SlideShare une entreprise Scribd logo
1  sur  30
Advanced DDoS Protection for Service Providers & MSSPs Ron Meyran – Director Product Marketing Security July 2011
Agenda DDoS Is Growing & Evolving Key Success Criteria for Service Providers & MSSPs  Radware’s Advanced Solution Customer Cases Summary  Slide 2
DDoS is growing and evolving
DDoS Threat is growing Slide 4 Attack size Operation Sony DDoS Operation Payback II on Codero;  Netbot DDoS on Wordpress.com Operation payback – Wikileaks revenge DDoS attacks July 2009 cyber attacks (US and south korea) IMDDOS – Commercial Botnet Slowloris - Low & Slow Attacks Twitter DDOS attack on Cyxymu Time 2009 2011 2010 Source: Radware ERT report
When you have no Anti-DoS solution in place… Slide 5 Wikileaks site outage Westboro Baptist Outage 4 sites held down for 6 days
Poll question How many DDoS attacks did you (or your customer) face in the past year? None Only once Few times Many times I don’t have the tools to detect DDOS attacks Slide 6
Multi-Vulnerability Attack Campaigns Slide 7 Large volume network flood attacks Conclusions ,[object Object]
  Even if one attack vector is successful – the business is severely impactedLarge volume SYN flood Low & Slow connection DoS attacks Business Slow Application flood attack (Slowloris) Application flood attack (HTTP data flood) BUSINESS IMPACT
DDoS Protection: layers of defense Slide 8 Type of DoS attacks: PPS & Bandwidth flood attacks Connection & application flood attacks Directed application DoS attacks High Med Attack volume: Low Challenges: ,[object Object]
Bandwidth capacity
Identify malicious sources
Accurate mitigation – all     sessions are legitimate
Deep packet inspection
Ad-hoc filters creation
   Accurate mitigation – maintain very low false positives
   Time to protect,[object Object]
What drives the MSSP success? (1 of 2) Business True DDoS Protection Can you detect and protect emerging DDoS attacks including multi-vulnerability campaign attacks and slow DDoS attacks? How fast can you detect and protect against attacks? In seconds? In minutes? Financial Solution scalability Can your infrastructure grow without painful forklift upgrades? How do you price your service? Monthly fee On demand / per incident SLA penalties / rewards Slide 10
What drives the MSSP success? (1 of 2) Technical  Flexible deployment Fit any customer architecture Operational Customer centric reporting Easy integration into provider environment (OSS, SEM, SOC) Marketing What is unique in your offering? SLA: can you guarantee Time to protect? Coverage – what type of attacks do you protect, and what you don’t? Multi locations vs. single location Customers portfolio and testimonials Slide 11
Radware solution for DDoS service providers
DDoS Protection: Radware coverage Slide 13 Radware DDoS Protections: PPS & Bandwidth flood attacks Connection & application flood attacks Directed application DoS attacks ASIC-Based  DoS Mitigator  Engine (DME) Real-time signatures technology Multi-core CPUs Real-time signatures & challenge -response technologies StringMatch Engine (SME) RegEx Engine Static & user filters Up to 12MPPS of attack prevention Up to 800K new TPS of HTTP Challenge-Response Full 10Gbps DPI (RegEx) processing
DDoS Protection: Radware technologies Slide 14 PPS & Bandwidth flood attacks Connection & application flood attacks Directed application DoS attacks ,[object Object]
 SYN Protection (SYN cookies; Web cookies)
 Rate based protections
 HTTP & DNS advanced Challenge –Response techniques
 Behavioral based real-time signatures
Rate based protections
 Auto-updated RegEx filters
 Counter attack techniques
 Ad-hoc filters
 Widest DDoS attacks coverage out-of-the-box

Contenu connexe

Tendances

HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN ControllerHACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
Priyanka Aash
 

Tendances (20)

Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN ControllerHACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Why DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt TechnologiesWhy DDoS RADAR | MazeBolt Technologies
Why DDoS RADAR | MazeBolt Technologies
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
Webinar: DRaaS - It’s Not Just For Disasters Anymore
Webinar: DRaaS - It’s Not Just For Disasters AnymoreWebinar: DRaaS - It’s Not Just For Disasters Anymore
Webinar: DRaaS - It’s Not Just For Disasters Anymore
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
 

Similaire à Radware Solutions for MSSPs

The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
Dominik Suter
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
webhostingguy
 

Similaire à Radware Solutions for MSSPs (20)

The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, LatviaDSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
DSS ITSEC CONFERENCE - Radware - Attack Mitigation System (AMS) - Riga, Latvia
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
The worst of enemies – let’s talk about DDoS and RTC, Sandro Gauci
The worst of enemies – let’s talk about DDoS and RTC, Sandro GauciThe worst of enemies – let’s talk about DDoS and RTC, Sandro Gauci
The worst of enemies – let’s talk about DDoS and RTC, Sandro Gauci
 
The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer Presentation
 
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival GuideDSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 

Plus de Radware

Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Radware
 

Plus de Radware (20)

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs Downtime
 
Radware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock Bash
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand Perception
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat Landscape
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
SecureWorld: Information Security Adaption: Survival In An Evolving Threat L...
SecureWorld:  Information Security Adaption: Survival In An Evolving Threat L...SecureWorld:  Information Security Adaption: Survival In An Evolving Threat L...
SecureWorld: Information Security Adaption: Survival In An Evolving Threat L...
 
Briefing on Recent US Bank Attacks and 2012 Attack Trends
Briefing on Recent US Bank Attacks and 2012 Attack TrendsBriefing on Recent US Bank Attacks and 2012 Attack Trends
Briefing on Recent US Bank Attacks and 2012 Attack Trends
 
Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Radware Solutions for MSSPs

  • 1. Advanced DDoS Protection for Service Providers & MSSPs Ron Meyran – Director Product Marketing Security July 2011
  • 2. Agenda DDoS Is Growing & Evolving Key Success Criteria for Service Providers & MSSPs Radware’s Advanced Solution Customer Cases Summary Slide 2
  • 3. DDoS is growing and evolving
  • 4. DDoS Threat is growing Slide 4 Attack size Operation Sony DDoS Operation Payback II on Codero; Netbot DDoS on Wordpress.com Operation payback – Wikileaks revenge DDoS attacks July 2009 cyber attacks (US and south korea) IMDDOS – Commercial Botnet Slowloris - Low & Slow Attacks Twitter DDOS attack on Cyxymu Time 2009 2011 2010 Source: Radware ERT report
  • 5. When you have no Anti-DoS solution in place… Slide 5 Wikileaks site outage Westboro Baptist Outage 4 sites held down for 6 days
  • 6. Poll question How many DDoS attacks did you (or your customer) face in the past year? None Only once Few times Many times I don’t have the tools to detect DDOS attacks Slide 6
  • 7.
  • 8. Even if one attack vector is successful – the business is severely impactedLarge volume SYN flood Low & Slow connection DoS attacks Business Slow Application flood attack (Slowloris) Application flood attack (HTTP data flood) BUSINESS IMPACT
  • 9.
  • 12. Accurate mitigation – all sessions are legitimate
  • 15. Accurate mitigation – maintain very low false positives
  • 16.
  • 17. What drives the MSSP success? (1 of 2) Business True DDoS Protection Can you detect and protect emerging DDoS attacks including multi-vulnerability campaign attacks and slow DDoS attacks? How fast can you detect and protect against attacks? In seconds? In minutes? Financial Solution scalability Can your infrastructure grow without painful forklift upgrades? How do you price your service? Monthly fee On demand / per incident SLA penalties / rewards Slide 10
  • 18. What drives the MSSP success? (1 of 2) Technical Flexible deployment Fit any customer architecture Operational Customer centric reporting Easy integration into provider environment (OSS, SEM, SOC) Marketing What is unique in your offering? SLA: can you guarantee Time to protect? Coverage – what type of attacks do you protect, and what you don’t? Multi locations vs. single location Customers portfolio and testimonials Slide 11
  • 19. Radware solution for DDoS service providers
  • 20. DDoS Protection: Radware coverage Slide 13 Radware DDoS Protections: PPS & Bandwidth flood attacks Connection & application flood attacks Directed application DoS attacks ASIC-Based DoS Mitigator Engine (DME) Real-time signatures technology Multi-core CPUs Real-time signatures & challenge -response technologies StringMatch Engine (SME) RegEx Engine Static & user filters Up to 12MPPS of attack prevention Up to 800K new TPS of HTTP Challenge-Response Full 10Gbps DPI (RegEx) processing
  • 21.
  • 22. SYN Protection (SYN cookies; Web cookies)
  • 23. Rate based protections
  • 24. HTTP & DNS advanced Challenge –Response techniques
  • 25. Behavioral based real-time signatures
  • 28. Counter attack techniques
  • 30. Widest DDoS attacks coverage out-of-the-box
  • 31.
  • 32.
  • 34. Packet & BW attacks
  • 38. Time to protect : immediate (seconds)DoS protection Service Provider Infrastructure Attack Mitigation System Scrubbing center
  • 39.
  • 43. Advanced Alerts based on event correlation rulesBuilt-in reports and alerts engine Slide 17 DoS protection Service Provider Infrastructure Management & SEM
  • 44. Poll question What is the main reason customer select your security services: Attack coverage Reporting Price One stop shop – we are their hosting service provider We do not provide yet security services Slide 18
  • 45. Advanced alerts: SOC/NOC alarms Slide 19 Attack volume is higher than 1Gbps in past 5 minutes Customer critical application is under high risk attack SOC Provider SOC must be aware of high risk and high importance cases DoS protection Service Provider Infrastructure Management & SEM
  • 46. Advanced alerts: Show customer SLA Slide 20 Dear customer, Your site is under high volume attack for more than 1 hours. You are fully protected. Regards. Dear customer, Your booking application has been attacked more than 4 times throughout the day. Regards. DoS protection Service Provider Infrastructure Demonstrate SLA and ROI Automatic customer notification via email Management & SEM
  • 47.
  • 48. Scheduled Reports and Alerts by email
  • 50. Export Alerts and event logs
  • 51. Direct access API to events log databaseReports & Alerts: easy service integration Slide 21 Portal monitoring view Historical reports DoS protection Service Provider Infrastructure Management & SEM Customer Portal
  • 52.
  • 53.
  • 54. Product and security experts supportSOC DoS protection Service Provider Infrastructure Management & SEM Attack Mitigation System Scrubbing center
  • 55.
  • 56. Target: High Council for Telecommunications (TIB)
  • 57. When: June 9th (Thursday) 2011 at 6PM
  • 58. Attack tool: Low Orbit Ion Canon (LOIC)
  • 59. Type of attack - Multi-vulnerability campaign:
  • 60. HTTP Get flood attack
  • 61. TCP connection flood on port 80
  • 63.
  • 66. Attack tool: Low Orbit Ion Canon (LOIC)
  • 67.
  • 68.
  • 69.
  • 70.
  • 71. DoS Protection: Prevent high volume and high PPS flood attacks
  • 72.
  • 73. Return on investment within 6 months
  • 74.
  • 75. What drives the MSSP success? (1 of 2) Business: best DDoS attacks coverage Packet and bandwidth flood attacks protection Application DDoS flood attacks protection Directed (low & slow, SSL) attacks protection Short time to protect – in seconds! Financial Solution scalability: OnDemand platform Unique pay as you grow approach No forklift upgrades Best performing 10G attack mitigation platforms Lowest CapEx & OpEx Multitude of security tools and SEM in a single solution Out-of-the-box protections Slide 28
  • 76. What drives the MSSP success? (1 of 2) Technical Flexible deployment of attack mitigation devices in any environment Symmetric, Asymmetric, no learning. Operational Emergency Response Team (ERT) to support your SOC Our commitment to your success Customer centric reporting Integrated SEM with per-customer reports and dashboards Marketing The only NSS Recommended Attack Mitigation solution SLA: Short time to protect! SLA: Coverage: protect against emerging DDoS attacks Slide 29