Company Overview. October 2014

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Company Overview. October 2014"

Transcription

1 Company Overview October 2014

2 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus

3 What Does Black Lotus Do? We are a security company that protects businesses from distributed denial-of-service (DDoS) attacks. We keep internet traffic flowing.

4 DDoS Attacks What is a DDoS Attack? A DDoS attack is when a network asset is flooded with information, preventing legitimate users from accessing it.

5 DDoS Attacks Why Do DDoS Attacks Exist? Motives: Extortion Political Economic Reputational Emotional Targets: Ecommerce Gaming Political Sites Financial Institutions Governments Outcomes: Lost revenue Harmful to reputation

6 DDoS Attacks Derp Trolling NTP Attacks 2014

7 DDoS Attacks Lizard Squad Attacks Aug 2014

8 DDoS Attacks DDoS Attacks Are Growing 35% of companies have been hit by a DDoS attack The volume of DDoS attacks has increased 50% in the last year 35% Q Q1 2014

9 Our Solution Black Lotus DDoS Mitigation Attacker Malicious Bots Legitimate Users Black Lotus Scrubbing Center Critical Network Asset

10 About Us Our Assets Headquartered in San Francisco Global company with operations in Los Angeles, Silicon Valley, Washington, D.C., and Amsterdam San Francisco, CA Santa Clara, CA San Jose, CA Los Angeles, CA Ashburn, VA Amsterdam, NL Asia (Q1 2015) Sydney, Australia Q4 2014

11 About Us Our Recent Activity The largest attack we ve mitigated (February 2014) Average attack size during Q Volume of DDoS attacks during Q Gbps 2.9 Gbps 276,447

12 About Us Planned Locations Within 1-2 years we will cover most of the world using a semi-distributed hub architecture Seattle Chicago London Amsterdam Tokyo Silicon Valley Toronto New York Frankfurt Hong Kong Ashburn Miami Tel Aviv Los Angeles Dallas Puerto Rico Dubai Singapore Costa Rica Lagos Sao Paulo Sydney Scrubbing center Regional Facility Highlights: 2+ Tbps aggregate transit 200 Gbps aggregate peering 5 global scrubbing centers 20+ data centers

13 Our Solution Technology Powerful and Proprietary Technologies Purpose-built global IP backbone DDoS traffic diversion techniques Proprietary software/algorithms, including our patent-pending Human Behavior Analysis software Dynamic attack signature recognition Protection against layer 3,4, and 7 DDoS attacks

14 Our Solution Products and Services PFN Protection for Networks For enterprise grade networks PFS Protection for Services For any web service, including websites, , and VOIP

15 Our Solutions Products and Services Dedicated Servers Native protection on network Bare metal servers QC7, QC8, OCTX5 LAMP management option Colocation Full, Half, Quarter Racks available Los Angeles DDoS bundle available

16 Our Solution PFN (Protection for Networks) Connect to Black Lotus network virtually (via GRE tunnel) or physically Announce ingress traffic to Black Lotus (AS32421) all the time or only during a DDoS attack Supports both BGP (Border Gateway Protocol) and static routing protocols Only clean traffic is passed to the your network ISP 1 ISP 2 Internet Your Network Black Lotus GRE/Fiber Connection Black Lotus Scrubbing Center Scrubbing Center Features Proprietary Software Powerful Hardware Expert Support Team

17 Our Solution PFS (Protection for Services) Works for any service with an IP address Change your DNS records to point to a Black Lotus Virtual IP Address Black Lotus scrubs all ingress traffic Black Lotus forwards clean traffic to your origin server Black Lotus Scrubbing Scrubbing Center Features Proprietary Software Powerful Hardware Expert Support Team Internet Black Lotus Reverse Proxy Server (Virtual IP Address) Your Server (Original IP Address)

18 Our Solution Pricing Model Infrastructure as a Service Monthly fee depends on tier of service Service tiers based on volume of clean traffic (Mbps) and attack size protection (Gbps) No hardware or software needed Emergency protection option

19 Our Solution Market Competition What Sets Black Lotus Apart First mover advantage we ve been around since 1999 Patent-pending Human Behavior Analysis software Globally distributed presence Security Operations Center (SOC) features network, security, and systems experts with years of experience

20 Our Solution Customer Support 24-hour Security Operations Center (SOC) in Los Angeles, CA Attack Monitoring Platform (AMP) allows for monitoring of network and service traffic 24-hour support 24-hour phone support

21 About Us Our Team Founders helped create the DDoS protection market in 1999 CEO and SVP are industry veterans extensive contact networks CEO has built 5 successful companies and is a serial entrepreneur COO comes from IBM and has extensive operations experience CFO comes from technology investment banking VP of Marketing (Frank Ip) has 20+years experience in network security Arman Khalili CEO Patrick Shahijanian COO Warren Dewar CFO Shawn Marck Co-Founder/CSO Xenophon Giannis SVP Sales Frank Ip VP of Marketing

22 About Us Our History 1999: Black Lotus founded in response to US CERT advisories of DDoS attacks 2007: Protection for Services product launched 2009: Protection for Networks product launched 2013 June: Industry Capital invests in Black Lotus 2013 October: Black Lotus acquires the managed hosting division of 8x April: Black Lotus secures $6M in financing from East West Bank 2014 May: Ashburn, VA scrubbing center goes live

23 About Us Our Mission We defend the infrastructure on which businesses are built.

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development We keep internet traffic flowing Frank Ip VP of Marketing and Business Development WHD 2015 Presentation SLA 1 I will make it short 2 3 Hopefully, it will be informative You can ask questions, but I probably

More information

Building cloud infrastructure: The importance of scale, speed, and flexibility. William Lim Asia Channel Development Manager, SoftLayer

Building cloud infrastructure: The importance of scale, speed, and flexibility. William Lim Asia Channel Development Manager, SoftLayer Building cloud infrastructure: The importance of scale, speed, and flexibility William Lim Asia Channel Development Manager, SoftLayer Global cloud leader Formed by 10 industry veterans in 2005 Model predicated

More information

SoftLayer: Introduction

SoftLayer: Introduction SoftLayer: Introduction Kim Mortensen SoftLayer & Cloud Managed Services ITS Channel Sales Denmark kim@dk.ibm.com 2013 IBM Corporation IBM cloud offerings Cloud Managed Services Formerly (SCE+) Have it

More information

A Secure Cloud Platform For egaming

A Secure Cloud Platform For egaming A Secure Cloud Platform For egaming JT CLOUD Mark Stuchfield, VP, Business Development, JT Lab & egaming mark.stuchfield@jtglobal.com consultancy voice & data cloud & hosted solutions internet security

More information

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013 the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered

More information

Data, Data, Who Has The Data?

Data, Data, Who Has The Data? Data, Data, Who Has The Data? 13 February 2015 Mari Heiser IBM STSM (Senior Technical Staff Member) Master Certified Architect IBM Cloud Security and Compliance Twitter: @MariHeiser What is Cloud? The

More information

Infrastructure on the Cloud Faster, Easier, Economical

Infrastructure on the Cloud Faster, Easier, Economical Infrastructure on the Cloud Faster, Easier, Economical Global cloud leader Formed by 10 industry veterans in 2005 Model predicated on software-driven infrastructure Unencumbered by early-industry legacy

More information

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)

More information

HYBRID CLOUD Why is it important & how do you manage it?

HYBRID CLOUD Why is it important & how do you manage it? HYBRID CLOUD Why is it important & how do you manage it? TECTONIC SHIFT IN IT 5 How disruptive can the cloud be? 6 7 8 $223B $1B Total Valuation 234 $USD $10B FinTech Innovation 9 Platform to Innovate

More information

Mohamed Sayed SGI Cloud Executive Middle East & Africa. IBM ITIDA MoU WUP12370-USEN-00. 2014 IBM Corporation

Mohamed Sayed SGI Cloud Executive Middle East & Africa. IBM ITIDA MoU WUP12370-USEN-00. 2014 IBM Corporation Mohamed Sayed SGI Cloud Executive Middle East & Africa IBM ITIDA MoU WUP12370-USEN-00 Cloud computing is continuing to transform the way organizations manage their infrastructure. 80% of organizations

More information

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider

More information

SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company. 2014 IBM Corporation

SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company. 2014 IBM Corporation SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company 2014 IBM Corporation Executive summary Early cloud models shared, virtualized resources are no longer enough to achieve

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

CERT Seminar March, 2010

CERT Seminar March, 2010 CERT Seminar March, 2010 Presenter: Paul Sop, Chief Technology Officer These materials may not be used or relied upon in any way other than under a written agreement with Prolexic Technologies Agenda -

More information

Bring a Big World Closer

Bring a Big World Closer Bring a Big World Closer Global Telecommunications Solutions for Business KDDI Corporation > > A Fortune Global 500 Company > > Ranked 13th in the telecommunications industry in 2011 KDDI America Total

More information

Manage the unexpected

Manage the unexpected Manage the unexpected Navigate risks and thrive Today s business world is threatened by a multitude of online security risks. But many organizations simply do not have the resources or expertise to combat

More information

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic

More information

www.prolexic.com Stop DDoS Attacks in Minutes

www.prolexic.com Stop DDoS Attacks in Minutes www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen

More information

Internet Security for Remote Users

Internet Security for Remote Users Internet Security for Remote Users ABSTRACT: This document explains the advantages of cloud-based Internet security services for remote/mobile email and Web users. Traditional gateway or in-house security

More information

Dedicated Internet Access (DIA) Frequently Asked Questions (FAQ)

Dedicated Internet Access (DIA) Frequently Asked Questions (FAQ) Dedicated Internet Access (DIA) Frequently Asked Questions (FAQ) What is DIA? Telx Dedicated Internet Access service, or DIA for short, combines Telx s network neutral environment with colocation and automated

More information

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Die hybride DDoS Protection und Application Security Lösung von F5 Networks Arrow Sommerforum München am 16. Juli 2015 e.kampmann@f5.com

More information

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)

More information

Complete Cloud Solutions

Complete Cloud Solutions Complete Cloud Solutions Global Data Centres Glasgow, London, Nottingham, St Asaph, Leicester, Maidenhead, Gosport, Manchester, Los Angeles, Boston, Dallas, New Jersey, Virginia, Sacramento, Dubai and

More information

Four Reasons To Outsource Your DNS

Four Reasons To Outsource Your DNS Four Reasons To Outsource Your DNS Your company s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today s slightly

More information

F root anycast: What, why and how. João Damas ISC

F root anycast: What, why and how. João Damas ISC F root anycast: What, why and how João Damas ISC Overview What is a root server? What is F? What is anycast? F root anycast. Why? How does ISC do it? What is f.root-servers.net? One the Internet s official

More information

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy Mitigating Denial of Service Attacks Why Crossing Fingers is Not a Strategy Introduction Mark Baldwin - Owner of Tectonic Security MSSP and Security Consulting Primarily Work With SMBs DDoS Mitigation

More information

PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE

PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE Enabling private virtual connections for direct cloud access Cloud services are being quickly adopted worldwide, but concerns about them linger. People worry

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

Connect the Leading Global Financial Centres by Ultra Low Latency Network

Connect the Leading Global Financial Centres by Ultra Low Latency Network Connect the Leading Global Financial Centres by Ultra Low Latency Network China Telecom Global Ltd. 21 March 2013 Every millisecond counts Time is money & every millisecond counts! Network latency demands

More information

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad

More information

DDoS Mitigation Solutions

DDoS Mitigation Solutions DDoS Mitigation Solutions The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports

More information

Doyourwebsitebot defensesaddressthe changingthreat landscape?

Doyourwebsitebot defensesaddressthe changingthreat landscape? WHITEPAPER Doyourwebsitebot defensesaddressthe changingthreat landscape? Don tletbotsturnaminorincident intoamegasecuritybreach 1.866.423.0606 Executive Summary The website security threat landscape has

More information

Arbor s Solution for ISP

Arbor s Solution for ISP Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard

More information

AT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS

AT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS AT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS Category Wholesale Colocation Managed Services Customer need Alternative to own. Large scale homogenous applications. Network edge solution for high input output

More information

8x8 Announces Sale of Dedicated Server Hosting Business to The IRC Company, Inc. (dba Black Lotus Communciations)

8x8 Announces Sale of Dedicated Server Hosting Business to The IRC Company, Inc. (dba Black Lotus Communciations) For Immediate Release 8x8 Announces Sale of Dedicated Server Hosting Business to The IRC Company, Inc. (dba Black Lotus Communciations) SAN JOSE, Calif. October 4, 2013-8x8, Inc. (NASDAQ:EGHT), provider

More information

Generating Serialisation Code with Clang

Generating Serialisation Code with Clang EURO-LLVM CONFERENCE 12 th April 2012 Wayne Palmer Generating Serialisation Code with Clang 1 INTRODUCTION TO THE QUANTITATIVE ANALYTICS LIBRARY A single C++ library of nearly 10 million lines of code.

More information

Grid Computing: Telco Perspective

Grid Computing: Telco Perspective International Telecommunication Union ITU-T Grid Computing: Telco Perspective Rick Schlichting Director, Software Systems Research AT&T Labs Research, USA ITU-T/OGF Workshop on Next Generation Networks

More information

Financial Fact Sheet. Equinix Snapshot. Company Summary. Products and Services. Managed Colocation Services

Financial Fact Sheet. Equinix Snapshot. Company Summary. Products and Services. Managed Colocation Services Financial Fact Sheet Equinix Snapshot NASDAQ Ticker: EQIX Recent Price (April. 27, 2006) $62.00 52-Week Range: $ 31.39 66.33 Common Shares Outstanding*: 28.6 Million Market Capitalization: $1.8 Billion

More information

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL

More information

Global Real Estate Outlook

Global Real Estate Outlook Global Real Estate Outlook August 2014 The Hierarchy of Economic Performance, 2014-2015 China Indonesia India Poland South Korea Turkey Australia Mexico United Kingdom Sweden United States Canada South

More information

What is a Data Center? Racks and Servers. At The Click Level. Equinix - Key Facts

What is a Data Center? Racks and Servers. At The Click Level. Equinix - Key Facts What is a Data Center? Internet Data Centers: End User & Developer Requirements Janice Fetzer KC Mares A highly specialized, reliable environment to support computers, network and data storage devices

More information

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION

More information

REVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE

REVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE REVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE Rami Khasawneh, Interim Dean, College of Business, Lewis University, khasawra@lewisu.edu Eveann Lovero,

More information

CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS

CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS WHITE PAPER CISCO DISTRIBUTED DENIAL OF SERVICE PROTECTION SOLUTION: LEADING DDOS PROTECTION FOR SERVICE PROVIDERS AND THEIR CUSTOMERS Today, service providers and their customers are exposed to a growing

More information

EVERYBODY S NETWORK CLOUD

EVERYBODY S NETWORK CLOUD PRIVATE INTERNET WAN PUBLIC CONNECT PARTNERS SERVICE PROVIDER CLOUD EVERYBODY S NETWORK CLOUD THE WIN-WIN WAN MARKET CONTEXT The cloud is the new IT architecture for enterprises. 85% of global IT decision-makers

More information

TELEHOUSE International

TELEHOUSE International TELEHOUSE International London Docklands North London Docklands East London Metro Hamburg Frankfurt Beijing Shanghai Seoul Santa Clara Staten Island Manhattan Broadway Munich Hong Kong Taipei Tokyo Osaka

More information

Softlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation

Softlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation Softlayer An IBM company Team-Enablement 5th September 2013 SoftLayer has a global footprint 13 data centers 17 network PoPs Global private network 685 employees (25 in Europe, o/w 4 Sales) 2013 Projected

More information

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS : DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s

More information

Lifesize Cloud, Architecture. A comprehensive guide

Lifesize Cloud, Architecture. A comprehensive guide A comprehensive guide Reference Paper February 2015 A service built to provide a connected experience, running on a platform built to perform that s Lifesize Cloud, powered by SoftLayer, an IBM Company.

More information

Leverage the power of the cloud without the security worry.

Leverage the power of the cloud without the security worry. SOLUTION WHITE PAPER Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express www.earthlink.com November 2015 Private connections

More information

MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD Copyright 2015 DNS Made Easy. All Rights Reserved. Copyright 2015 Tiggee LLC. All Rights Reserved. WE ARE

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

Content is king, but who rules?

Content is king, but who rules? Content is king, but who rules? Is an open Internet @ risk? IP Interconnection trends from a hybrid hosting provider perspective Bart van der Sloot Managing Director LeaseWeb Network May 19, 2016 About

More information

Next Generation Data Centre Connectivity. Cloud Expo Asia 13 November 2013

Next Generation Data Centre Connectivity. Cloud Expo Asia 13 November 2013 Next Generation Data Centre Connectivity Cloud Expo Asia 13 November 2013 Shaun Woodhouse Commercial Director, Singapore 2 Digital Realty overview World s largest investor, developer, owner and operator

More information

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends

More information

State of the Cloud DNS Report. Basic Edition April 2014

State of the Cloud DNS Report. Basic Edition April 2014 State of the Cloud DNS Report Basic Edition April 2014 2014 Table of Contents Overview Introduction... 3 Anycast vs. Unicast DNS... 3 Provider Overview & Current News... 4 Provider Market Share...7 Technology

More information

Timely Trends of Ethernet Technology. Announcing AboveNet s Expanded Metro Ethernet Services

Timely Trends of Ethernet Technology. Announcing AboveNet s Expanded Metro Ethernet Services Timely Trends of Ethernet Technology Announcing AboveNet s Expanded Metro Ethernet Services Today s Moderator: MaryBeth Nance Executive Director, Business Development & Marketing MaryBeth Nance is Executive

More information

1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS 1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting

More information

Rely on a Trusted Resource

Rely on a Trusted Resource Colocation Rely on a Trusted Resource» Highly secure environment to deploy your computing, network, storage and IT infrastructure» Helps reduce capital and operational expenses required to run mission-critical

More information

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises Products and Services INTERNET ACCESS Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises MEETING THE CRITICAL DEMANDS OF TODAY S MULTI-SITE ENTERPRISES Enterprises

More information

Your Global Network Integrator. www.gt-t.net DENVER DUSSELDORF LONDON WASHINGTON DC

Your Global Network Integrator. www.gt-t.net DENVER DUSSELDORF LONDON WASHINGTON DC Your Global Network Integrator www.gt-t.net DENVER DUSSELDORF LONDON WASHINGTON DC Company Facts Leading Technology and Global Network Integrator Providing Global Wide Area Network (WAN), IP Transit and

More information

KDDI Corporation. A Fortune Global 500 Company Ranked 13th in the telecommunications industry in 20 09 $38.5B $29.4B $4.7B 12.7% $4.8B 12.

KDDI Corporation. A Fortune Global 500 Company Ranked 13th in the telecommunications industry in 20 09 $38.5B $29.4B $4.7B 12.7% $4.8B 12. KDDI Corporation A Fortune Global 500 Company Ranked 13th in the telecommunications industry in 20 09 CONSTITUENT RATIO OF 2010 KDDI OPERATING REVENUE (%) KDDI OPERATING REVENUE (Billions of Dollars) Consolidated

More information

IBM Cloud :Infrastructure-as-a-Service

IBM Cloud :Infrastructure-as-a-Service IBM :Infrastructure-as-a-Service July 30 th, 2014 www.ibm.com/investor Forward Looking Statements and Non-GAAP Information Certain comments made in this presentation may be characterized as forward looking

More information

SOFTLAYER TECHNOLOGIES, INC.

SOFTLAYER TECHNOLOGIES, INC. SOFTLAYER TECHNOLOGIES, INC. SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT SYSTEM DESCRIPTION OF THE PLATFORM SERVICES RELEVANT TO SECURITY AND AVAILABILITY TABLE OF CONTENTS REPORT OF INDEPENDENT ACCOUNTANTS...

More information

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)

More information

Executive Summary. Internet Traffic and Capacity

Executive Summary. Internet Traffic and Capacity Executive Summary New applications and services have combined with strong broadband subscriber growth worldwide to fuel demand for Internet capacity. Despite predictions from some quarters that Internet

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3

More information

01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte

More information

Leveraging Successful Global Data Centre Business Models for the benefit of Hong Kong

Leveraging Successful Global Data Centre Business Models for the benefit of Hong Kong Leveraging Successful Global Data Centre Business Models for the benefit of Hong Kong 26 September 2011 Digital Realty Trust Our data centres enable customers to deliver critical business operations. We

More information

Corero Network Security First Line of Defense Executive Overview

Corero Network Security First Line of Defense Executive Overview FIRST LINE OF DEFENSE Corero Network Security First Line of Defense Executive Overview Products and Services that Protect Against DDoS Attacks and Cyber Threats EXECUTIVE SUMMARY Any organization conducting

More information

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success

More information

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront Delivering Media from the Cloud Alex Dunlap Senior Manager, Amazon CloudFront Agenda Today we will: Provide a brief introduction to Amazon CloudFront. Examine common needs and challenges we ve seen from

More information

BENEFITS OF SERVERLESS COMPUTING

BENEFITS OF SERVERLESS COMPUTING BENEFITS OF SERVERLESS COMPUTING A Frost & Sullivan Market Insight INTRODUCTION TO SERVERLESS COMPUTING Serverless Computing is an integrated NVR/SAN platform that runs video management software directly

More information

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes

More information

Cloud Security In Your Contingency Plans

Cloud Security In Your Contingency Plans Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect

More information

The Data Center of the Future: Creating New Jobs in Europe

The Data Center of the Future: Creating New Jobs in Europe The Data Center of the Future: Creating New Jobs in Europe New data centers will create hundreds of thousands of new jobs for Europe by 2020. But there is work to be done to capture this opportunity fully.

More information

NeuStar SIP-IX. Eugene Lew VP, Advanced Services +1-571-434-3420 Eugene.Lew@neustar.biz. March 2006

NeuStar SIP-IX. Eugene Lew VP, Advanced Services +1-571-434-3420 Eugene.Lew@neustar.biz. March 2006 NeuStar SIP-IX Eugene Lew VP, Advanced Services +1-571-434-3420 Eugene.Lew@neustar.biz March 2006 NeuStar Background Global operator of neutral, shared, mission-critical directory and clearinghouse services

More information

Global IP Network Overview

Global IP Network Overview Global IP Network Overview NTT Communications NTT Europe Julian Curtis About NTT: Industry Leadership World s IT and Telecom Service Companies by Credit Rating and Revenue high Stability AA A BBB BB AA+

More information

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.

More information

DEFENSE NETWORK FAQS DATA SHEET

DEFENSE NETWORK FAQS DATA SHEET DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),

More information

Molnet öppnar nya möjligheter för kostnadseffektiv IT

Molnet öppnar nya möjligheter för kostnadseffektiv IT Molnet öppnar nya möjligheter för kostnadseffektiv IT March 3 Magnus Arildsson, Cloud Leader, IBM Nordic 2015 IBM Corporation Market Shifts are creating a new era of IT Data is becoming the world s new

More information

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Protect your network: planning for (DDoS), Distributed Denial of Service attacks Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product

More information

/ Staminus Communications

/ Staminus Communications / Staminus Communications Global DDoS Mitigation and Technology Provider Whitepaper Series True Cost of DDoS Attacks for Hosting Companies The most advanced and experienced DDoS mitigation provider in

More information

DDOS in academic Networks. Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014

DDOS in academic Networks. Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014 DDOS in academic Networks Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014 Academic networks? Real Target for DDOS? Lesson learned; DDOS @RedIRIS Mitigation Projects

More information

Managed Hosting. Dedicated IT Infrastructure to Better Focus on Projects that Impact your Bottom Line PORTFOLIO OVERVIEW. Portfolio Overview

Managed Hosting. Dedicated IT Infrastructure to Better Focus on Projects that Impact your Bottom Line PORTFOLIO OVERVIEW. Portfolio Overview PORTFOLIO OVERVIEW Dedicated IT Infrastructure to Better Focus on Projects that Impact your Bottom Line 1 2 PORTFOLIO OVERVIEW From racking and stacking to troubleshooting performance issues related to

More information

Who is Savvis. * Pro forma. 2 Savvis Proprietary & Confidential 10/24/12

Who is Savvis. * Pro forma. 2 Savvis Proprietary & Confidential 10/24/12 Savvis Overview Who is Savvis Savvis is an IT outsourcing provider delivering visionary enterprise-class cloud and IT solutions and proactive service, and enabling enterprises to gain a competitive advantage

More information

TDC s perspective on DDoS threats

TDC s perspective on DDoS threats TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)

More information

Brief Introduction of GIS Product (GIS, Global Internet Service) Product Development Department June, 2014

Brief Introduction of GIS Product (GIS, Global Internet Service) Product Development Department June, 2014 Brief Introduction of GIS Product (GIS, Global Internet Service) Product Development Department June, 2014 Contents Architecture of Network GIS Product Introduction Features and Performance Best Practice

More information

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com>

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com> Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content

More information

Data Center Security

Data Center Security Data Center Security Products Biannual Worldwide and Regional Market Share, Size, and Forecasts: Excerpts Data Center Security The Increasing Requirements for Data Center-Class Performance WHITE PAPER:

More information

借 力 IBM 云 服 务 构 筑 企 业 混 合 云 架 构 门 捷 声 IBM( 中 国 ) 全 球 科 技 服 务 部 大 西 区 解 决 方 案 经 理 云 计 算 正 在 为 传 统 产 业 模 式 带 来 一 场 革 命 新 的 客 户 需 求 正 在 驱 动 商 业 模 式 的 改 变 客 户 需 要 : 更 多 引 入 移 动 和 社 交 网 络 通 过 智 能 分 析 驱 动 个

More information

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative 2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago,

More information

Protect Against the Full Spectrum of Modern DDoS Attacks. F5 EMEA Webinar January 2015

Protect Against the Full Spectrum of Modern DDoS Attacks. F5 EMEA Webinar January 2015 Protect Against the Full Spectrum of Modern DDoS Attacks F5 EMEA Webinar January 2015 The Evolution of Attackers September 1996 First high profile DDoS attack. NY ISP Panix.com that was nearly put out

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

Distributed Denial of Service protection

Distributed Denial of Service protection Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies

More information

SoftLayer Investments Drive Growth and Improved Customer Experience

SoftLayer Investments Drive Growth and Improved Customer Experience SoftLayer Investments Drive Growth and Improved Customer Experience A Neovise Vendor Perspective Report 2010 Neovise, LLC. All Rights Reserved. Executive Summary Hosting and datacenter services provider

More information

Getting Started. Tom Paseka More IP USA 2015

Getting Started. Tom Paseka More IP USA 2015 Getting Started Tom Paseka More IP USA 2015 Who are we? Background Used by more than 2.5 million Internet facing applications in 150+ countries Offices in San Francisco, Washington DC, London and Singapore

More information

State of the Cloud DNS Report. Basic Edition July 2014

State of the Cloud DNS Report. Basic Edition July 2014 State of the Cloud DNS Report Basic Edition July 2014 2014 Table of Contents Overview Introduction... 3 Anycast vs. Unicast DNS... 3 Provider Overview & Current News... 4 Provider Market Share...7 Technology

More information

DDoS attacks in CESNET2

DDoS attacks in CESNET2 DDoS attacks in CESNET2 Ondřej Caletka 15th March 2016 Ondřej Caletka (CESNET) DDoS attacks in CESNET2 15th March 2016 1 / 22 About CESNET association of legal entities, est. 1996 public and state universities

More information