We keep internet traffic flowing Frank Ip VP of Marketing and Business Development

Size: px
Start display at page:

Download "We keep internet traffic flowing Frank Ip VP of Marketing and Business Development"

Transcription

1 We keep internet traffic flowing Frank Ip VP of Marketing and Business Development WHD 2015

2 Presentation SLA 1 I will make it short 2 3 Hopefully, it will be informative You can ask questions, but I probably don t have all the answers 4 Introduce our partner Huawei

3 What Does Black Lotus Do? We are a Managed Security Service Provider specialized in mitigating DDoS attacks We keep internet traffic flowing

4 About Us Our Assets Headquartered in San Francisco Global footprint with operations in Los Angeles, Silicon Valley, Washington, D.C., and Amsterdam San Francisco, CA Santa Clara, CA San Jose, CA Los Angeles, CA Ashburn, VA Amsterdam, NL Asia (Q2 2015) Sydney, Australia Q3 2015

5 What is a DDoS Attack? A DDoS attack is when a network asset is flooded with information, preventing legitimate users from accessing it.

6 Statistics The largest attack we ve mitigated (February 2014) Average attack size in Q DDoS attacks mitigated in Gbps 12.1 Gbps 1,138,042 On average 130 attacks mitigated every hour 308 of 365 days Observed attacks over 10Gbps 138 of 365 days Observed attacks over 20Gbps

7 The Risks to Enterprises Extortion/Criminal Hactivitists Insiders Nation-State Terrorists Intellectual Property Reputation Damage Financial Accounts Competitive Information Personal Information Outcomes Lost revenue Harmful to reputation

8 Derp Trolling NTP Attacks 2014

9 Lizard Squad Attacks in 2014

10 Anonymous Declare Wars on HK Government

11 DDoS Attacks Are Growing 35% of companies have been hit by a DDoS attack The average DDoS attacks size has increased 340% in the last year 14 Average Attack Size 12 35% Q Q4 2014

12 DDoS Attacks Is Easy DDoS as a Service 35% DDoS as a Product

13 DDoS Attacks Are Growing 35%

14 DDoS Attacks Are Growing 35%

15 DDoS Attacks Are Growing 35%

16 You should be prepared By now, I hope I have convinced you to think about looking into the DDoS protection solution for your organization: On-premise DDoS appliance Least latency Cloud based mitigation service Handled 35% by expert Better yet, a hybrid solution Best of both world

17 How DDoS Mitigation Works Works for any service with an IP address Change your DNS records to point to a Black Lotus Virtual IP Address Connect via GRE tunnel or physically BGP or Static Route Only clean traffic is passed to the your network Internet Internet Scrubbing Center Scrubbing Reverse Proxy Server (Virtual IP Address) Your Server (Original IP Address) ISP 1 ISP 2 GRE/Fiber Connection DDoS Mitigation Service Provider Your Network Scrubbing Center Features Detection/Mitigation Reporting Expert Support

18 Selection Criteria - BREAK B - Bandwidth R - Redundancy E - Expandability 35% A - Accessibility K - Knowledge

19 What differentiate us? The 3 B s Bandwidth Terabit scale purpose-built global IP backbone Boxes tool chest Most diverse DDoS mitigation hardware in place Active scrubbing capacity exceed 1 terabit Brain experience counts Approximately 3-5 thousands attacks per day, 24x7 Proprietary software/algorithms, including our patentpending Human Behavior Analysis software Dynamic attack signature recognition

20 Painless Infrastructure and Protection as a Service Cloud based and hybrid solution Emergency protection option Extensive network coverage topology Service tiers based on volume of clean traffic (Mbps) and attack size protection (Gbps)

21 Black Lotus and Huawei's Joint DDoS Traffic Cleaning Service Cooperation Progress Huawei's Next Generation Anti-DDoS Solution was verified by Black Lotus in its North American Lab. Cloud Cleaning Center in Amsterdam went online and started provisioning traffic cleaning services.

22 Cloud-based Scrubbing Center in Amsterdam Amsterdam Cloud Cleaning Center USA Cloud Cleaning Center If a European customer suffers DDoS attacks launched from the U.S., Black Lotus can block the attack source by filtering out the attack traffic in the U.S.

23 Pablo Cui VP WEU Enterprise Business 15 years experience executive in sales, marketing and management in IT and Telecommunication Industry. International cross-culture management and sales experience for 10 years, in Netherlands, Germany, and other Western European region, also 7 countries in South America.

24 Huawei at a Glance Countries 28 Joint innovation centers Regional HQs ~150,000 Employees A Global Leading ICT Provider 16 70,000 R&D employees 45 Training centers R&D centers

25 Huawei Partnership with Black Lotus Reputation Upgrade AntiDDoS detection Center Cloud Cleaning Center From Partner or Huawei Huawei Global Security Center Managed Security Service ATIC AntiDDoS cleaning center Inner network Mirrored traffic Management traffic Traffic before cleaning Traffic after cleaning Log Traffic Manager/Customer Portal Security Research Team

26 Huawei Anti-DDoS Solution Highlights 8times Industry Performance,3times attacks defense Types, Security as Service NG Anti-DDoS NO.1 Performance: 1.44Tbps Comprehensive defense: 100+ DDoS defend Security as Service: VIP Numbers 2000

27 High Performance Hardware No.1 Industry Performance 1.44Tbps DDoS Attacks response time within 2s 1.44T Attack defense capability: 1.44Tbps Attack response time: < 2s The world s most powerful DDoS defend device. The world s fastest response for attacks Service Processor with 4 CPUs CPU1 CPU3 CPU2 CPU4 The World Fastest Security Blade with Four high performance CPUs Each card provides 160 Gbps DDoS defense capability

28 Based on Big Data Analysis Precise Defense Against 100+ kinds of DDoS Attacks Traffic Modeling from 60+ Dimensions 60+ Global IP Reputation Technology Fingerprint Recognition Technology Big Data Analytics Technology

29 Comprehensive Software platform Comprehensive Route System Agile Attacks Defense Engine Cloud Based Security Solution Meet All Customer s Deploy requirements Support inline mode deployment /off mode deployment Easy to Deploy Meet All Customer s Deploy requirements Support inline mode deployment /off mode deployment Support IPv4/IPv6 Route Support VIP Portal Function, every VIP Customer has it s own policy and reports Support ISP do DDoS defense Service as a Security Service Secure Your Data Center

30 Successful story with Industry Leading ISPs Huawei AntiDDoS serviced for more than 100 customers,including industry Leading ISPs.

31 We Continue to Grow Our Footprint : worldwide coverage Seattle Chicago London Amsterdam Tokyo Silicon Valley Toronto New York Frankfurt Hong Kong Ashburn Miami Tel Aviv Los Angeles Dallas Puerto Rico Dubai Singapore Costa Rica Lagos Sao Paulo Sydney Scrubbing center Regional Facility Highlights: 2+ Tbps aggregate transit 200 Gbps aggregate peering 5 global scrubbing centers 20+ data centers

32 Thank You!

Company Overview. October 2014

Company Overview. October 2014 Company Overview October 2014 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus What Does Black Lotus Do? We are a security company that protects businesses

More information

A Secure Cloud Platform For egaming

A Secure Cloud Platform For egaming A Secure Cloud Platform For egaming JT CLOUD Mark Stuchfield, VP, Business Development, JT Lab & egaming mark.stuchfield@jtglobal.com consultancy voice & data cloud & hosted solutions internet security

More information

Building cloud infrastructure: The importance of scale, speed, and flexibility. William Lim Asia Channel Development Manager, SoftLayer

Building cloud infrastructure: The importance of scale, speed, and flexibility. William Lim Asia Channel Development Manager, SoftLayer Building cloud infrastructure: The importance of scale, speed, and flexibility William Lim Asia Channel Development Manager, SoftLayer Global cloud leader Formed by 10 industry veterans in 2005 Model predicated

More information

SoftLayer: Introduction

SoftLayer: Introduction SoftLayer: Introduction Kim Mortensen SoftLayer & Cloud Managed Services ITS Channel Sales Denmark kim@dk.ibm.com 2013 IBM Corporation IBM cloud offerings Cloud Managed Services Formerly (SCE+) Have it

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

Infrastructure on the Cloud Faster, Easier, Economical

Infrastructure on the Cloud Faster, Easier, Economical Infrastructure on the Cloud Faster, Easier, Economical Global cloud leader Formed by 10 industry veterans in 2005 Model predicated on software-driven infrastructure Unencumbered by early-industry legacy

More information

Data, Data, Who Has The Data?

Data, Data, Who Has The Data? Data, Data, Who Has The Data? 13 February 2015 Mari Heiser IBM STSM (Senior Technical Staff Member) Master Certified Architect IBM Cloud Security and Compliance Twitter: @MariHeiser What is Cloud? The

More information

Manage the unexpected

Manage the unexpected Manage the unexpected Navigate risks and thrive Today s business world is threatened by a multitude of online security risks. But many organizations simply do not have the resources or expertise to combat

More information

HYBRID CLOUD Why is it important & how do you manage it?

HYBRID CLOUD Why is it important & how do you manage it? HYBRID CLOUD Why is it important & how do you manage it? TECTONIC SHIFT IN IT 5 How disruptive can the cloud be? 6 7 8 $223B $1B Total Valuation 234 $USD $10B FinTech Innovation 9 Platform to Innovate

More information

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013 the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered

More information

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Die hybride DDoS Protection und Application Security Lösung von F5 Networks Arrow Sommerforum München am 16. Juli 2015 e.kampmann@f5.com

More information

PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE

PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE Enabling private virtual connections for direct cloud access Cloud services are being quickly adopted worldwide, but concerns about them linger. People worry

More information

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com>

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com> Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content

More information

Four Reasons To Outsource Your DNS

Four Reasons To Outsource Your DNS Four Reasons To Outsource Your DNS Your company s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today s slightly

More information

Automated Mitigation of the Largest and Smartest DDoS Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application

More information

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)

More information

DEFENSE NETWORK FAQS DATA SHEET

DEFENSE NETWORK FAQS DATA SHEET DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),

More information

ENTERPRISE SOLUTIONS PTIMIZE UTURE

ENTERPRISE SOLUTIONS PTIMIZE UTURE ENTERPRISE SOLUTIONS PTIMIZE HE UTURE CONTENTS 03 BLOOMBERG ENTERPRISE PRODUCTS & SOLUTIONS 04 WHY BLOOMBERG EPS NOW? 05 OPTIMIZE DESKTOP, DATA FEEDS AND DISTRIBUTION-RELATED COSTS 07 STRATEGIC WORKFLOW-BASED

More information

Dimension Data Ground to Cloud Summit. accelerate your ambition 1

Dimension Data Ground to Cloud Summit. accelerate your ambition 1 Dimension Data Ground to Cloud Summit accelerate your ambition 1 David Hanrahan Dimension Data Cloud Strategy accelerate your ambition 2 Omni channel Data lake Bimodal Cloud IT-Business Alignment BIG Data

More information

Service Provider Enablement 3.0 Achieving Accelerated Business Gain

Service Provider Enablement 3.0 Achieving Accelerated Business Gain Global Leader in DDoS Mitigation Service Provider Enablement 3.0 Achieving Accelerated Business Gain BENEFITS Comprehensive product range to capture different market segments Turnkey white-label partnership

More information

MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD Copyright 2015 DNS Made Easy. All Rights Reserved. Copyright 2015 Tiggee LLC. All Rights Reserved. WE ARE

More information

F5 Silverline DDoS Protection Onboarding: Technical Note

F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution

More information

How To Use An Ibm Cloud Server For Business

How To Use An Ibm Cloud Server For Business SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company 2014 IBM Corporation Executive summary Early cloud models shared, virtualized resources are no longer enough to achieve

More information

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront Delivering Media from the Cloud Alex Dunlap Senior Manager, Amazon CloudFront Agenda Today we will: Provide a brief introduction to Amazon CloudFront. Examine common needs and challenges we ve seen from

More information

Connect the Leading Global Financial Centres by Ultra Low Latency Network

Connect the Leading Global Financial Centres by Ultra Low Latency Network Connect the Leading Global Financial Centres by Ultra Low Latency Network China Telecom Global Ltd. 21 March 2013 Every millisecond counts Time is money & every millisecond counts! Network latency demands

More information

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic

More information

SecurityDAM On-demand, Cloud-based DDoS Mitigation

SecurityDAM On-demand, Cloud-based DDoS Mitigation SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS

More information

Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP

Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP Company Overview Dima Kumets, Product Manager dima@opendns.com Service: Cloud Web Filtering and Malware Protection Aruba Instant Integration + Certified for Interop on Campus and RAP Infrastructure: 13

More information

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises Products and Services INTERNET ACCESS Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises MEETING THE CRITICAL DEMANDS OF TODAY S MULTI-SITE ENTERPRISES Enterprises

More information

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL

More information

www.prolexic.com Stop DDoS Attacks in Minutes

www.prolexic.com Stop DDoS Attacks in Minutes www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen

More information

Radware s Attack Mitigation Solution On-line Business Protection

Radware s Attack Mitigation Solution On-line Business Protection Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...

More information

Global IP Network Overview

Global IP Network Overview Global IP Network Overview NTT Communications NTT Europe Julian Curtis About NTT: Industry Leadership World s IT and Telecom Service Companies by Credit Rating and Revenue high Stability AA A BBB BB AA+

More information

Molnet öppnar nya möjligheter för kostnadseffektiv IT

Molnet öppnar nya möjligheter för kostnadseffektiv IT Molnet öppnar nya möjligheter för kostnadseffektiv IT March 3 Magnus Arildsson, Cloud Leader, IBM Nordic 2015 IBM Corporation Market Shifts are creating a new era of IT Data is becoming the world s new

More information

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider

More information

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN

More information

EVERYBODY S NETWORK CLOUD

EVERYBODY S NETWORK CLOUD PRIVATE INTERNET WAN PUBLIC CONNECT PARTNERS SERVICE PROVIDER CLOUD EVERYBODY S NETWORK CLOUD THE WIN-WIN WAN MARKET CONTEXT The cloud is the new IT architecture for enterprises. 85% of global IT decision-makers

More information

Internet Security for Remote Users

Internet Security for Remote Users Internet Security for Remote Users ABSTRACT: This document explains the advantages of cloud-based Internet security services for remote/mobile email and Web users. Traditional gateway or in-house security

More information

Grid Computing: Telco Perspective

Grid Computing: Telco Perspective International Telecommunication Union ITU-T Grid Computing: Telco Perspective Rick Schlichting Director, Software Systems Research AT&T Labs Research, USA ITU-T/OGF Workshop on Next Generation Networks

More information

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)

More information

Who is Savvis. * Pro forma. 2 Savvis Proprietary & Confidential 10/24/12

Who is Savvis. * Pro forma. 2 Savvis Proprietary & Confidential 10/24/12 Savvis Overview Who is Savvis Savvis is an IT outsourcing provider delivering visionary enterprise-class cloud and IT solutions and proactive service, and enabling enterprises to gain a competitive advantage

More information

The United States is the world s largest national economy the ability to connect to this region from anywhere in the world is vital.

The United States is the world s largest national economy the ability to connect to this region from anywhere in the world is vital. NETWORK SERVICES: America Regional Capabilities The United States is the world s largest national economy the ability to connect to this region from anywhere in the world is vital. The dollar is the most

More information

Generating Serialisation Code with Clang

Generating Serialisation Code with Clang EURO-LLVM CONFERENCE 12 th April 2012 Wayne Palmer Generating Serialisation Code with Clang 1 INTRODUCTION TO THE QUANTITATIVE ANALYTICS LIBRARY A single C++ library of nearly 10 million lines of code.

More information

DDoS Mitigation Solutions

DDoS Mitigation Solutions DDoS Mitigation Solutions The Real Cost of DDOS Attacks Hosting, including colocation at datacenters, dedicated servers, cloud hosting, shared hosting, and infrastructure as a service (IaaS) supports

More information

Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014

Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014 Equinix Cloud Exchange Datacenter Forum Stephane Buchs, IMS 17 th September 2014 Largest carrier-neutral data center provider Market Challenge Expanding addressable market; ensuring consistent performance

More information

Mohamed Sayed SGI Cloud Executive Middle East & Africa. IBM ITIDA MoU WUP12370-USEN-00. 2014 IBM Corporation

Mohamed Sayed SGI Cloud Executive Middle East & Africa. IBM ITIDA MoU WUP12370-USEN-00. 2014 IBM Corporation Mohamed Sayed SGI Cloud Executive Middle East & Africa IBM ITIDA MoU WUP12370-USEN-00 Cloud computing is continuing to transform the way organizations manage their infrastructure. 80% of organizations

More information

[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd.

[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Contents 1 2 3 4 Industry Trends DDoS Attack Types Solutions to DDoS Attacks Summary 2 Cybercrime Landscape DNS Hijacking Malware 3% 3% Targeted

More information

Bring a Big World Closer

Bring a Big World Closer Bring a Big World Closer Global Telecommunications Solutions for Business KDDI Corporation > > A Fortune Global 500 Company > > Ranked 13th in the telecommunications industry in 2011 KDDI America Total

More information

Eudemon8000E Anti-DDoS SPU

Eudemon8000E Anti-DDoS SPU Today's network attack varieties and intensities grow exponentially. Distributed Denial of Service (DDoS) attacks in 2010 swallowed 100G bandwidths, experiencing a 1000% increase over 2005. The diversified

More information

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends

More information

Service Provider Enablement Hybrid Implementation Model

Service Provider Enablement Hybrid Implementation Model Data Sheet Service Provider Enablement Hybrid Implementation Model KEY BENEFITS 1.28Tbps global scrubbing capacity Multi-layered protection Zero capex New revenue stream Hassle-free setup Cloud-based WAFs

More information

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)

More information

DUBEX CUSTOMER MEETING

DUBEX CUSTOMER MEETING DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE

More information

Doyourwebsitebot defensesaddressthe changingthreat landscape?

Doyourwebsitebot defensesaddressthe changingthreat landscape? WHITEPAPER Doyourwebsitebot defensesaddressthe changingthreat landscape? Don tletbotsturnaminorincident intoamegasecuritybreach 1.866.423.0606 Executive Summary The website security threat landscape has

More information

F root anycast: What, why and how. João Damas ISC

F root anycast: What, why and how. João Damas ISC F root anycast: What, why and how João Damas ISC Overview What is a root server? What is F? What is anycast? F root anycast. Why? How does ISC do it? What is f.root-servers.net? One the Internet s official

More information

Connect - Transit, IP-VPN & Metro Services

Connect - Transit, IP-VPN & Metro Services Connect - Transit, IP-VPN & Metro Services Network services connecting every area of your business It s your data and at UKSolutions we realise the importance of it as much as you do. We operate a next

More information

Hybrid Cloud Services

Hybrid Cloud Services Hybrid Cloud Services Leverage IaaS platforms to meet demand for hybrid cloud services KVH Private Cloud Integrate multiple cloud components, services and providers Secure L2 Connectivity Public Cloud

More information

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4

More information

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015 Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%

More information

Lifesize Cloud, Architecture. A comprehensive guide

Lifesize Cloud, Architecture. A comprehensive guide A comprehensive guide Reference Paper February 2015 A service built to provide a connected experience, running on a platform built to perform that s Lifesize Cloud, powered by SoftLayer, an IBM Company.

More information

Executive Summary. Geographic Coverage

Executive Summary. Geographic Coverage Executive Summary Data networks are an increasingly critical component of international enterprises and customers are moving towards next generation services that better suit their evolving application

More information

Global Real Estate Outlook

Global Real Estate Outlook Global Real Estate Outlook August 2014 The Hierarchy of Economic Performance, 2014-2015 China Indonesia India Poland South Korea Turkey Australia Mexico United Kingdom Sweden United States Canada South

More information

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch

More information

借 力 IBM 云 服 务 构 筑 企 业 混 合 云 架 构 门 捷 声 IBM( 中 国 ) 全 球 科 技 服 务 部 大 西 区 解 决 方 案 经 理 云 计 算 正 在 为 传 统 产 业 模 式 带 来 一 场 革 命 新 的 客 户 需 求 正 在 驱 动 商 业 模 式 的 改 变 客 户 需 要 : 更 多 引 入 移 动 和 社 交 网 络 通 过 智 能 分 析 驱 动 个

More information

Dimension Data Public Compute-as-a-Service Regional Rate Plan Pricing Options

Dimension Data Public Compute-as-a-Service Regional Rate Plan Pricing Options ratecard Dimension Data Public Compute-as-a-Service al Rate Pricing Options Dimension Data Public Compute-as-a-Service (CaaS) al Rate (RRP) pricing offers unrivaled value and flexibility with no vendor

More information

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success

More information

Huawei Traffic Cleaning Solution

Huawei Traffic Cleaning Solution Huawei Traffic Cleaning Solution Copyright Huawei Technologies Co., Ltd. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written

More information

VERYBODY S NETWORK CLOUD LOUD The Internet. Making it fit for business EVERYBODY S NETWORK

VERYBODY S NETWORK CLOUD LOUD The Internet. Making it fit for business EVERYBODY S NETWORK EVERYBODY S NETWORK VERYBODY S NETWORK CLOUD LOUD The Internet. Making it fit for business THE INTERNET. MAKING IT FIT FOR BUSINESS FEBRUARY 26 TH 2015 February 26 th 2015 Thank Thank you for you joining

More information

Evolving Datacenter and Cloud Connectivity Services

Evolving Datacenter and Cloud Connectivity Services Evolving Datacenter and Cloud Connectivity Services May 2015 KVH Co., Ltd. www.kvhasia.com Public Cloud is NOT for Everything There are certain type of systems that are not ideal to be operated on public

More information

Hybrid Cloud for SAP Ground to Cloud Summit. accelerate your ambition 1

Hybrid Cloud for SAP Ground to Cloud Summit. accelerate your ambition 1 Hybrid Cloud for SAP Ground to Cloud Summit accelerate your ambition 1 SAP Cloud Portfolio 2015 HR Human Resources Omni-Channel Commerce & Customer Engagement Marketing Sales Service Sourcing & Procurement

More information

How To Connect To Telx Dia (Dia) For Free

How To Connect To Telx Dia (Dia) For Free Dedicated Internet Access (DIA) Frequently Asked Questions (FAQ) What is DIA? Telx Dedicated Internet Access service, or DIA for short, combines Telx s network neutral environment with colocation and automated

More information

DDoS Attacks in the United Kingdom

DDoS Attacks in the United Kingdom Neustar Insights DDoS Attacks in the United Kingdom 2012 Annual Trends and Impact Survey Contents Survey Findings, 2012 2011 Survey Methodology 3 Frequency of Attacks 3 Introduction In both 2011 and 2012,

More information

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio leonardo.serodio@alcatel-lucent.com May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes

More information

Content is king, but who rules?

Content is king, but who rules? Content is king, but who rules? Is an open Internet @ risk? IP Interconnection trends from a hybrid hosting provider perspective Bart van der Sloot Managing Director LeaseWeb Network May 19, 2016 About

More information

A Living Example of DDoS Mitigation

A Living Example of DDoS Mitigation A Living Example of DDoS Mitigation Stop DDoS before they stop you! James Braunegg (Micron 21) Maolin Gu (NSFOCUS) The creation of Micron21 Datacentre Removing resellers and middle men Working directly

More information

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad

More information

Service Provider Enablement Cloud Implementation Model

Service Provider Enablement Cloud Implementation Model Data Sheet Service Provider Enablement Cloud Implementation Model KEY BENEFITS 1.28Tbps global scrubbing capacity Multi-layered protection Zero capex New revenue stream Hassle-free setup Cloud-based WAFs

More information

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network) The old Software in the Network: What Happened and Where to Go Prof. Eric A. Brewer UC Berkeley Inktomi Corporation Local networks with local names and switches IP creates global namespace and links the

More information

Global IP Network POP

Global IP Network POP Our Business Is The Internet It s all we do 24x7x365 around the world. We re And we re global leaders in all Internet-related business. Take our Tier-1. It was designed and built to provide the best possible

More information

Availability Digest. www.availabilitydigest.com. History s Largest DDoS Attack? April 2013

Availability Digest. www.availabilitydigest.com. History s Largest DDoS Attack? April 2013 the Availability Digest History s Largest DDoS Attack? April 2013 From March 18 th through March 28 th, Spamhaus, a spam-filtering site, was swamped with up to 300 gigabits per second (gbps) of traffic

More information

Cloud Contact Center Market Trends:

Cloud Contact Center Market Trends: 50 Years of Growth, Innovation and Leadership Cloud Contact Center Market Trends: Movement from Best-of-Breed to Suites A Frost & Sullivan Executive Brief www. Frost & Sullivan INTRODUCTION The cloud model

More information

State of the Cloud DNS Report. Basic Edition April 2014

State of the Cloud DNS Report. Basic Edition April 2014 State of the Cloud DNS Report Basic Edition April 2014 2014 Table of Contents Overview Introduction... 3 Anycast vs. Unicast DNS... 3 Provider Overview & Current News... 4 Provider Market Share...7 Technology

More information

1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS 1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting

More information

Financial Fact Sheet. Equinix Snapshot. Company Summary. Products and Services. Managed Colocation Services

Financial Fact Sheet. Equinix Snapshot. Company Summary. Products and Services. Managed Colocation Services Financial Fact Sheet Equinix Snapshot NASDAQ Ticker: EQIX Recent Price (April. 27, 2006) $62.00 52-Week Range: $ 31.39 66.33 Common Shares Outstanding*: 28.6 Million Market Capitalization: $1.8 Billion

More information

Leveraging Access Switching For HPC Monitoring & Security

Leveraging Access Switching For HPC Monitoring & Security Leveraging Access Switching For HPC Monitoring & Security Sharon Besser, VP of Technology Net Optics, Inc. Intelligent Access and Monitoring Architecture Goal Present a methodology and solution of leveraging

More information

DENIAL-OF-SERVICE ATTACKS

DENIAL-OF-SERVICE ATTACKS DENIAL-OF-SERVICE ATTACKS 40 years old & more present then ever Robert Dürr, Brühl, 16./17.09.2015 Axians Networks & Solutions GmbH email: robert.duerr@axians.de 1 WHO IS AXIANS?! Axians is the new brand

More information

IBM Cloud :Infrastructure-as-a-Service

IBM Cloud :Infrastructure-as-a-Service IBM :Infrastructure-as-a-Service July 30 th, 2014 www.ibm.com/investor Forward Looking Statements and Non-GAAP Information Certain comments made in this presentation may be characterized as forward looking

More information

CERT Seminar March, 2010

CERT Seminar March, 2010 CERT Seminar March, 2010 Presenter: Paul Sop, Chief Technology Officer These materials may not be used or relied upon in any way other than under a written agreement with Prolexic Technologies Agenda -

More information

STREAMLINE YOUR TRADING COMMUNITY TRADING COMMUNITY SERVICES

STREAMLINE YOUR TRADING COMMUNITY TRADING COMMUNITY SERVICES STREAMLINE YOUR TRADING COMMUNITY TRADING COMMUNITY SERVICES Etrali Trading Solutions CONNECTING YOU TO THE WORLD S FINANCIAL MARKETS Electronic trading is revolutionising our industry, but its impact

More information

Stingray Traffic Manager Sizing Guide

Stingray Traffic Manager Sizing Guide STINGRAY TRAFFIC MANAGER SIZING GUIDE 1 Stingray Traffic Manager Sizing Guide Stingray Traffic Manager version 8.0, December 2011. For internal and partner use. Introduction The performance of Stingray

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

The Importance of High Customer Experience

The Importance of High Customer Experience SoftLayer Investments Drive Growth and Improved Customer Experience A Neovise Vendor Perspective Report 2010 Neovise, LLC. All Rights Reserved. Executive Summary Hosting and datacenter services provider

More information

AntiDDoS8000 DDoS Protection Systems

AntiDDoS8000 DDoS Protection Systems AntiDDoS8000 DDoS Protection Systems Background and Challenges With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.

More information

REVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE

REVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE REVIEW AND ANALYSIS OF INTERNET TRAFFIC AND ITS IMPLICATIONS ON THE ROOT NAME SERVER ARCHITECTURE Rami Khasawneh, Interim Dean, College of Business, Lewis University, khasawra@lewisu.edu Eveann Lovero,

More information

Cloud Security In Your Contingency Plans

Cloud Security In Your Contingency Plans Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect

More information

T&E. Where Business Travelers Spend Money

T&E. Where Business Travelers Spend Money T&E Where Business Travelers Spend Money Contents Introduction 3 Key Findings 4 Top Expensive Cities for Business Travel 5 International 5 U.S. 5 Top 10 Spend Categories 6 International 6 U.S. 7 Most Visited

More information

BENEFITS OF SERVERLESS COMPUTING

BENEFITS OF SERVERLESS COMPUTING BENEFITS OF SERVERLESS COMPUTING A Frost & Sullivan Market Insight INTRODUCTION TO SERVERLESS COMPUTING Serverless Computing is an integrated NVR/SAN platform that runs video management software directly

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information