efending The New Perimeter nd Protecting Applications Anywhere
|
|
|
- Douglas Haynes
- 10 years ago
- Views:
Transcription
1 efending The New Perimeter nd Protecting Applications Anywhere oud-based Application Services: Silverline nnis de Leest
2 rends
3 e 21 st century application infrastructure Users are going Mobile Every application is a Web application Cloud and SaaS based application are being deployed more th and faster than, ever befor
4 20% of F5 customers have a cloud first strategy The State of Application Delivery, F5 Networks, Jan. 2015
5 p Status in the Cloud % of respondents in cloud NOW 29% 29% 16% 17% 19% 21% 6% Finance 7% Industry 8% IT 10% Billing 11% Service Customer Interaction Marketing Automation HR Utility/Sharing Collaboration CRM The State of Application Delivery, F5 Networks, Jan. 2015
6 curing applications can be complex re cloud and SaaS applications are being deployed than ever before, driving need for more flexible and cost efficient ways to protect web applications and end against volumetric DDoS attacks across multiple environments without ling out IT infrastructure and staff. Script kiddies The rise of hacktivism Cyber war 86% percent of all websites have at least one serious vulnerability. SC Magazine - Website Security Stats Report 2015, WhiteHat Security
7 curing applications can be complex re cloud and SaaS applications are being deployed than ever before, driving need for more flexible and cost efficient ways to protect web applications oss multiple environments without scaling out IT infrastructure and staff. How can I protect my business against zero-day attacks and vulnerabilities? How can I maintain compliance across hybrid environments? here can I find WAF policy experts? How can I scale prote without upfront I investments? How can I protect cloud and SaaS applications, quickly? How can I drive operational and cost efficiencies?
8 tack Threats: Pay up or Else! il - May of 2015: s sent to legitimate businesses with the threat of massive DDoS attacks DD4BC claims ~400 Gbps Extortion demands starting at 25 Bitcoins Initially targeted Bitcoin, Payment providers banks and now moving to other targets UDP Amplification Attacks (NTP, SSDP, DNS TCP SYN Floods; and Layer 7 attacks Sample from actual
9 curity breach impacts your business ckers are working around the clock ing ever increasing attack tactics to in access to your sensitive enterprise ta through your web applications. amages your brand reputation Evolving security threats $1M + Cost of single cyber attack can be well above $1,000,000 esults in significant downtime and evenue loss ompromises sensitive enterprise, mployee and customer data reaches compliance required to onduct business online M Successful attacks per week 1 Monitored cyber attac in US 2 ource: 1 Penomon Institute, Cost of Cyber Crime Study, 2 IBM Security Services, 2014 Cyber Security Intelligence Index
10 ntroducing F5 Silverline
11 Silverline terprise-grade application services in minutes Rapidly deploy enterprise-grade application services across hybrid environments with 24x7x365 support from F5 experts. Web Application Firewall DDoS Protection F5 Silverline Cloud-based application services 24x7x365 Expert Support
12 Silverline: Key Benefits Cloud based, nterprise-grade t on F5 s industry leading G-IP solutions, Silverline pplication services are nterprise-grade, highly grammable, and can be onfigured to maintain istency with your existing IG-IP implementations. Drive operational and cost efficiencies Improve operational efficiency and decrease IT overhead by rapidly deploying Silverline services in minutes and outsourcing support to F5 experts offering the highest level of 24x7x365 service. Deliver app service anywhere Ensure your applications a available and secure no ma where they reside. Enab cloud migration by deploy Silverline application servi across hybrid environment conjunction with existing B deployments.
13 Silverline Services Defend against DDoS attacks and keep your business online with the Silverline DDoS Protection cloudscrubbing service to detect and mitigate even the largest of volumetric DDoS attacks before they reach your network. Protect web applications and data, and enable compliance, such as PCI DSS, with the Silverline Web Application Firewall service which is built on BIG-IP Application Security Manager (ASM) with expert policy setup and fine-tuning.
14 obal Coverage SOC 24/7 Support curity Operations Center is available 24x7x365 ecurity experts ready to nd to DDoS attacks and WAF policies within es Seattle, WA US Global Coverage Fully redundant and globally distributed data centers world wide in each geographic region San Jose, CA US Ashburn, VA US Frankfurt, DE Singapore, SG Industry-Leading Bandwid Attack mitigation bandwidt capacity over 2.0 Tbps Scrubbing capacity of over Tbps Guaranteed bandwidth wit Tier 1 carriers
15 Customer Portal ess the F5 customer portal to securely setup and manage your services, municate with F5 experts, and view transparent traffic and attack mitigation orts.
16 ilverline DDoS Protection
17 otect Your Business and Stay Online During a DDoS Attack -premises and cloud-based services for comprehensive DDoS Protectio F5 SILVERLINE DDOS PROTECTION When under attack F5 ON-PREMISES DDOS PROTECTION Turn on cloud-based service to stop volumetric attacks from ever reaching your network Multi-layered L3-L7 DDoS attack protection against all attack vectors 24/7 attack support from security experts Mitigate mid-volume, SSL, or application targeted attacks on-premises Complete infrastructure control Advanced L7 attack protections
18 E Offers Comprehensive DDoS Protection Threat Intelligence Feed Next-Generation Firewall Corpo Scanner Anonymous Proxies Anonymous Requests Botnet Attackers Cloud Network Application Volumetric attacks: L3-7 DDoS, floods, known signature attacks Multiple ISP strategy Network attacks: ICMP flood, UDP flood, SYN flood SSL attacks: SSL renegotiation, SSL flood F5 Silverline 24/7 expert support: security operations center CPE Cloud Signaling: Bad Actor IPs, Whitelist/ blacklist data DNS attacks: DNS amplification, query flood, dictionary attack, DNS poisoning Network and DNS HTTP attacks: Slowloris, slow POST, recursive POST/GET Application IPS Strategic Point of C
19 Offers Comprehensive DDoS Protection Threat Intelligence Feed Next-Generation Firewall Corpo Scanner Anonymous Proxies Anonymous Requests Botnet Attackers Cloud Network Application Volumetric attacks: L3-7 DDoS, floods, known signature attacks F5 Silverline 24/7 expert support: security operations center Multiple ISP strategy CPE Cloud Signaling: Bad Actor IPs, Whitelist/ blacklist data CLOUD KEY FEATURES Network attacks: ICMP flood, UDP flood, SYN flood L3-L7 volumetric DDoS attack detection and mitigation in the cloud 24x7 expert SOC services Network and DNS DNS DNS amplification, attacks: Transparent attack query flood, dictionary reporting attack, via F5 customer DNS poisoning portal IPS SSL attacks: SSL renegotiation, SSL flood HTTP attacks: Slowloris, slow POST, recursive POST/GET Application E Strategic Point of C
20 e Silverline DDoS Protection Story Designed to address customer frustrations of legacy cloud-based DDoS providers Acquired by F5 Networks in 2014 to be the first in a series of F5 Silverline cloudbased service offerings Enhanced through the addition of BIG-IP technology and an increased global footprint Full integration between customer BIG-IP on-premises and Silverline DDoS coming soon Defense.net was founded by the pioneers of the commercial DDoS Mitigation industry
21 earing Challenges with Current Enterprise Options cale per Customer: Concentration Risk Solution Side Effect Slow Mitigation Startup False Positives Not Enough Visibilit into Attacks
22 Silverline DDoS Protection ud-based service customer benefits p your business nline during a DDoS Attack Protect your business F5 Silverline DDoS Protection Protect against the largest of DDoS attacks Multi-layered, comprehensive L3-L7 protection Industry-leading a mitigation bandw per custome Security Operations Center Protect against a attack vecto ccess to DDoS xperts 24/7 F5 customer portal Gain attack mitig insights
23 Strategic Point of C os Scrubbing Center Architecture Scrubbing Center Inspection Plane Inspection Toolsets Traffic Actioner Route Management Flow Collection Visibility Portal Tier 1 Signaling Management Copied traffic for inspection BGP signaling Netflow Data Plane Netflow GRE Tunnel Proxy F5 Silverline Volumetric attacks and floods, operations center experts, L3-7 known signature attacks Switching Routing/ACL Switching Proxy and Asymmetric Mitigation Tier Routing (Customer VRF) IP Reflection X-Connect Customer
24 Silverline DDoS Protection - Service Options Always On Primary protection as the first line of defense Always Available Primary protection available on-demand
25 o Ways to Direct Traffic to lverline Scrubbing Centers Multiple Ways to Return Clean Traffic GRE TUNNELS GP (BORDER GATEWAY PROTOCOL) OUTED MODE L2VPN / VIRTUAL ETHERNET SERVICE IP REFLECTION EQUINIX CLOUD EXCHANGE NS ROXY MODE PROXY
26 paralleled Visibility and Reporting Before, During, and ter a DDoS Attack Attack Data Instant inspection on the filters and countermeasures used for mitigation Detailed timeline analysis on type, size, and attack vector Configuration and Provisioning Configure/ review/ modify settings for b Proxy and GRE mode through the portal Detailed Communication Real time attack communications Detailed events showing attack attribute SOC mitigations applied
27 y Resources he F5 DDoS Protection Reference Architecture White paper: The F5 DDoS Protection Reference Architecture Best practices: F5 DDoS Protection recommended Practices he F5 Silverline DDoS Protection Service Overview
28 ilverline Web Application Firewall ptional subhead here. Transition slides help break up presentations into separate sections or oints, helping orient your audience. Use punctuation in the slide title only if you have more than ne complete sentence. Choose blue, green, orange, or grey for your transition slides or a ombination of these colors.
29 Organizations need a more operationally and cost efficient way to protect web applications across multiple environments without scaling out IT infrastructure and staff. Secure data and web applications Maintain compliance (PCI DSS) Defend agains Layer 7 attacks
30 Solution: BIG-IP ASM the leading web application firew cognized as the most scalable WAF on the market Deployed in more datacenters worldwide than any other WAF VIPRION Platform BIG-IP Platform BIG-IP Virtual Edition
31 s web application firewall portfolio ilt on BIG-IP Application Security Manager (ASM) cognized as the most calable WAF on the market Deployed in more datacenters worldwide than any other WAF Now available as an enterprise-grade cloudbased service managed by F5 Security Operations Center (SOC) experts WAF VIPRION Platform BIG-IP Platform BIG-IP Virtual Edition F5 Silverline
32 lverline Web Application Firewall ven security effectiveness as a convenient cloud-based service tect web applications and data from layer 7 attacks, and enable compliance, such PCI DSS, with the Silverline Web Application Firewall service which is built on BIG-I plication Security Manager and backed by 24x7x365 support from F5 experts. Cloud L7 Protection: Geolocation attacks, DDoS, SQL injection, OWASP Top Ten attacks, zero-day threats, AJAX applications, JSON payloads Web Application Firewall Services Private C Hosted We itimate ser WAWAF F Physical H Web A ckers F5 Silverline VA/DAST Scans Policy can be built from 3 rd Party DAST Public C Hosted We
33 lverline Web Application Firewall ven security effectiveness as a convenient cloud-based service Silverline Cloud Security Operations Center 24x7x365 Policy Management Attack Escalation VA/DAST Scan Policy can be b from 3 rd Party D Web Application Firewall Services WAF WA F WAF Policy Engine Silverline Port F5 Silverline Violation Logs VIPRION Platform Customer Revi Violations
34 y benefits everage proven urity effectivness tect against critical web acks with an enterprisede service built on BIG-IP which is recommended by Labs with 99.89% overall ecurity effectiveness*. Reduce operating costs Rapidly deploy WAF protections and drive operational and cost efficiencies by outsourcing WAF policy management to F5 security experts. Protect web apps anywhere Protect web apps, no mat where they reside with consistent policies acros hybrid environments in conjunction with BIG-IP deployments. : NSS Labs Web Application Firewall Product Analysis. F5 BIG-IP ASM V
35 Leverage proven security effectiveness An enterprise-grade web application firewall service erprise-grade protection against er 7 geolocation attacks, DDoS, SQL ction, OWASP Top Ten attacks, zerothreats, AJAX applications, and N payloads delivered as a venient cloud-based service. recommends BIG-IP AS Web Application Firewall when compared with competitors: % %.124 Overall security effectiveness Minimal false positive : NSS Labs Web Application Firewall Product Analysis. F5 BIG-IP ASM V
36 Reduce operating costs by outsourcing WAF policy management to F5 SOC experts security experts proactively monitor, fine-tune policies to protect web lications and data from new and erging threats. Expert policy setup Policy fine-tuning Proactive alert monitoring False positives tuning Detection tuning Whitelist / Blacklist Set up and monitoring F5 Security Operations Center Expert Policy Setup and Management Availability & Support Active Threat Monitoring
37 in attack insights and intelligence Customer Portal ecurely communicate with Silverline OC experts iew centralized attack and threat onitoring reports with details ncluding: source geo-ip mapping blocked vs. alerted attacks blocked traffic and attack types alerted attack types Threats* bandwidth used hits/sec* type of traffic and visits (bots v. humans)* ted on initial release Customer Portal Visibility & Compliance Attack Rep
38 AF Violation Logs Detailed information provided in Violation logs showing request, SrcIP, all header information, etc Simplified workflow Block (policy is working as intended) Allow (policy should be updated to accept behavior)
39 w Silverline Web Application Firewall is different uilt on the industry leading purpose-built WAF: BIG-IP ASM compared to other WAF services built on ModSecurity Open Source technology he highest level of service from F5 SOC experts compared to other WAF services that are mostly self-serve omprehensive protections with the ability to import VA/DAST Scans ighly-customizable with irules and iapps programmability to protect gainst zero-day threats uture integrations with BIG-IP ASM to provide hybrid WAF services and PIs
40 esources on F5.com atasheet Product Overview F5 Silverline platform p:// oducts/f5-silverline-webplication-firewalltasheet.pdf products/f5-silverline-webapplication-firewall-productoverview.pdf platforms/silverline w F5 BIG-IP ASM modules/application-securitymanager
41
Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!
Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar! Die hybride DDoS Protection und Application Security Lösung von F5 Networks Arrow Sommerforum München am 16. Juli 2015 [email protected]
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
How To Make A Cloud Bursting System Work For A Business
Where will your application be in the future, in the cloud, on premises, off premises? How will you protect them? Nigel Ashworth Solution Architect EMEA Advanced threats Software defined everything SDDC/Cloud
F5 Silverline Web Application Firewall Onboarding: Technical Note
F5 Silverline Web Application Firewall Onboarding: Technical Note F5 Silverline Web Application Firewall Onboarding With organizations transitioning application workloads to the cloud, traditional centralized
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014
Application centric Datacenter Management Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014 Index Application Deliver Controller (ADC) Proxy ADC Advanced Feature Application Management Optional:
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures
Multi-Layer Security for Multi-Layer Attacks Preston Hogue Dir, Cloud and Security Marketing Architectures High-Performance Services Fabric Programmability Data Plane Control Plane Management Plane Virtual
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
Protect Your Infrastructure from Multi-Layer DDoS Attacks
Protect Your Infrastructure from Multi-Layer DDoS Attacks F5 EMEA Webinar February 2014 Presenter: Keiron Shepherd Title: Field Systems Engineer Protecting Against DDoS is Challenging Webification of apps
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Cloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
The F5 DDoS Protection Reference Architecture
The F5 DDoS Protection Reference Architecture F5 offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer
Corero Network Security First Line of Defense Executive Overview
FIRST LINE OF DEFENSE Corero Network Security First Line of Defense Executive Overview Products and Services that Protect Against DDoS Attacks and Cyber Threats EXECUTIVE SUMMARY Any organization conducting
Powered by. Incapsula Cloud WAF
Powered by Incapsula Cloud WAF Enero - 2013 Incapsula Cloud WAF Overview Incapsula Cloud WAF Delivery Model Threat Central 360 Global Threat Detection & Analysis Enables early detection across the entire
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
F5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
Datacenter Transformation
Datacenter Transformation Consolidation Without Compromising Compliance and Security Joe Poehls Solution Architect, F5 Networks Challenges in the infrastructure I have a DR site, but the ROI on having
F5 fra Lastbalansering til Sikkerhet med Applikasjonene i fokus. Jon Bjørnland F5 Norway [email protected]
F5 fra Lastbalansering til Sikkerhet med Applikasjonene i fokus Jon Bjørnland F5 Norway [email protected] Markedsleder innen Application Delivery Networking Gartner, Feb 2009: Load Balancers Are Dead:
Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers
How to Protect Your from Hackers Web attacks are the greatest threat facing organizations today. In the last year, Web attacks have brought down businesses of all sizes and resulted in massive-scale data
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Application Security Manager ASM. David Perodin F5 Engineer
Application Security Manager ASM David Perodin F5 Engineer 3 Overview BIG-IP Application Security Manager (ASM) a type of Web application firewall ASM s advanced application visibility, reporting and analytics
Distributed Denial of Service protection
Distributed Denial of Service protection The cost in terms of lost business caused by a successful DDoS attacks can be significant. Our solution recognises when a DDoS attack is happening and identifies
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
F5 and VMware. Realize the Virtual Possibilities.
. Realize the Virtual Possibilities. Simplify. Accelerate. Manage. Secure. Discover how deliver a Software-Defined Data Center by providing simplified end-to-end networking through an application-centric
Business Case for a DDoS Consolidated Solution
Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
The F5 DDoS Protection Reference Architecture
The F5 DDoS Protection Reference Architecture F5 offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer
F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer
F5 (Security) Web Fraud Detection Keiron Shepherd Security Systems Engineer The 21 st century application infrastructure (Trends) Users are going to access applications Mobile/VDI/XaaS/OS Security goes
Post-TMG: Securely Delivering Microsoft Applications
Post-TMG: Securely Delivering Microsoft Applications Microsoft Forefront Threat Management Gateway customers need an alternative to secure their Internet-facing Microsoft applications. F5 BIG-IP Application
NSFOCUS Web Application Firewall
NSFOCUS Web Application Firewall 1 / 9 Overview Customer Benefits Mitigate Data Leakage Risk Ensure Availability and QoS of Websites Close the Gap for PCI DSS Compliance Collaborative Security The NSFOCUS
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected]. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected] Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services
Don t get DDoSed and Confused Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services Agenda Intro/Data Collection DDoS Basics Trends and Statistics Adversarial Groups/Motivations Defense
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.
FortiDDoS DDoS Attack Mitigation Appliances Copyright Fortinet Inc. All rights reserved. What is a DDoS Attack? Flooding attack from compromised PCs run by a Botmaster The Botmaster s motivations may be
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
Service Provider Enablement Cloud Implementation Model
Data Sheet Service Provider Enablement Cloud Implementation Model KEY BENEFITS 1.28Tbps global scrubbing capacity Multi-layered protection Zero capex New revenue stream Hassle-free setup Cloud-based WAFs
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Security Solutions for the New Threads
Security Solutions for the New Threads We see things others can t Pablo Grande Sales Director, SOLA [email protected] What a CISO Is Looking For Show Progress on Response Time Measurably improve our incident
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
Data Sheet: Vigilant Web Application Firewall. Where every interaction matters. Security-as-a-Service. Fully Managed Solution
Where every interaction matters. Data Sheet: Vigilant Web Application Firewall Security-as-a-Service Fully Managed Solution Continuous Monitoring of Threats Attacks on websites and web applications are
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting
Security F5 SECURITY SOLUTION GUIDE
F5 SECURITY SOLUTION GUIDE Security Protect your data center and application services, improve user access, optimize performance, and reduce management complexity. 1 WHAT'S INSIDE Data Center Firewall
Company Overview. October 2014
Company Overview October 2014 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus What Does Black Lotus Do? We are a security company that protects businesses
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
Aplikacija novi vladar poslovanja. Dino Novak F5 Networks
Aplikacija novi vladar poslovanja Dino Novak F5 Networks What is an application nowdays? Device native or HTTP based (no longer on client only) Dynamic (many server GET/PUT requests) Talks to backend service(s)
KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks
KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)
www.obrela.com Swordfish
Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating
Akamai Security Products
Akamai Security Products Key Areas of Cloud Security for Akamai Protect Web Availability Internet Infrastructure Security Remove Credit Cards Payment Tokenization Web Application Firewall Application Security
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio [email protected] May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio [email protected] May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
Application Security in the Cloud with BIG-IP ASM
F5 White Paper Application Security in the Cloud with BIG-IP ASM Whether critical applications live in the cloud, in the data center, or in both, organizations need a strategic point of control for application
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
Scale your DNS Infrastructure Ensure App and Service Availability. Nigel Ashworth Solution Architect EMEA [email protected] +44 77 88 436 325
Scale your DNS Infrastructure Ensure App and Service Availability Nigel Ashworth Solution Architect EMEA [email protected] +44 77 88 436 325 Agenda DNS and F5 Use Cases - The top four Firewall for DNS
www.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
How to Evaluate DDoS Mitigation Providers:
Akamai White Paper How to Evaluate DDoS Mitigation Providers: Four Critical Criteria How to Evaluate DDoS Mitigation Providers 2 TABLE OF CONTENTS INTRODUCTION 3 CRITERIA #1: THREAT INTELLIGENCE 3 CRITERIA
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks
Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection Oğuz YILMAZ CTO Labris Networks 1 Today Labris Networks L7 Attacks L7 HTTP DDoS Detection Problems Case Study: Deep DDOS Inspection (DDI
What to Look for When Choosing a CDN for DDoS Protection Written by Bizety
What to Look for When Choosing a CDN for DDoS Protection Written by Bizety WHITE PAPER Introduction Every online company should be familiar with Distributed Denial of Service (DDoS) attacks and the risk
Akamai to Incapsula Migration Guide
Guide Akamai to Incapsula Migration Guide Introduction Incapsula is an enterprise-grade cloud service that helps companies deliver applications more efficiently and securely. This is accomplished through
Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd [email protected]
Protection against DDoS and WEB attacks Michael Soukonnik Radware Ltd [email protected] Landscape Ponemon Research 2012: Cyber security threats Cyber security threats according to risk mitigation priority
[Restricted] ONLY for designated groups and individuals. 2014 Check Point Software Technologies Ltd.
[Restricted] ONLY for designated groups and individuals Contents 1 2 3 4 Industry Trends DDoS Attack Types Solutions to DDoS Attacks Summary 2 Cybercrime Landscape DNS Hijacking Malware 3% 3% Targeted
Akamai Cloud Security Solutions:
AKAMAI WHITE PAPER Akamai Cloud Security Solutions: Comparing Approaches for Web, DNS, and Infrastructure Security TABLE OF CONTENTS INTRODUCTION 1 THE CHANGING THREAT LANDSCAPE 1 Denial-of-service attacks
