IDG Connect DDoS Survey

Similar documents
SecurityDAM On-demand, Cloud-based DDoS Mitigation

Stop DDoS Attacks in Minutes

How To Block A Ddos Attack On A Network With A Firewall

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Cloud Security In Your Contingency Plans

VALIDATING DDoS THREAT PROTECTION

Business Case for a DDoS Consolidated Solution

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Practical Advice for Small and Medium Environment DDoS Survival

Building the business case for continuity and resiliency

A Layperson s Guide To DoS Attacks

INSERT COMPANY LOGO HERE

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

E-Guide. Sponsored By:

Service Availability Metrics

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Automated Mitigation of the Largest and Smartest DDoS Attacks

CONTENT DELIVERY NETWORKS

Ferramentas de Ataques de DDoS e a Evolução de ameaças a disponibilidade contra serviços Internet. Julio Arruda Gerente America Latina Engenharia

Stop DDoS Attacks in Minutes

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Automated Mitigation of the Largest and Smartest DDoS Attacks

How To Mitigate A Ddos Attack

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

The F5 DDoS Protection Reference Architecture

Securing Your Business with DNS Servers That Protect Themselves

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

[Restricted] ONLY for designated groups and individuals Check Point Software Technologies Ltd.

CyberArk Privileged Threat Analytics. Solution Brief

DNS Server Security Survey

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

WHITE PAPER Hybrid Approach to DDoS Mitigation

How To Protect Yourself From A Dos/Ddos Attack

Attack Intelligence: Why It Matters

Stop DDoS Attacks in Minutes

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Check Point DDoS Protector

DDoS Mitigation Techniques

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Securing Your Business with DNS Servers That Protect Themselves

DDoS Overview and Incident Response Guide. July 2014

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

FortiDDos Size isn t everything

How to Evaluate DDoS Mitigation Providers:

Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall. White Paper

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Advanced Threats: The New World Order

DDoS Mitigation Strategies

First Line of Defense

Information Technology

How To Make A Cloud Bursting System Work For A Business

Acquia Cloud Edge Protect Powered by CloudFlare

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0

CYBER SECURITY SERVICES PWNED

DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

Corero Network Security First Line of Defense Executive Overview

Requirements When Considering a Next- Generation Firewall

ADC Survey GLOBAL FINDINGS

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

The Expanding Role of Service Providers in DDoS Mitigation

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Transcription:

KEY FINDINGS INTERACTIVE GUIDE 2016 IDG Connect DDoS Survey As Attacks Intensify DDoS Defenses Require New Strategies

Introduction IDG (commissioned by A10 Networks ) conducted a survey of over 120 North American IT/Security decision makers to gain insights into Enterprise capabilities to deal with the rise of multi-vector DDoS attacks. The study assessed how DDoS attacks impact these enterprises, steps to address such threats, effectiveness levels of existing protection solutions and perceived barriers to increased protection, desired capabilities, investment focus and desired vendor characteristics.

Survey Highlights Survey Respondents Say: A focus on the worst case scenarios is the best defense against a DDoS attack. The most effective DDoS defense solution is a hybrid approach on-premise with cloud bursting option. The average peak bandwidth range of attacks is 30-40 Gbps. Attacks are becoming more complex and should not be ignored. Customer satisfaction is a critical metric to measure DDoS impact. The effective downtime from an average attack is 17 hours. DDoS leadership is primarily driven by the IT security teams and not by the Network teams. Over half of respondents plan to increase DDoS budgets in the next year.

Target Audience Most respondents are from organizations with over 1,000 employees with 10 Gbps or more of Network Connectivity across their data centers. Functional Focus Organization Size 68% 1000-4999 employees Network Connectivity IT (Networking) 36% IT (Security) 35% IT (Management) 29% 58% Between 40 Gbps and 100 Gbps 23% Between 100 Gbps and 500 Gbps Primary Role 50% 41% 8% Technical Decision Makers Executive Decision Makers Others Industry The primary industries surveyed were: GAMBLING, MEDIA/ENTERTAINMENT/RETAIL-ETAIL, AD-ECH/MARTECH

FINDINGS > DDOS ATTACKS IN THE PAST YEAR DDoS Attacks in the Past Year NUMBER OF ATTACKS: Respondents were aware of an average of 15 DDoS attacks during the past 12 months. ATTACK FREQUENCY: Highest percentage of organizations faced 1 to 5 Attacks. About a third faced over 25 Attacks. AN AVERAGE 15 DDoS attacks 42% 32% faced 1 to 5 Attacks faced Over 25 Attacks

FINDINGS > AVERAGE PEAK BANDWIDTH AND TYPES Average Peak Bandwidth for Attacks Multi-Vector DDoS Attacks Average range of DDoS attacks is 30-40 Gbps. Organizations face all three kinds of multi-vector DDoS attacks: 40% 30-40 Gbps 23% 40-50 Gbps 10% More than 50 Gbps 14% 20-30 Gbps 35% 34% 30% Network-Layer Network/Volumetric Application-Layer CONNECT

FINDINGS > ATTACK SIZE AND DOWNTIME Attack Size While the average attack size is lower, a majority of organizations report at least one DDoS attack reaching 40 Gbps or more. Downtime Average effective downtime because of a DDoS attack is 17 hours. 59% report at least one DDoS attack reaching 40 Gbps or more Gbps The average downtime is 17hours CONNECT

FINDINGS > ATTACK TYPES AND MOST EFFECTIVE SOLUTIONS Attack Types Most Effective Solutions 23% 16% 14% UDP Flood (incl. DNS amplification) Slow POST (Slowloris) SYN Flood have the next most incidence Most professionals are convinced that a combination of on and off site Hybrid protection (on premise with a cloud bursting option) is the most effective solution to address a multi vector DDoS threat. 34% Hybrid is the most effective solution 26% 21% 19% Outsourced to MSSP/Cloud-based Provider Hosting Provider (including CDN) On-premise Appliance CONNECT

FINDINGS > DDoS DECISION MAKING AND BIGGEST BARRIER DDoS Decision Making The research indicates that DDoS decisions are driven by Security Decision Makers. This probably occurs because the malicious intent of DDoS attacks makes it a security concern, not just a network issue. Biggest Barrier Cost of Detection and Mitigation Solutions is considered the biggest internal barrier to greater DDoS protection. vs. The cost is the biggest internal barrier 29% 92% Security Teams 8% Network Teams CONNECT

FINDINGS > CAPABILITIES AND IMPACT OF DDoS SOLUTIONS Capabilities All features and capabilities received significant relative importance: Automated Detection and Mitigation followed by Threat Intelligence Feed are considered the most important, but makes it clear organizations are looking for a wide range of features. 18% Automated Detection and Mitigation Impact of DDoS Solutions Impact of new DDoS solutions is almost evenly distributed: 27% 26% 24% 23% Multi-vector Protection Metrics Throughput Performance Reduced Data Center Footprint TCO Savings 16% Threat Intelligence Feed CONNECT

FINDINGS > BUDGET AND MOST IMPORTANT VENDOR CHARACTERISTICS Budget Most Important Vendor Characteristics The majority of organizations claim they plan to increase DDoS budgets over the next six months. 54% 32% Yes Organizations that plan to increase DDoS budgets estimate a 22% increase. Respondents consider Demonstrated Experience as relatively the most important vendor characteristic that makes them favor one over the other. $ No 36% 19% 14% Unsure/ Don t know 18% 15% 12% Demonstrated Experience Known Brand Performance Guarantees Perceived Expertise Availability of Additional Services CONNECT

Respondent Viewpoints Respondents were quite vocal in their perceptions around the threat of DDoS. Here are the key statements, ranked by frequency. 93% On Preparing for DDoS: A focus on worst case scenarios is the best preparation against high packet-per-second attacks. 88% On DDoS Solutions: The best DDoS solutions are deep and detailed with an emphasis on factual reporting. 86% On the Importance of Immediate Mitigation: An immediate DDoS mitigation of minutes is worth weeks and months of preparation. 83% On Vendor reputation: The best DDoS solutions are those used by major, respected corporations who need to make an immediate, action-oriented response. 77% On Multi-Vector DDoS Attacks: Multi-vector attacks, which include volumetric and application layer attacks, will be most dangerous in the future.

Key Takeaways Organizations cannot ignore the hidden but present danger of DDoS attacks. Respondents confirm this in the frequency, magnitude and negative impact they face on an ongoing basis. From this research there are certain areas of insight that decision makers can use to avoid the disruptive impact of DDoS. 1 It s better to plan in advance than try to correct the problem after you ve been attacked. 2 3 The true financial impact of DDoS is difficult to measure because slowdown and blocked service can go undetected without protection monitoring in place. Consider protection for three reasons: lost orders, restoration of service costs and erosion of customer satisfaction levels. 4 Just because no one agrees there is a problem doesn t mean it s not there. Remember that denial and let s ride it out mentality are common when it comes to DDoS. 5 The best protection against multivector is hybrid protection (with cloud bursting option) and a preference for online mitigation.

Four DDoS Strategy Recommendations 1 Be proactive, not reactive. Don t wait for a major crash. You may already be experiencing attacks with slowed or blocked customer access which can lose sales and/or create customer dissatisfaction. 2 Hope for the best, but prepare for the worst. Invest in sufficient DDoS protection early, before the organization has experienced a major attack. 3 Beware of the world of denial. Ask the tough questions. What do your customer satisfaction metrics reveal? Do you see indicators of lost sales? What s the real cost of service restoration? 4 Consider dedicated multi-vector DDoS protection using in path mitigation coupled with integrate threat intelligence for best accuracy. Include hybrid protection with a cloud bursting service as an extra precaution to combat volumetric attacks.

A10 Thunder TPS (Threat Protection System) can block multi vector DDoS threats before they happen. It offers true, always-on, multi vector protection that defends against the full attack spectrum. It leverages intelligence from millions of devices, blocking traffic from a high-quality list of bad IP addresses, and is backed by strong support. To learn more about A10 Thunder TPS, please visit a10networks.com/tps Part Number: A10-MS-23175-EN-01 June 2016