Check Point DDoS Protector



Similar documents
[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

SecurityDAM On-demand, Cloud-based DDoS Mitigation

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Radware s Attack Mitigation Solution On-line Business Protection

FortiDDos Size isn t everything

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Introducing Radware Attack Mitigation System. Presenter: Werner Thalmeier September 2013

4 Delivers over 20,000 SSL connections per second (cps), which

How To Block A Ddos Attack On A Network With A Firewall

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

VALIDATING DDoS THREAT PROTECTION

CloudFlare advanced DDoS protection

Introduction about DDoS. Security Functional Requirements

Complete Protection against Evolving DDoS Threats

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Acquia Cloud Edge Protect Powered by CloudFlare

TDC s perspective on DDoS threats

Business Case for a DDoS Consolidated Solution

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Analysis of a DDoS Attack

SHARE THIS WHITEPAPER

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Data Sheet. DPtech Anti-DDoS Series. Overview

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

DDoS Protection on the Security Gateway

Datacenter Transformation

Automated Mitigation of the Largest and Smartest DDoS Attacks

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Radware s Behavioral Server Cracking Protection

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

IBM Security Network Intrusion Prevention System

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Appliance Comparison Chart

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

PROFESSIONAL SECURITY SYSTEMS

WhitePaper. Mitigation and Detection with FortiDDoS Fortinet. Introduction

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

How To Mitigate A Ddos Attack

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Arbor s Solution for ISP

How Cisco IT Protects Against Distributed Denial of Service Attacks

Introducing FortiDDoS. Mar, 2013

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Stop DDoS Attacks in Minutes

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

DoS: Attack and Defense

Automated Mitigation of the Largest and Smartest DDoS Attacks

/ Staminus Communications

DefensePro Whitepaper Fighting Cybercrime: Rethinking Application Security By Ron Meyran

Stop DDoS Attacks in Minutes

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Stress Testing and Distributed Denial of Service Testing of Network Infrastructures

Are you safe from DDoS attacks?

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

DPtech ADX Application Delivery Platform Series

Global DDoS Prevention Market

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

A Layperson s Guide To DoS Attacks

Load Balancing Security Gateways WHITE PAPER

Analysis of Network Packets. C DAC Bangalore Electronics City

Security. 26 November 2012 Vol.18 No11

Stop DDoS Attacks in Minutes

DDoS Attacks & Mitigation

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse

Four Ways High-Speed Data Transfer Can Transform Oil and Gas WHITE PAPER

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Cheap and efficient anti-ddos solution

DDoS Overview and Incident Response Guide. July 2014

Smart Network. Smart Business. Application Delivery Solution Brochure

First Line of Defense

How To Protect A Dns Authority Server From A Flood Attack

Transcription:

Check Point DDoS Protector June 2012 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.

Cybercrime Trends for 2012 44% 35% 33% 32% SQL Injections APTs Botnet DDoS 65% Businesses Experienced Attacks Average $214,000 of Damage Per Attack Ponemon Institute, May 2012 2

Victims of Recent DDoS Attacks Amazon.com claims its widely publicized DDoS attack resulted in a loss of $600,000 during the 10 hours it was down Amazon.com 3

Today s Attacks Are More Sophisticated More DDoS attacks today than ever before More damage with application attacks No need to flood network bandwidth 4

DDoS Attacks by Type Application Layer Attacks TCP SYN Flood Network Layer Attacks More attacks are targeted at the Application Layer Radware 2011 5

Application Layer DDoS Attacks New Application Attacks Are Stealthier Exploit application weakness with Low&Slow attacks Utilize relatively low volume and fewer connections Used in conjunction with volume-based attacks Undetectable by threshold- or volume-based solutions 6

DDoS Protection The Right DDoS Solution Should Have Network Layer Protection Adaptable Application Layer Protections Fast Response Time 7

Introducing Check Point DDoS Protector Block Denial of Service Attacks Within Seconds! 8

Check Point DDoS Protector Customized multi-layered DDoS protection Protects against attacks within seconds Integrated security management and expert support 9

Multi-Vectored DDoS Attacks Network Flood Server Flood Application Low & Slow Attacks High volume of packets High rate of new sessions Web / DNS connectionbased attacks Advanced attack techniques 10

Multi-Layered Protections Network Flood Server Flood Application Low & Slow Attacks Behavioral High volume of network packets analysis Automatic and High rate of pre-defined new sessions signatures Web Behavioral / DNS connectionbased DNS HTTP and attacks Advanced Granular attack custom filters techniques Stateless and behavioral engines Protections against misuse of resources Challenge / response mitigation methods Create filters that block attacks and allow users 11

DDoS Protector Product Line Enterprise Grade Up to 3 Gbps throughput 2M concurrent sessions 1 Mpps max. DDoS flood attack rate Datacenter Grade Up to 12 Gbps throughput 4M concurrent sessions 10 Mpps max. DDoS flood attack rate 7 models to choose from 1GbE copper and 10GbE fiber connections Low latency 12

Where to Protect Against DDoS Scenarios: 1 2 3 On-Premise Deployment DDoS Protector Appliance + Off-Site Deployment DDoS Protector Appliance 13

Appliance Specifications Model DP 506 DP 1006 DP 2006 DP 3006 DP 4412 DP 8412 DP 12412 Capacity 0.5Gbps 1Gbps 2Gbps 3Gbps 4GBps 8Gbps 12Gbps Max Concurrent Sessions Max DDoS Flood Attack Protection Rate Latency 2 Million 4 Million 1 Million packets per second 10 Million packets per second <60 micro seconds Real-Time Signatures Detect and protect against attacks in less than 18 seconds 14

Integrated Security Management Unified Logs and Monitoring and Unified Reporting Leverage SmartView Tracker, SmartLog and SmartEvent for historic and realtime security status 15

Flexible Deployment Options Ready to Protect in Minutes Fits to Existing Network Topology Optional Learning Mode Deployment Low Maintenance and Support 16

Emergency Response and Support Emergency Response Team Help from security experts when under DoS attacks Leverage experience gathered from real-life attacks Check Point customer support World-class support infrastructure Always-on support 7x24 Flexible service options 17

Summary Blocks DDoS Attacks Within Seconds Customized multi-layered DDoS protection Ready to protect in minutes Integrated with Check Point Security Management 18

Thank You 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.