Company Overview. October 2014
|
|
- Rose Merritt
- 8 years ago
- Views:
Transcription
1 Company Overview October 2014
2 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus
3 What Does Black Lotus Do? We are a security company that protects businesses from distributed denial-of-service (DDoS) attacks. We keep internet traffic flowing.
4 DDoS Attacks What is a DDoS Attack? A DDoS attack is when a network asset is flooded with information, preventing legitimate users from accessing it.
5 DDoS Attacks Why Do DDoS Attacks Exist? Motives: Extortion Political Economic Reputational Emotional Targets: Ecommerce Gaming Political Sites Financial Institutions Governments Outcomes: Lost revenue Harmful to reputation
6 DDoS Attacks Derp Trolling NTP Attacks 2014
7 DDoS Attacks Lizard Squad Attacks Aug 2014
8 DDoS Attacks DDoS Attacks Are Growing 35% of companies have been hit by a DDoS attack The volume of DDoS attacks has increased 50% in the last year 35% Q Q1 2014
9 Our Solution Black Lotus DDoS Mitigation Attacker Malicious Bots Legitimate Users Black Lotus Scrubbing Center Critical Network Asset
10 About Us Our Assets Headquartered in San Francisco Global company with operations in Los Angeles, Silicon Valley, Washington, D.C., and Amsterdam San Francisco, CA Santa Clara, CA San Jose, CA Los Angeles, CA Ashburn, VA Amsterdam, NL Asia (Q1 2015) Sydney, Australia Q4 2014
11 About Us Our Recent Activity The largest attack we ve mitigated (February 2014) Average attack size during Q Volume of DDoS attacks during Q Gbps 2.9 Gbps 276,447
12 About Us Planned Locations Within 1-2 years we will cover most of the world using a semi-distributed hub architecture Seattle Chicago London Amsterdam Tokyo Silicon Valley Toronto New York Frankfurt Hong Kong Ashburn Miami Tel Aviv Los Angeles Dallas Puerto Rico Dubai Singapore Costa Rica Lagos Sao Paulo Sydney Scrubbing center Regional Facility Highlights: 2+ Tbps aggregate transit 200 Gbps aggregate peering 5 global scrubbing centers 20+ data centers
13 Our Solution Technology Powerful and Proprietary Technologies Purpose-built global IP backbone DDoS traffic diversion techniques Proprietary software/algorithms, including our patent-pending Human Behavior Analysis software Dynamic attack signature recognition Protection against layer 3,4, and 7 DDoS attacks
14 Our Solution Products and Services PFN Protection for Networks For enterprise grade networks PFS Protection for Services For any web service, including websites, , and VOIP
15 Our Solutions Products and Services Dedicated Servers Native protection on network Bare metal servers QC7, QC8, OCTX5 LAMP management option Colocation Full, Half, Quarter Racks available Los Angeles DDoS bundle available
16 Our Solution PFN (Protection for Networks) Connect to Black Lotus network virtually (via GRE tunnel) or physically Announce ingress traffic to Black Lotus (AS32421) all the time or only during a DDoS attack Supports both BGP (Border Gateway Protocol) and static routing protocols Only clean traffic is passed to the your network ISP 1 ISP 2 Internet Your Network Black Lotus GRE/Fiber Connection Black Lotus Scrubbing Center Scrubbing Center Features Proprietary Software Powerful Hardware Expert Support Team
17 Our Solution PFS (Protection for Services) Works for any service with an IP address Change your DNS records to point to a Black Lotus Virtual IP Address Black Lotus scrubs all ingress traffic Black Lotus forwards clean traffic to your origin server Black Lotus Scrubbing Scrubbing Center Features Proprietary Software Powerful Hardware Expert Support Team Internet Black Lotus Reverse Proxy Server (Virtual IP Address) Your Server (Original IP Address)
18 Our Solution Pricing Model Infrastructure as a Service Monthly fee depends on tier of service Service tiers based on volume of clean traffic (Mbps) and attack size protection (Gbps) No hardware or software needed Emergency protection option
19 Our Solution Market Competition What Sets Black Lotus Apart First mover advantage we ve been around since 1999 Patent-pending Human Behavior Analysis software Globally distributed presence Security Operations Center (SOC) features network, security, and systems experts with years of experience
20 Our Solution Customer Support 24-hour Security Operations Center (SOC) in Los Angeles, CA Attack Monitoring Platform (AMP) allows for monitoring of network and service traffic 24-hour support 24-hour phone support
21 About Us Our Team Founders helped create the DDoS protection market in 1999 CEO and SVP are industry veterans extensive contact networks CEO has built 5 successful companies and is a serial entrepreneur COO comes from IBM and has extensive operations experience CFO comes from technology investment banking VP of Marketing (Frank Ip) has 20+years experience in network security Arman Khalili CEO Patrick Shahijanian COO Warren Dewar CFO Shawn Marck Co-Founder/CSO Xenophon Giannis SVP Sales Frank Ip VP of Marketing
22 About Us Our History 1999: Black Lotus founded in response to US CERT advisories of DDoS attacks 2007: Protection for Services product launched 2009: Protection for Networks product launched 2013 June: Industry Capital invests in Black Lotus 2013 October: Black Lotus acquires the managed hosting division of 8x April: Black Lotus secures $6M in financing from East West Bank 2014 May: Ashburn, VA scrubbing center goes live
23 About Us Our Mission We defend the infrastructure on which businesses are built.
We keep internet traffic flowing Frank Ip VP of Marketing and Business Development
We keep internet traffic flowing Frank Ip VP of Marketing and Business Development WHD 2015 Presentation SLA 1 I will make it short 2 3 Hopefully, it will be informative You can ask questions, but I probably
More informationBuilding cloud infrastructure: The importance of scale, speed, and flexibility. William Lim Asia Channel Development Manager, SoftLayer
Building cloud infrastructure: The importance of scale, speed, and flexibility William Lim Asia Channel Development Manager, SoftLayer Global cloud leader Formed by 10 industry veterans in 2005 Model predicated
More informationA Secure Cloud Platform For egaming
A Secure Cloud Platform For egaming JT CLOUD Mark Stuchfield, VP, Business Development, JT Lab & egaming mark.stuchfield@jtglobal.com consultancy voice & data cloud & hosted solutions internet security
More informationSoftLayer: Introduction
SoftLayer: Introduction Kim Mortensen SoftLayer & Cloud Managed Services ITS Channel Sales Denmark kim@dk.ibm.com 2013 IBM Corporation IBM cloud offerings Cloud Managed Services Formerly (SCE+) Have it
More informationAvailability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
More informationData, Data, Who Has The Data?
Data, Data, Who Has The Data? 13 February 2015 Mari Heiser IBM STSM (Senior Technical Staff Member) Master Certified Architect IBM Cloud Security and Compliance Twitter: @MariHeiser What is Cloud? The
More informationInfrastructure on the Cloud Faster, Easier, Economical
Infrastructure on the Cloud Faster, Easier, Economical Global cloud leader Formed by 10 industry veterans in 2005 Model predicated on software-driven infrastructure Unencumbered by early-industry legacy
More informationStop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
More informationCERT Seminar March, 2010
CERT Seminar March, 2010 Presenter: Paul Sop, Chief Technology Officer These materials may not be used or relied upon in any way other than under a written agreement with Prolexic Technologies Agenda -
More informationThis document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
More information3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.
THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance
More informationHYBRID CLOUD Why is it important & how do you manage it?
HYBRID CLOUD Why is it important & how do you manage it? TECTONIC SHIFT IN IT 5 How disruptive can the cloud be? 6 7 8 $223B $1B Total Valuation 234 $USD $10B FinTech Innovation 9 Platform to Innovate
More informationManage the unexpected
Manage the unexpected Navigate risks and thrive Today s business world is threatened by a multitude of online security risks. But many organizations simply do not have the resources or expertise to combat
More informationIhr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!
Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Die hybride DDoS Protection und Application Security Lösung von F5 Networks Arrow Sommerforum München am 16. Juli 2015 e.kampmann@f5.com
More informationHow To Use An Ibm Cloud Server For Business
SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company 2014 IBM Corporation Executive summary Early cloud models shared, virtualized resources are no longer enough to achieve
More informationDDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail
DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic
More informationwww.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
More informationHow To Connect To Telx Dia (Dia) For Free
Dedicated Internet Access (DIA) Frequently Asked Questions (FAQ) What is DIA? Telx Dedicated Internet Access service, or DIA for short, combines Telx s network neutral environment with colocation and automated
More informationMohamed Sayed SGI Cloud Executive Middle East & Africa. IBM ITIDA MoU WUP12370-USEN-00. 2014 IBM Corporation
Mohamed Sayed SGI Cloud Executive Middle East & Africa IBM ITIDA MoU WUP12370-USEN-00 Cloud computing is continuing to transform the way organizations manage their infrastructure. 80% of organizations
More informationAutomated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
More informationInternet Security for Remote Users
Internet Security for Remote Users ABSTRACT: This document explains the advantages of cloud-based Internet security services for remote/mobile email and Web users. Traditional gateway or in-house security
More informationF root anycast: What, why and how. João Damas ISC
F root anycast: What, why and how João Damas ISC Overview What is a root server? What is F? What is anycast? F root anycast. Why? How does ISC do it? What is f.root-servers.net? One the Internet s official
More informationFour Reasons To Outsource Your DNS
Four Reasons To Outsource Your DNS Your company s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today s slightly
More informationHow valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
More informationBring a Big World Closer
Bring a Big World Closer Global Telecommunications Solutions for Business KDDI Corporation > > A Fortune Global 500 Company > > Ranked 13th in the telecommunications industry in 2011 KDDI America Total
More informationMitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy
Mitigating Denial of Service Attacks Why Crossing Fingers is Not a Strategy Introduction Mark Baldwin - Owner of Tectonic Security MSSP and Security Consulting Primarily Work With SMBs DDoS Mitigation
More informationDDoS Mitigation Solutions
DDoS Mitigation Solutions The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports
More informationGlobal Real Estate Outlook
Global Real Estate Outlook August 2014 The Hierarchy of Economic Performance, 2014-2015 China Indonesia India Poland South Korea Turkey Australia Mexico United Kingdom Sweden United States Canada South
More informationAT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS
AT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS Category Wholesale Colocation Managed Services Customer need Alternative to own. Large scale homogenous applications. Network edge solution for high input output
More informationDDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
More informationREVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE
REVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE Rami Khasawneh, Interim Dean, College of Business, Lewis University, khasawra@lewisu.edu Eveann Lovero,
More informationFinancial Fact Sheet. Equinix Snapshot. Company Summary. Products and Services. Managed Colocation Services
Financial Fact Sheet Equinix Snapshot NASDAQ Ticker: EQIX Recent Price (April. 27, 2006) $62.00 52-Week Range: $ 31.39 66.33 Common Shares Outstanding*: 28.6 Million Market Capitalization: $1.8 Billion
More informationTELEHOUSE International
TELEHOUSE International London Docklands North London Docklands East London Metro Hamburg Frankfurt Beijing Shanghai Seoul Santa Clara Staten Island Manhattan Broadway Munich Hong Kong Taipei Tokyo Osaka
More informationGenerating Serialisation Code with Clang
EURO-LLVM CONFERENCE 12 th April 2012 Wayne Palmer Generating Serialisation Code with Clang 1 INTRODUCTION TO THE QUANTITATIVE ANALYTICS LIBRARY A single C++ library of nearly 10 million lines of code.
More informationDISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
More informationLifesize Cloud, Architecture. A comprehensive guide
A comprehensive guide Reference Paper February 2015 A service built to provide a connected experience, running on a platform built to perform that s Lifesize Cloud, powered by SoftLayer, an IBM Company.
More informationDoyourwebsitebot defensesaddressthe changingthreat landscape?
WHITEPAPER Doyourwebsitebot defensesaddressthe changingthreat landscape? Don tletbotsturnaminorincident intoamegasecuritybreach 1.866.423.0606 Executive Summary The website security threat landscape has
More informationPRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE
PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE Enabling private virtual connections for direct cloud access Cloud services are being quickly adopted worldwide, but concerns about them linger. People worry
More information8x8 Announces Sale of Dedicated Server Hosting Business to The IRC Company, Inc. (dba Black Lotus Communciations)
For Immediate Release 8x8 Announces Sale of Dedicated Server Hosting Business to The IRC Company, Inc. (dba Black Lotus Communciations) SAN JOSE, Calif. October 4, 2013-8x8, Inc. (NASDAQ:EGHT), provider
More informationArbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
More informationConnect the Leading Global Financial Centres by Ultra Low Latency Network
Connect the Leading Global Financial Centres by Ultra Low Latency Network China Telecom Global Ltd. 21 March 2013 Every millisecond counts Time is money & every millisecond counts! Network latency demands
More informationState of the Cloud DNS Report. Basic Edition April 2014
State of the Cloud DNS Report Basic Edition April 2014 2014 Table of Contents Overview Introduction... 3 Anycast vs. Unicast DNS... 3 Provider Overview & Current News... 4 Provider Market Share...7 Technology
More information01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte
More informationComplete Cloud Solutions
Complete Cloud Solutions Global Data Centres Glasgow, London, Nottingham, St Asaph, Leicester, Maidenhead, Gosport, Manchester, Los Angeles, Boston, Dallas, New Jersey, Virginia, Sacramento, Dubai and
More informationCRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS
CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION
More informationCISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS
WHITE PAPER CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS Today, service providers and their customers are exposed to a growing
More information/ Staminus Communications
/ Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in
More informationVirtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
More informationGrid Computing: Telco Perspective
International Telecommunication Union ITU-T Grid Computing: Telco Perspective Rick Schlichting Director, Software Systems Research AT&T Labs Research, USA ITU-T/OGF Workshop on Next Generation Networks
More informationEVERYBODY S NETWORK CLOUD
PRIVATE INTERNET WAN PUBLIC CONNECT PARTNERS SERVICE PROVIDER CLOUD EVERYBODY S NETWORK CLOUD THE WIN-WIN WAN MARKET CONTEXT The cloud is the new IT architecture for enterprises. 85% of global IT decision-makers
More information1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting
More informationSOFTLAYER TECHNOLOGIES, INC.
SOFTLAYER TECHNOLOGIES, INC. SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT SYSTEM DESCRIPTION OF THE PLATFORM SERVICES RELEVANT TO SECURITY AND AVAILABILITY TABLE OF CONTENTS REPORT OF INDEPENDENT ACCOUNTANTS...
More informationDDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
More informationAKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry
AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL
More informationPacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises
Products and Services INTERNET ACCESS Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises MEETING THE CRITICAL DEMANDS OF TODAY S MULTI-SITE ENTERPRISES Enterprises
More informationYour Global Network Integrator. www.gt-t.net DENVER DUSSELDORF LONDON WASHINGTON DC
Your Global Network Integrator www.gt-t.net DENVER DUSSELDORF LONDON WASHINGTON DC Company Facts Leading Technology and Global Network Integrator Providing Global Wide Area Network (WAN), IP Transit and
More informationDEFENSE NETWORK FAQS DATA SHEET
DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),
More informationKASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks
KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)
More informationAKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
More informationMAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD
IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD Copyright 2015 DNS Made Easy. All Rights Reserved. Copyright 2015 Tiggee LLC. All Rights Reserved. WE ARE
More informationDelivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront
Delivering Media from the Cloud Alex Dunlap Senior Manager, Amazon CloudFront Agenda Today we will: Provide a brief introduction to Amazon CloudFront. Examine common needs and challenges we ve seen from
More informationService: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP
Company Overview Dima Kumets, Product Manager dima@opendns.com Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP Infrastructure: 13
More informationKASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection
KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.
More informationWhat is a Data Center? Racks and Servers. At The Click Level. Equinix - Key Facts
What is a Data Center? Internet Data Centers: End User & Developer Requirements Janice Fetzer KC Mares A highly specialized, reliable environment to support computers, network and data storage devices
More informationDDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
More informationExecutive Summary. Internet Traffic and Capacity
Executive Summary New applications and services have combined with strong broadband subscriber growth worldwide to fuel demand for Internet capacity. Despite predictions from some quarters that Internet
More informationState of the Cloud DNS Report. Basic Edition July 2014
State of the Cloud DNS Report Basic Edition July 2014 2014 Table of Contents Overview Introduction... 3 Anycast vs. Unicast DNS... 3 Provider Overview & Current News... 4 Provider Market Share...7 Technology
More informationRely on a Trusted Resource
Colocation Rely on a Trusted Resource» Highly secure environment to deploy your computing, network, storage and IT infrastructure» Helps reduce capital and operational expenses required to run mission-critical
More informationGetting Started. Tom Paseka More IP USA 2015
Getting Started Tom Paseka More IP USA 2015 Who are we? Background Used by more than 2.5 million Internet facing applications in 150+ countries Offices in San Francisco, Washington DC, London and Singapore
More informationProtect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
More informationKDDI Corporation. A Fortune Global 500 Company Ranked 13th in the telecommunications industry in 20 09 $38.5B $29.4B $4.7B 12.7% $4.8B 12.
KDDI Corporation A Fortune Global 500 Company Ranked 13th in the telecommunications industry in 20 09 CONSTITUENT RATIO OF 2010 KDDI OPERATING REVENUE (%) KDDI OPERATING REVENUE (Billions of Dollars) Consolidated
More informationWhat Makes Cities Successful Randstad on the World Stage
What Makes Cities Successful Randstad on the World Stage 1966 7 World Cities London Moscow New York Paris Randstad Rhein-Ruhr Tokyo Today: JLL City Commercial Attraction Index Top 20 Population Economic
More informationDDoS attacks in CESNET2
DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities
More informationTDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
More informationContent is king, but who rules?
Content is king, but who rules? Is an open Internet @ risk? IP Interconnection trends from a hybrid hosting provider perspective Bart van der Sloot Managing Director LeaseWeb Network May 19, 2016 About
More informationDDOS in academic Networks. Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014
DDOS in academic Networks Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014 Academic networks? Real Target for DDOS? Lesson learned; DDOS @RedIRIS Mitigation Projects
More informationNeuStar SIP-IX. Eugene Lew VP, Advanced Services +1-571-434-3420 Eugene.Lew@neustar.biz. March 2006
NeuStar SIP-IX Eugene Lew VP, Advanced Services +1-571-434-3420 Eugene.Lew@neustar.biz March 2006 NeuStar Background Global operator of neutral, shared, mission-critical directory and clearinghouse services
More informationIBM Cloud :Infrastructure-as-a-Service
IBM :Infrastructure-as-a-Service July 30 th, 2014 www.ibm.com/investor Forward Looking Statements and Non-GAAP Information Certain comments made in this presentation may be characterized as forward looking
More informationTraffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
More informationSEC Staff Addresses Third-Party Endorsements of Investment Advisers on Social Media Websites
April 2014 Practice Groups: Investment Management, Hedge Funds and Alternative Investments Private Equity SEC Staff Addresses Third-Party Endorsements of By Michael W. McGrath and Sonia R. Gioseffi On
More informationBENEFITS OF SERVERLESS COMPUTING
BENEFITS OF SERVERLESS COMPUTING A Frost & Sullivan Market Insight INTRODUCTION TO SERVERLESS COMPUTING Serverless Computing is an integrated NVR/SAN platform that runs video management software directly
More informationTimely Trends of Ethernet Technology. Announcing AboveNet s Expanded Metro Ethernet Services
Timely Trends of Ethernet Technology Announcing AboveNet s Expanded Metro Ethernet Services Today s Moderator: MaryBeth Nance Executive Director, Business Development & Marketing MaryBeth Nance is Executive
More informationMolnet öppnar nya möjligheter för kostnadseffektiv IT
Molnet öppnar nya möjligheter för kostnadseffektiv IT March 3 Magnus Arildsson, Cloud Leader, IBM Nordic 2015 IBM Corporation Market Shifts are creating a new era of IT Data is becoming the world s new
More informationWho is Savvis. * Pro forma. 2 Savvis Proprietary & Confidential 10/24/12
Savvis Overview Who is Savvis Savvis is an IT outsourcing provider delivering visionary enterprise-class cloud and IT solutions and proactive service, and enabling enterprises to gain a competitive advantage
More informationSoftlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation
Softlayer An IBM company Team-Enablement 5th September 2013 SoftLayer has a global footprint 13 data centers 17 network PoPs Global private network 685 employees (25 in Europe, o/w 4 Sales) 2013 Projected
More informationHunting down a DDOS attack
2006-10-23 1 Hunting down a DDOS attack By Lars Axeland +46 70 5291530 lars.axeland@teliasonera.com 2006-10-23 What we have seen so far What can an operator do to achieve core security What solution can
More informationThe Data Center of the Future: Creating New Jobs in Europe
The Data Center of the Future: Creating New Jobs in Europe New data centers will create hundreds of thousands of new jobs for Europe by 2020. But there is work to be done to capture this opportunity fully.
More informationIP Connectivity Dedicated servers Co-location in data centers
Blix Solutions provides IP Connectivity Dedicated servers Co-location in data centers On the next pages we provide suggested solutions for some select markets ANYCAST PROVIDERS High uptime Internet connectivity
More informationGlobal IP Network POP
Our Business Is The Internet It s all we do 24x7x365 around the world. We re And we re global leaders in all Internet-related business. Take our Tier-1. It was designed and built to provide the best possible
More informationEnterprise overview. Benefits and features of CloudFlare s Enterprise plan. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.
Enterprise overview Benefits and features of CloudFlare s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com Enterprise overview This paper summarizes the benefits and features
More informationGlobal IP Network Overview
Global IP Network Overview NTT Communications NTT Europe Julian Curtis About NTT: Industry Leadership World s IT and Telecom Service Companies by Credit Rating and Revenue high Stability AA A BBB BB AA+
More informationConnect - Transit, IP-VPN & Metro Services
Connect - Transit, IP-VPN & Metro Services Network services connecting every area of your business It s your data and at UKSolutions we realise the importance of it as much as you do. We operate a next
More informationFinancial services regulation in Australia
Financial services regulation in Australia FEBRUARY What you need to know Financial services regulation in Australia February 2016 1 What you need to know Key points Do you do business in Australia or
More informationDUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
More informationService Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3
More information借 力 IBM 云 服 务 构 筑 企 业 混 合 云 架 构 门 捷 声 IBM( 中 国 ) 全 球 科 技 服 务 部 大 西 区 解 决 方 案 经 理 云 计 算 正 在 为 传 统 产 业 模 式 带 来 一 场 革 命 新 的 客 户 需 求 正 在 驱 动 商 业 模 式 的 改 变 客 户 需 要 : 更 多 引 入 移 动 和 社 交 网 络 通 过 智 能 分 析 驱 动 个
More informationLeveraging Successful Global Data Centre Business Models for the benefit of Hong Kong
Leveraging Successful Global Data Centre Business Models for the benefit of Hong Kong 26 September 2011 Digital Realty Trust Our data centres enable customers to deliver critical business operations. We
More informationHOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
More informationT&E. Where Business Travelers Spend Money
T&E Where Business Travelers Spend Money Contents Introduction 3 Key Findings 4 Top Expensive Cities for Business Travel 5 International 5 U.S. 5 Top 10 Spend Categories 6 International 6 U.S. 7 Most Visited
More information