that are designed to always be on. This allows the solution to adapt to the unique nature of each attack method by providing the flexibility to apply the appropriate product capability in real-time. Moreover, since Akamai constantly evolves its security product offerings, customers benefit from continually strengthening their defence posture against DDoS without having to make changes to their infrastructure. Important characteristics: Mitigation of Distributed Denial of Service (DDoS) attacks at the network and application layer Full-featured Web Application Firewall Origin Cloaking (protection against direct-to-origin attacks) Adaptive caching Site failover Access control Net Storage Log Delivery Service ISO compliance management module Security Monitor. 1

7 2. Service overview DDoS Mitigation Kona Site Defender leverages the Akamai Intelligent Platform to detect and block malicious traffic at the edge of the Internet, enabling Akamai to stop DDoS attacks at both the application and network layers. The Akamai Intelligent Platform is architected as a reverse proxy and only accepts traffic via ports 80 (HTTP) & 443 (HTTPS). All network layer (Layers 3&4) DDoS attacks are automatically dropped by the Akamai Intelligent Platform. This includes traffic such as UDP Fragments; ICMP Floods; SYN Floods; ACK Floods; RESET Floods; and UDP Floods. The Akamai Intelligent Platform also absorbs DDoS traffic targeted at the application layer such as GET Floods and authenticates valid traffic at the network edge. Protection is also provided for HTTP slow client ( drip feed ) DDoS attacks, such as a Slowloris (sending partial HTTP requests that proliferate endlessly, update slowly, and never close) DDoS and other application layer attacks such as RUDY (r u dead yet). HTTP/S traffic is routed natively in path with minimal to no added latency and no single point of failure. Real Time Reporting Kona Site Defender supports a logging protocol called Real-Time Reporting. This is a HTTP POST mechanism for sending security events in real-time into a log management or SIEM (Security Information & Event Management) solution at the customer Origin. Prevent Direct-to-Origin attacks Kona Site Defender includes the ability to cloak (hide) a customer origin from the public Internet. This adds an additional layer of security protection without impeding the quick and reliable delivery of content, regardless of end user location. It is designed to prevent Direct-to-Origin attacks. Kona Site Defender is designed to prevent Direct-to-Origin attacks using Akamai SiteShield a form of cache-hierarchy, which is implemented as a map of Akamai servers. In standard configuration, the access controls create an environment by which the Origin site can only be accessed by IP traffic Originating from a small subset of off Akamai servers referred to as a SiteShield region. Access Control Lists (ACLs) at the customer s firewall will only allow traffic from the SiteShield s server IPs to contact the Origin. This design results in no other machine on the Internet having the ability to directly communicate with the customer Origin At the same time, all of Akamai s distributed Edge servers will continue to have complete access to the current content. This is because Akamai s SiteShield servers are configured to serve as the parent for all Akamai Edge Servers for a specific customer s content. If an Akamai Edge Server needs content that it cannot find from a peer it requests the content from the SiteShield servers. In the event that dynamic uncatchable content is requested, the SiteShield server leverages Akamai s advanced routing and protocol acceleration technologies available. As a result, legitimate end-users should always be able to retrieve content quickly and reliably while the Origin remains protected. 2

8 Adaptive Caching Kona Site Defender will cache static objects in a similar way to which transparent proxies honour cache control headers sent by the customer Origin. This provides Origin defence for attacks that target URLs representing static content. Site Failover Web sites that rely on centralized infrastructure often find that ensuring uptime is a continuous challenge. A typical solution involves mirroring a Web site at an alternate location; however, this approach creates additional capital and management costs. Site Failover frees companies from these limitations by storing and delivering Web site content from a global network of thousands of servers on the Akamai Intelligent Platform. With Site Failover, content remains available to requesting users. Access Controls Provides the ability to protect content and control access based on user details. The access is controlled using access control system, which authenticates users and enforces authorization policies. NetStorage Kona Site Defender includes NetStorage as a standard part of the service for the purpose of log retention. It is enabled by default and must be explicitly disabled if not wanted. Customers are limited to 10 GB of usage. Under normal usage, NetStorage traffic will not be billed. Additional usage will be subject to overage charges. Logs are retained for 30 days by default. Customers have the option of retaining logs for longer periods, but subject to overage charges should utilization exceed 10GB. Log Delivery Service The Log Delivery Service (LDS) provides customers with logs generated from Kona Site Defender and Kona services. Customers can configure how to receive their log deliveries in the Luna control portal. LDS delivers customer logs based on a predetermined schedule and most of the log files will be delivered within a 24- hour period. Due to the distributed nature of Akamai s network, some number of log lines can be delayed and be part of a later delivery. Note that customers must configure the service to begin receiving logs from that point forward. Logs are not available retroactively. Security Monitor The Security Monitor provides a dynamic interface enabling users to visually investigate rule activities. Data is displayed in real-time, providing situational awareness. The Security Monitor provides an important tool for tuning WAF rules. The Security Monitor is a security data visualization solution that incorporates WAF and rate control data in real-time. This significantly improves the ability of a user to investigate WAF activities by supporting advanced filtering, search and eventually notification functions. It also provides the capability to drill down into attack alerts to retrieve detailed information on who is attacking, what they are attacking, what defence capabilities triggered the attack declaration and what specifically was seen in the requests that triggered site defences. 3

9 Compliance Management Kona Site Defender includes the ISO compliance management component. This component is designed to help customers understand and validate how their relationship with Akamai impacts their own compliance initiatives. It includes a core base to address generic requirements coupled with the ISO module. 4

10 3. Information assurance Kona Site Defender is appropriate for processing IL0 data. 5

11 4. Backup/restore and disaster recovery The Akamai platform offers 100% availability and is designed to withstand multiple points of failure. The platform is fully resilient and allows for multiple versions of a customer configuration to be kept. Customers are able to create a new configuration and push it out to testing and then production, or revert to a previous configuration all through the customer portal. 6

12 5. On-boarding and off-boarding The Atos KONA Site Defender service requires professional services to scope and integrate the applications and services to be protected. As such, the on boarding process is customised and defined through an initial professional services engagement. A typical on-boarding process will involve the following stages: Scoping and gating to gather the necessary details for the site. Identify any potential issues with site integration or additional features that may need to be enabled Resourcing to identify and allocate resources to best fit the integration requirements and timescales. Additional discovery of the environment to a more detailed level. This is carried out by professional services in conjunction with the customer and builds on this initial gating Internal testing or pre-configuration to ensure any unusual requirements or environments are tested before an initial customer configuration Initial Configuration Creation of a suitable configuration for the site delivery service and perform internal testing Staging, once tested, the configuration is pushed to a staging environment to allow the customer access to start initial testing Staged Testing, working with the customer to address any issues in the configuration identified during the testing. 7

13 6. Pricing The pricing provided in the table below is based upon a minimum commitment of 12 months and is exclusive of VAT. Kona Site Defender for Web Sites Service and Modules Service Description Pricing Unit Tier Bottom Tier Top Price Kona Site Defender for Web Application Properties Notes: Estimated monthly usage in Mbps, MPV or GB is summed for all Web Site properites protected is used to select a price tier below.. Tier 3 - up to and including 75 Mbps, or 40 MPV, or 11,000 GB per month; up to 5 sites per contract Tier-2 - up to and including 500 Mbps, or 250 MPV, per or 75,000 GB per month; up to 10 sites contract Tier 1 - up to and including 2,000 Mbps, or 1,000 per MPV, or 300,000 GB per month; up to 50 sites contract Tier 0 - up to and including 5,000 Mbps, or 2,500 per MPV, or 750,000 GB per month; up to 100 sites contract Monthly Monthly Monthly Monthly 14, , , , Kona Site Defender Additional Sites Monthly Service Per Site Tier 3 - Additional Sites Tier 2 - Additional Sites Tier 1 - Additional Sites Tier 0 - Additional Sites per site per site per site per site Monthly Monthly Monthly Monthly Kona Site Defender Entitlement Overage in Mbps As Incurred for Standalone Only Tier 3 - Standalone Entitlement Overage Tier 2 - Standalone Entitlement Overage Tier 1 - Standalone Entitlement Overage Tier 0 - Standalone Entitlement Overage per Mbps per Mbps per Mbps per Mbps As Incurred As Incurred As Incurred As Incurred Kona Site Defender Entitlement Overage in GB As Incurred for Standalone Tier 3 - Standalone Entitlement Overage Tier 2 - Standalone Entitlement Overage Tier 1 - Standalone Entitlement Overage Tier 0 - Standalone Entitlement Overage per GB per GB per GB per GB As Incurred As Incurred As Incurred As Incurred All Tiers - Monthly Capped Burst As Incurred 3, Kona Site Defender Professional Services All Tiers Standard Integration - Per Configuration - up to 2 WAF Policies Managed Integration - Per Configuration - up to 2 WAF Policies PS Enterprise Custom SOW per hour 1 Professional services security per hour One Time One Time One Time One Time 14, , Rule Update Service Tier 3 prescribed coverage for 5 sites, includes: --up to 3 Threat Update Reviews per year --up to 8 hours Security Configuration Assistance per month Each 1 One Time 3, Rule Update Service Tier 2 prescribed coverage for 10 sites, includes: --up to 6 Threat Update Reviews per year --up to 12 hours Security Configuration Assistance per month Each 1 One Time 5, Rule Update Service Tier 1 prescribed coverage for 50 sites, includes: --up to 8 Threat Update Reviews per year --up to 20 hours Security Configuration Assistance per month Each 1 One Time 8, Rule Update Service Tier 0 coverage for 100 sites Subject to scoping, additional time at Professional Services Security rate Each 1 One Time 41,

14 6.1 Clarification of Terms A Site is a Customers Web Site. 6.2 Discount A forty per cent (40%) discount to the Monthly recurring charges will be applied to customers who procure the service for a full twenty-four (24) month term. For the avoidance of doubt the discount shall not apply to any consumption charges or set-up charges payable by the customer. Should the customer terminate the service before the end of the full twenty-four (24) month term, then the discounts that have been applied to the Monthly recurring charges up to the date of termination shall become payable by the customer to the Supplier as a Termination. 9

15 7. Service management The Atos Service Management Model (ASMM) is a set of service management processes implemented in the Atos organization by which Atos controls the delivery of continuous IT support services (services that a client buys on a longterm basis) and aligns these services to the client s business needs. As a major player in the provision of continuous IT services to the world s premier league companies, we act in a globally consistent manner, presenting a common interface to the client 24 hours a day, 7 days a week. ASMM is built on the best practices in the ICT industry, as defined in the ITIL library version 3 (2011), enriched by the Service Delivery Best Practices of the former Atos Origin and Siemens Information Services. ASMM underpins both ISO/IEC (previously BS15000), the International Service Management Standard for IT service management and ISO/IEC 27001: Information technology -- Security techniques -- Information security management systems Requirements. Special attention is given to the end-to-end governance of the services cross the delivery units within Atos (on-, near or offshore), demand supply alignment and immediate communication of major service disruptions (incidents) and major changes to the clients demand organization and involving them in priority setting and resolution progress. Figure 1 - Atos Service Management Model (ASMM) 10

16 8. Service constraints The Akamai Intelligent platform does not require maintenance windows due to the inherent nature of the platform design. Components can be taken out for maintenance without impacting the delivery of the customer application. Ancillary components, such as the customer portal will have maintenance windows, although these are scheduled and customers are notified in advance. 11

17 9. Service levels This section describes the Service Levels applicable (e.g. performance, availability, support hours, severity definitions etc.) Standard Initial Response Times Two (2) hours or less for P1 issues Four (4) hours or less for P2 issues Two (2) business days or less for P3 issues. All Support Requests reported via will be considered as P3 Live support during regular business hours for P2 and/or P3 issues Live 24x7X365 support for P1 issues Priority Le ve l Impact Priority 1 ( P1 ) Critical Priority 2 ( P2 ) Major Priority 3 ( P3 ) Low Description Service is significantly impaired and unavailable to multiple user locations. Example: Multiple Sites are affected. Repeatable inability to use the applicable Service from a single location or region. Example: Localized denial of service issue. This might be to a single Site or even a single server. Non-urgent matter or information request. Examples: Planned configuration change request, information requests, reports or usage questions, clarification of documentation, or any feature enhancement suggestions. 12

18 10. Financial recompense To minimise the cost to users, Atos does not provide service credits for use of the service. All Atos services are provided on a reasonable endeavours basis. Please refer to G Cloud terms and conditions. In accordance with the guidance within the GPS G-Cloud Framework Terms and Conditions, the Customer may terminate the contract at any time, without cause, by giving at least thirty (30) Working Days prior notice in writing. The Call Off Contract terms and conditions and the Atos terms will define the circumstances where a refund of any pre-paid service charges may be available. 13

19 11. Training Customer training offerings are available on request. 14

20 12. Ordering and invoicing process Ordering this product is a straightforward process. Please forward your requirements to the address GCloud@atos.net Atos will prepare a quotation and agree that quotation with you, including any volume discounts that may be applicable. Once the quotation is agreed, Atos will issue the customer with the necessary documentation (as required by the G-Cloud Framework) and ask for the customer to provide Atos with a purchase order. Once received, the customer services will be configured to the requirements as per the original quotation. For new customers, additional new supplier forms may need to be completed. Invoices will be issued to the customer and Shared Services (quoting the purchase order number) for the services procured. On a monthly basis, Atos will also complete the mandated management information reports to Government Procurement Services detailing the spend that the customer has placed with us. Cabinet Office publish a summary of this monthly management information at: 15

21 13. Termination terms 13.1 By consumers (i.e. consumption) Termination shall be in accordance with: The G-Cloud Framework terms and conditions Any terms agreed within the Call Off Contract under section 10.2 of the Order Form (termination without cause) where the Government Procurement Service (GPS) guidance states At least thirty (30) Working Days in accordance with Clause CO-9.2 of the Call-Off Contract Atos Supplier Terms for this Service as listed on the G-Cloud CloudStore. For this specific service, by default Atos ask for at least thirty (30) Working Days prior written notice of termination as per the guidance within the GPS G-Cloud Framework Terms and Conditions By the Supplier (removal of the G-Cloud Service) Atos commits to continue to provide the service for the duration of the Call Off Contract subject to the terms and conditions of the G-Cloud Framework and Atos Supplier Terms. 16

22 14. Data restoration / service migration The platform allows for multiple versions of a customer configuration to be kept. Customers are able to create a new configuration and push it out to testing and then production, or revert to a previous configuration all through the customer portal. 17

23 15. Customer responsibilities This section is not applicable 18

24 16. Technical requirements Client applications must be internet facing Professional Services are required and this is subject to full scoping 19

25 17. Trial service Atos provides a free trial service so that customers may experience and experiment with the service in advance of any purchase. This is intended to allow customers an ability to assess whether the service Atos offers meets the customer s needs. Trials covering limited, non-production traffic are available free of charge - alternatively paid-for Proof of Concept exercises can be configured to support full production traffic levels. 20

26 18. Glossary Abbreviation / term: Adaptive Caching Denial of Service (DoS) Attack & Distributed Denial of Service (DDoS) Attack HTTP (S) HTTP POST ISO20000 ISO27001 ISO27002 Version A feature where customer identified content is served from the Edge during an attack, maintaining service where the originating servers(s) may be affected. Denial-of-Service attack (DoS attack) or Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed attack includes multiple attack sources. Hyper Text Transfer Protocol (Secure):-Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text and is the basis of the World Wide Web (www). HTTP is the protocol to exchange or transfer hypertext. HTTP utilises port 80, while HTTPS uses port 443 and utilises security mechanisms in the transmission of the data. A function of the HTTP protocol allowing information to be sent to a web service such as a block of data that is the result of submitting a web form to a data-handling process; or an item to add to a database. ISO/IEC is the first international standard for IT service management. It was developed in 2005, by ISO/IEC JTC1 SC7 and revised in 2011.[1] It is based on and intended to supersede the earlier BS ISO/IEC 27001:2005, part of the growing ISO/IEC family of standards, is an information security management system (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its full name is ISO/IEC 27001:2005 Information technology Security techniques Information security management systems Requirements. ISO / IEC provides best practice recommendations on information security management for use by those responsible for initiating, implementing or maintaining information security management systems (ISMS). 21

27 Abbreviation / term: OSI Layers SQL Injection Attack UDP Fragments; ICMP Floods; SYN Floods; ACK Floods; RESET Floods; and UDP Floods. URL Web application Attack Web Application Firewall Version The Open Systems Interconnection (OSI) model (ISO/IEC ) is a conceptual model that groups similar communication functions into one of seven logical layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. SQL injection is a code injection technique, used to attack data driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). Techniques used as part of DoS or DDos attacks. A uniform resource locator, abbreviated URL, also known as web address Web Application attacks are attacks on the underlying applications and scripts supporting web services such as PHP, Java EE, Java, Python, A web application firewall is a form of firewall which controls input, output, and/or access from, to, or by a web application or service. It operates by monitoring and potentially blocking the input, output, or system service calls which do not meet the configured policy of the firewall. The application firewall is typically built to control all network traffic on any OSI layer up to the application layer. It is able to control applications or services specifically, unlike a stateful network firewall which is - without additional software - unable to control network traffic regarding a specific application. 22

28 23

G-Cloud Service Definition. Atos Web Application Firewall

G-Cloud Service Definition. Atos Web Application Firewall G-Cloud Service Definition Atos Web Application Firewall Atos Web Application Firewall Atos powered by Akamai delivers a scalable web application firewall solution that maintains the performance and integrity

More information

Kona Site Defender. Product Description

Kona Site Defender. Product Description Kona Site Defender Product Description November 2013 TABLE OF CONTENTS Table of Contents 2 Introduction 3 Kona Site Defender Overview 3 Kona Site Defender Features 3 DDoS Mitigation 3 DDoS Fee Protection

More information

G-Cloud Service Definition. Atos Oracle Database Upgrade

G-Cloud Service Definition. Atos Oracle Database Upgrade G-Cloud Service Definition Atos Oracle Database Upgrade Database Upgrade for SCS While providing a technical database upgrade facility, Atos also assist organisations in maximising the benefits from the

More information

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud 7 Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud 7 Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS G-Cloud Service Definition Canopy Big Data proof of concept Service SCS Canopy Big Data proof of concept Service SCS Canopy Big Data Proof of Concept (PoC) Service is a consulting service that helps the

More information

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS

G-Cloud Service Definition. Atos Rapid Pilot Mobile Application Development Service SCS G-Cloud Service Definition Atos Rapid Pilot Mobile Application Development Service SCS Atos Rapid Pilot Mobile Applications Development Service SCS Designed to provide rapid development and deployment

More information

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service

G-Cloud Service Definition. Atos Information Security Wireless Scanning Service G-Cloud Service Definition Atos Information Security Wireless Scanning Service Keeping your wireless networks secure Atos Information Security Wireless Scanning Service The Atos Wireless Scanning Service

More information

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS

G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS G-Cloud Service Definition Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS Canopy Unmanaged Enterprise Private Cloud IaaS Canopy Unmanaged Enterprise Private Cloud delivers the efficiencies,

More information

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services

G-Cloud Service Definition. Atos Oracle Cloud ERP Implementation Services G-Cloud Service Definition Atos Oracle Cloud ERP Implementation Services Atos Oracle Cloud ERP Implementation Services Customers need adaptive and agile Enterprise Resource Planning (ERP) systems to support

More information

G-Cloud Service Definition. Atos Data Quality Audit SCS

G-Cloud Service Definition. Atos Data Quality Audit SCS G-Cloud Service Definition Atos Data Quality Audit SCS Atos Data Quality Audit SCS As organisations increasingly utilise a hybrid of Legacy and Cloud based technology platforms, it becomes increasingly

More information

G-Cloud Service Definition. Atos SharePoint Development Service

G-Cloud Service Definition. Atos SharePoint Development Service G-Cloud Service Definition Atos SharePoint Development Service SharePoint Development Services SCS A comprehensive electronic document and records management, collaboration or web content management solution

More information

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS G-Cloud Service Definition Atos Business Intelligence Dashboards and Analytics SCS Atos Business Intelligence Dashboards and Analytics SCS The Atos approach to Business Intelligence (BI) Dashboards and

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

G-Cloud Service Definition. Atos Digital Marketing Specialist Cloud Services

G-Cloud Service Definition. Atos Digital Marketing Specialist Cloud Services G-Cloud Service Definition Atos Digital Marketing Specialist Cloud Services Atos Digital Marketing SCS Atos Digital Marketing is a range of services to help customers develop and promote their digital

More information

PAAS Public Sector Managed Services

PAAS Public Sector Managed Services Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 servicepoint@meritec.co.uk www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents

More information

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS G-Cloud Service Definition Atos Accredited Oracle Business Intelligence Solutions SCS Atos Accredited Oracle Business Intelligence Solutions SCS Robust, scalable Cloud computing and consumption-based reporting

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS powered

More information

G-Cloud Service Definition. Atos Call Centre Services SCS

G-Cloud Service Definition. Atos Call Centre Services SCS G-Cloud Service Definition Atos Call Centre Services SCS Atos Call Centre Services SCS Summary Atos SIAM Service Desk is designed to provide a core part of the SIAM Tower model for ICT delivery. This service

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

dxw s WordPress Platform

dxw s WordPress Platform dxw s WordPress Platform G-Cloud lot 2 (PaaS) service definition Version 2 4th July 2012 Page 1 of 12 Overview dxw s WordPress Platform is a highly managed Platform as a Service for hosting WordPress websites.

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

Acquia Cloud Edge Protect Powered by CloudFlare

Acquia Cloud Edge Protect Powered by CloudFlare Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....

More information

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services

G-Cloud Service Definition. Atos SI Oracle CRM and CX Services G-Cloud Service Definition Atos SI Oracle CRM and CX Services Atos SI Oracle CRM and CX Services SCS Atos provides a range of expert Customer Relationship Management (CRM) and Customer Experience (CX)

More information

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS

G-Cloud Service Definition Canopy Big Data proof of concept Service SCS G-Cloud Service Definition Canopy Big Data proof of concept Service SCS Canopy Big Data proof of concept Service SCS Canopy Big Data Proof of Concept (PoC) Service is a consulting service that helps the

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

CloudFlare advanced DDoS protection

CloudFlare advanced DDoS protection CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS

G-Cloud Service Definition. Atos Business Intelligence Dashboards and Analytics SCS G-Cloud Service Definition Atos Business Intelligence Dashboards and Analytics SCS Atos Business Intelligence Dashboards and Analytics SCS The Atos approach to Business Intelligence (BI) Dashboards and

More information

G-Cloud Service Definition. Atos Software Development Services

G-Cloud Service Definition. Atos Software Development Services G-Cloud Service Definition Atos Software Development Services Atos Software Solution Development Services A flexible and robust software development service focussed on delivering maximum business value

More information

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

G-Cloud Service Definition. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS G-Cloud Service Definition Atos infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning (Outpost24) SaaS Atos Infrastructure Vulnerability Scanning SaaS is powered

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

Powered by. Incapsula Cloud WAF

Powered by. Incapsula Cloud WAF Powered by Incapsula Cloud WAF Enero - 2013 Incapsula Cloud WAF Overview Incapsula Cloud WAF Delivery Model Threat Central 360 Global Threat Detection & Analysis Enables early detection across the entire

More information

G-Cloud Service Definition. Atos Total Application Performance Management for Cloud SaaS

G-Cloud Service Definition. Atos Total Application Performance Management for Cloud SaaS G-Cloud Service Definition Atos Total Application Performance Management for Cloud SaaS Atos Total Application Performance Management Cloud SaaS Total Application Performance Management helps your organisation

More information

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS

Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Secure Remote Backup (IL3) G-Cloud Lot3 IaaS Contents Service Definition... 3 An overview of the Remote Backup as a Service... 3 Key Service Attributes... 4 Information assurance... 5 Details of the level

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

Akamai to Incapsula Migration Guide

Akamai to Incapsula Migration Guide Guide Akamai to Incapsula Migration Guide Introduction Incapsula is an enterprise-grade cloud service that helps companies deliver applications more efficiently and securely. This is accomplished through

More information

Amazon Relational Database Service (RDS)

Amazon Relational Database Service (RDS) Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS G-Cloud Service Definition Canopy Remote Backup for Cloud SaaS Canopy Remote Backup for Cloud SaaS Canopy, an Atos company provides a highly secure, cloud backup and file management service for Internet-connected

More information

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success

More information

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy Mitigating Denial of Service Attacks Why Crossing Fingers is Not a Strategy Introduction Mark Baldwin - Owner of Tectonic Security MSSP and Security Consulting Primarily Work With SMBs DDoS Mitigation

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

Introduction to Centerprise International Limited

Introduction to Centerprise International Limited RM1557vi Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing company, specialising in designing and building

More information

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week

More information

Datacenter Transformation

Datacenter Transformation Datacenter Transformation Consolidation Without Compromising Compliance and Security Joe Poehls Solution Architect, F5 Networks Challenges in the infrastructure I have a DR site, but the ROI on having

More information

G Cloud 6. Service Definition: Platform as a Service (PaaS)

G Cloud 6. Service Definition: Platform as a Service (PaaS) G Cloud 6 Service Definition: Platform as a Service (PaaS) Introduction to Centerprise International Limited Centerprise International Limited was established in 1983 as an engineering and manufacturing

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

Akamai Security Products

Akamai Security Products Akamai Security Products Key Areas of Cloud Security for Akamai Protect Web Availability Internet Infrastructure Security Remove Credit Cards Payment Tokenization Web Application Firewall Application Security

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1 G-CLOUD FRAMEWORK SERVICE DEFINITION Kofax Model Office Bundle Proposal ISSUE 1 Sept 2013 Table of Contents 1 SERVICE OVERVIEW & SOLUTION... 2 2 INFORMATION ASSURANCE... 3 3 BACKUP/RESTORE AND DISASTER

More information

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd. Service Definition The name of the Service is: WebFOCUS Cloud Express An overview of WebFOCUS Cloud Express The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions

More information

Lot 4 Specialist Cloud Service Questmark Ltd. Video Conferencing Small Meeting Room Service

Lot 4 Specialist Cloud Service Questmark Ltd. Video Conferencing Small Meeting Room Service Lot 4 Specialist Cloud Services Lot 4 Specialist Cloud Service Questmark Ltd Video Conferencing Small Meeting Room Service QUESTMARK LIMITED Park House, 104 Derby Road, Long Eaton, NG10 4LS Telephone:

More information

Quality Certificate for Kaspersky DDoS Prevention Software

Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General

More information

AKAMAI WHITE PAPER. Accelerate and Protect your E-learning Initiatives using Akamai s Cloud Based Intelligent Platform TM

AKAMAI WHITE PAPER. Accelerate and Protect your E-learning Initiatives using Akamai s Cloud Based Intelligent Platform TM AKAMAI WHITE PAPER Accelerate and Protect your E-learning Initiatives using Akamai s Cloud Based Intelligent Platform TM TABLE OF CONTENTS EXECUTIVE SUMMARY 1 THE AKAMAI ADVANTAGE 1 ABOUT E-LEARNING 1

More information

Hosted Desktop as a Service

Hosted Desktop as a Service Hosted Desktop as a Service Contents 1 Introduction to Hosted Desktop Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Administration... 4 2.3 Access Methods... 4 2.4 Service

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Remote Access Service (RAS)

Remote Access Service (RAS) Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION 15 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Protective Monitoring...3 2.2 Service Description...4 2.3 Scenario: Basis for

More information

Solution Overview. Our Solution employs two tiers of storage aligning costs of storage with the changing value of data over time.

Solution Overview. Our Solution employs two tiers of storage aligning costs of storage with the changing value of data over time. Service Solution Overview Online Backup per TB model Databarracks fully managed online backup solution uses the Asigra software to back up and protect both physical and virtual environments. Housed in

More information

www.obrela.com Swordfish

www.obrela.com Swordfish Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating

More information

G-Cloud Service Definition Lotus Notes to Microsoft SharePoint Migration Discovery Service

G-Cloud Service Definition Lotus Notes to Microsoft SharePoint Migration Discovery Service G-Cloud Service Definition Lotus Notes to Microsoft SharePoint Migration Discovery Service Lotus Notes to Microsoft SharePoint Migration Discovery Service This service provides an opportunity to review

More information

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic

More information

1 ForestSafe SaaS Service details Service Description Functional Non Functional

1 ForestSafe SaaS Service details Service Description Functional Non Functional 1 ForestSafe SaaS Service details 1.1 Service Description ForestSafe is a privileged identity management system used today to manage the Administrator passwords of 65,000 computers by the UK largest bank.

More information

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition

Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition Involve Cloud Video Conferencing Service VC:me (Video Conferencing: made easy) Service Definition Contents 1. Service Overview... 3 Reservations Service... 4 Endpoint Management... 4 Reporting... 4 Testing...

More information

G-Cloud Service Definition. Canopy Enterprise Content Management for Cloud SaaS

G-Cloud Service Definition. Canopy Enterprise Content Management for Cloud SaaS G-Cloud Service Definition Canopy Enterprise Content Management for Cloud SaaS Canopy Enterprise Content Management (ECM) Canopy ECM is a central, on-demand hub providing the entire Customer document and

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS

ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS Version: 2016 edition 2016 Attercopia 1 Hosting We provide a fully managed hosting solution. Our hosting partners provide servers which are

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

Marval Software Limited. G Cloud iii Framework Service Definition

Marval Software Limited. G Cloud iii Framework Service Definition 1 Marval Software Limited G Cloud iii Framework Service Definition Page 1 of 9 2 Contents An overview of the Marval Service Management (MSM) Software Solution... 3 Information assurance Impact Level (IL)

More information

DENIAL-OF-SERVICE ATTACKS

DENIAL-OF-SERVICE ATTACKS DENIAL-OF-SERVICE ATTACKS 40 years old & more present then ever Robert Dürr, Brühl, 16./17.09.2015 Axians Networks & Solutions GmbH email: robert.duerr@axians.de 1 WHO IS AXIANS?! Axians is the new brand

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Online Backup Service Definition

Online Backup Service Definition Online Backup Service Definition 2 Table of Contents Purpose of Document... 3 Online Backup Service... 3 Accreditations... 5 Target Service Levels for Online Backup... 5 Service Credits Rules and Claims...

More information

Amazon Compute - EC2 and Related Services

Amazon Compute - EC2 and Related Services Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

First Line of Defense to Protect Critical Infrastructure

First Line of Defense to Protect Critical Infrastructure RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

GPG13 Protective Monitoring. Service Definition

GPG13 Protective Monitoring. Service Definition GPG13 Protective Monitoring Service Definition Issue Number V1.3 Document Date 27 November 2014 Author: D.M.Woodcock Classification UNCLASSIFIED Version G-Cloud 6 2014 Copyright Assuria Limited. All rights

More information

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

service description Document Management in the Cloud Software as a Service

service description Document Management in the Cloud Software as a Service easy to adopt, easy to use, easy to leave service description Document Management in the Cloud Software as a Service version 4.0 Contents Overview... 3 Example use cases... 3 Pricing... 4 Trial service...

More information

For information on our service: Please call us on 800 188, visit our website at du.ae/en/business/product-and-services/business-managed-services or

For information on our service: Please call us on 800 188, visit our website at du.ae/en/business/product-and-services/business-managed-services or For information on our service: Please call us on 800 188, visit our website at du.ae/en/business/product-and-services/business-managed-services or email us at managedservices@du.ae Securing Data Centers:

More information

Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers

Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers Whitepaper SHARE THIS WHITEPAPER Table of Contents The Rising Threat of Cyber-Attack Downtime...3 Four Key Considerations

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

Platform as a Service

Platform as a Service Platform as a Service Service Definition Version: 1.0 Version date: October 2015 Classification: Public Backup-as-a-Service Systems Monitoring DR-as-a-Service Storage-as-a-Service Hosted Exchange Colocation

More information

Barracuda Load Balancer Online Demo Guide

Barracuda Load Balancer Online Demo Guide Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,

More information

IBM Smartcloud Managed Backup

IBM Smartcloud Managed Backup IBM Smartcloud Managed Backup Service Definition 1 1. Summary 1.1 Service Description The IBM SmartCloud Managed Backup service provides public, private and hybrid cloudbased data protection solutions

More information

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015 Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%

More information

Riverbed Stingray & Joyent Content Delivery Cloud

Riverbed Stingray & Joyent Content Delivery Cloud Riverbed Stingray & Joyent Content Delivery Cloud Executive Summary Timely delivery of applications is critical to the success of most companies. But many applications now operate over vast geographical

More information

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution White Paper January 2012 Radware GSLB Solution White Paper Page 1 Table of Contents 1. EXECUTIVE SUMMARY... 3 2. GLOBAL

More information

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information