SlideShare a Scribd company logo
1 of 30
Download to read offline
SECURITY MADE
SMART AND SIMPLE
April, 2020
Santiago Chile
Renato Soares
Principal SE LATAM
Patricio Campos
TAM SOLA
Sao Paulo
Santa Clara, CA
London
TokyoBeijing
Singapore
ABOUT NSFOCUS
7 years
Offices worldwide
Protects over 20% of
Fortune Global 500
Protects 4 of the 5
largest banks
Protects 5 out of 10
largest telcos
Named ‘Challenger’ in
Gartner MQ
Active member of
global security
community
IN THE NEWS
3
DDOS LANDSCAPE
4
• The total attack count increased 30.2%.
• The average attack peak size rose a little to 42.9 Gbps and the technical
maturity of large- and medium-scale attacks has grown year by year.
• UDP floods, SYN floods, and ACK floods still dominated DDoS attacks, and,
in super-sized attacks, those combining multiple vectors stole the limelight.
• IoT devices were more frequently seen in DDoS attacks.
DDOS Key Findings
5
• Maturity
• Combination
• Recidivists
• Gangs
• IoT
• Malware families
WAF Web Vuln. Scanning
System
DDoS
ON PREMISE
HOLISTIC HYBRID SECURITY
Threat
Intelligence
WAF
SaaS/IaaS
Web Vuln. Scanning System
SaaS/IaaS
Cloud DPS
Smart Patch (IaaS)
Smart Patch
Smart
Patch
TASNGIPS
30 Second Diversion
30 Second
Diversion
30 Second
Diversion
30 Second
Diversion
(IaaS)
Smart
Patch
CLOUD IN A BOX
Intelligent Detection
File
IOCs
SaaS
Anti-DDoS Business
Operation System
(ADBOS)
NSFOCUS Hybrid Anti-DDoS
Solution
W W W. N S F O C U S . C O M
Protects
Customers
Generates
Revenue
On-Premises Defenses
• 5 T mitigation capacity deployed in 2019
• Available in hardware and
virtualized platforms
• Widely used in ISP, BFSI, media,
government and gaming industry
• 24x7 MSS with experienced
security experts
Hybrid Defenses
• Integrated Solution
• Protects Customer Traffic & Infrastructure
• Fastest Time To Mitigation
Cloud Defenses
• Service Provider Ready
• Global Cloud Centers
• Experienced in handling large attacks – 430G in 2019
• Fully automatic diversion
• Low network latency
Protects
Infrastructure
COMPLETE DDOS DEFENSE
NSFOCUS CLOUD DATACENTERS
• 7Tbps of scrubbing capacity with 8+ POPs
• Flexible return traffic location choices
• Minimum latency with scrubbing centers worldwide
• ISO/IEC 27001:2013 compliance
Singapore
Frankfurt
Ashburn
London
Silicon Valley
8+
geographically
distributed cloud
centers hosted by
Tier1 Level data
centers
Coresite/LA
Hong Kong
Sao Paulo
DamDDoS
W W W. N S F O C U S . C O M
CLOUD DPS MIGRATION SOLUTION
1. NTA sends DDoS alert to
NSFOCUS Cloud DPS
2. Cloud will divert customer
traffic from Internet via pre-
defined BGP session
3. NSFOCUS Global Network
redirects traffic to the closest
Cloud Center
4. Malicious traffic will be
discarded
5. Legitimate traffic will be
returned to customer
Internet
BGP Diversion
GRE Tunnel /
Direct Connection /
Partner Connection
NTA
Signaling
Reliable & Accurate
Powered by NSFOCUS flagship
Anti-DDoS products, provide
responsive and reliable DDoS
mitigation against L3 to L7
attacks
24 x 7
Mitigation of DDoS attacks
through always-on or on-
demand cloud connectivity
options
Easy to Use
The NSFOCUS Cloud Portal
provides visibility, reporting,
and analytics to manage and
contain DDoS risks
Basic, Standard or Advanced package for
different levels of mitigation requirement
Smart Hybrid Architecture
Seamlessly integration of on-premises
ADS with Cloud DPS provides low
latency automatic mitigation and
protection against volumetric attacks
CLOUD DPS KEY BENEFITS
Rich & Flexible Service Package
ON-PREMISES DDOS PROTECTION SOLUTION
ADS, NTA, ADS-M
• Algorithmic, multi-filter, rule-based approach
• Highly accurate and surgical mitigation
• Integrated with built in threat intel module (NTI)
• Low false-positive rates
• Specific algorithm for APP traffic
• Full visibility during mitigation process
• Low latency with minimal packet loss
• Flexible Deployment Options
• Inline, out-of-path, cluster
• Automated or manual mitigation options
MSS For ADS Service
• 24x7 monitoring & response
Management
& Reporting
DDoS Protection
Solution
ADS-M
Traffic Flow
Monitoring &
Alert
NTA
Attack
Mitigation
ADS
NTI
W W W. N S F O C U S . C O M
W W W. N S F O C U S . C O M
ON-PREMISES INLINE DEPLOYMENT
• Quick and easy to install
• Up to 40 Gbps @ 30M pps
• Inspects all traffic
• Immediate, always on defenses
Attack Traffic
Good Traffic
Protected
Network
Border Router
Anti-DDoS System (ADS)
Firewalls
ADS can be
deployed on
either side of
Border Router
Internet
Legend
W W W. N S F O C U S . C O M
ON-PREMISES OUT-OF-PATH DEPLOYMENT
• Quick and easy to install
• Preferred method for larger customers
• Unlimited scalability via clustering
• Manual or automated BGP redirection
• GRE, VLAN, MPLS, PBR reinjection
Attack Traffic
Good Traffic
Legend
Control Traffic
ADS
Notification to ADS
Protected
Network
Internet
NTA
ADS-M
BGP Advertisement
FlowData
Attack Detection
Attack Filtering Logs
AttackLogs
W W W. N S F O C U S . C O M
NTI-EMPOWERED DDOS PROTECTION
Download Bad IP Feeds
Threat Intel Query on Attackers
Botnets &
Known Attackers
Legitimate Traffic
• Up to 20% scrubbed via NTI
• Auto filtering with high accuracy
• Daily update
• Threat intel traceback
o IP reputation
o ASN & geographic location
o Open ports
o Associated domains
ADS
NTA
Internet
Protected
Network
Flow Data
Attack Detection
NTI
(ANALYSIS, FORENSICS, SHARING)
NSFOCUS HYBRID DDOS PROTECTION
Cloud
Defenses
Engage
Cloud
Defenses
Attacks
Defeated
On Premise
0
Gbps
3
Gbps
6
Gbps
9
Gbps
Time to Reroute
Approaching
Pipe Saturation
On-Premise
Defenses
Automated
Cloud Defense
Signaling
Malicious
Traffic
Legitimate
Traffic
Legitimate
Traffic
Protected
Infrastructure
Legitimate Traffic
Malicious Traffic
Legitimate
Traffic
ADS
Attack
Mitigation
ADS-M
Management &
Reporting
NTA
Traffic Flow &
Monitoring
On-Premises
DDoS
Defenses
ADS – Inline
Cloud DPS
Volumetric Attack Mitigation
• Multi-Vector DDoS • Volumetric Attack
Defense
• Local Scrubbing • Business-Centric Protection
NSFOCUS IDC/ISP END USERINTERNET
INTERNET
Customers - Telecom Carriers & Data Center
NSFOCUS Anti-DDoS
Business Operation
System (ADBOS)
WHO MAY NEED ADBOS?
— ADBOS is tailored to:
• ISP, IDC, MSSP and other service providers who are operating or plan to operate Anti-DDOS
services and generate revenue from reselling/upselling the Anti-DDoS services
• Mixed vendor scrubbing centers
• Local and cloud scrubbing owners who need collaborative SOC platform
— ADBOS has been deployed by
• Top 10 Telcos in the world
• Top 3 online gaming in the world
ADBOS: BRAIN OF THE ANTI-DDOS SERVICES
LEGITIMATE TRAFFIC
MALICIOUS TRAFFIC
NSFOCUS
CLOUD DPS
VOLUMETRIC ATTACK
MITIGATION
END USERINTERNET
SECURITY
BORDER
MANAGEMENT & REPORTING
ADS
ATTACK
MITIGATION
NTA
TRAFFIC FLOW &
MONITORING
IDC / ISP
BUSINESS AVAILABILITY
DIAL-UP
MOBILE APP WEB
CUSTOMER
OPERATION & UNIFIED
MANAGEMENT
CLEAN
TRAFFIC
ADBOS
PROTECTED
INFRASTRUCTURE
INTERNET
MANAGEMENT & REPORTING
AUTOMATED
CLOUD DEFENSE
SIGNALING
VALUE ADDED SERVICE SOLUTION WITH ADBOS
Cost Saving
• Scalable, flexible, cost effective
• Smart orchestration of scrubbing resources
• Virtualized products requiring thin
provisioning
• Optimized operational procedures with less
domain knowledge requirements
Mitigation Resource Integration
• Automated scheduling and provisioning of
protection nodes
• Collaboration with 3rd party mitigation
service (Upstream ISP)
• Supports Mixed Vendor scrubbing
deployment
Easy O&M
• Agile response to attacks through mobile app
• Intuitive centralized device management
• Closed-loop Anti-DDoS operation
• Visualized mitigation
Value Added Service Enablement
• Enhanced portal & mobile app
• Report customization & branding
• Mass device, customer, order management
• Differentiated service offering (Detection,
Protection, Customer Self-Service, Threat Intel)
• Cloud based security service ready
W W W. N S F O C U S . C O M
NSFOCUS MANAGED SECURITY SERVICES (MSS)
Before Attack During Attack After Attack
Configuration
Apply Security Best Practice
Constantly Monitoring
Customized Countermeasures
Customized Report
With Rich Insight
NSFOCUS MSS
experts
CUSTOMER
PARTNER
Real Time Response TAM
Governance
MeetingTimely Attack
Mitigation
Smooth business operations with minimum impact from
DDOS attacks. Obtain professional security insight of
your network. Maximize your security investment returns.
Rich Insights
NSFOCUS
Threat Intelligence (NTI)
W W W. N S F O C U S . C O M
GLOBAL THREAT INTELLIGENCE
• Actionable Threat Intelligence
• Real-Time Information Sharing
• Custom Threat Information
90+threat researchers, malware
experts
• Unique Intel
from China
• Intel from
Rest of World
8143Active Customers
12,000 Network Sensors
400 Million Endpoints
GLOBAL THREAT INTELLIGENCE
STRATEGIC AND TACTICAL TI DELIVERABLES
+
NSFOCUS THREAT
INTELLIGENCE
(NTI) PORTAL
— Threat Information
& Knowledge
— Drill Down to Details on
Threats
— Incident Response
THREAT ANALYSIS
REPORTS
— Threat Trends,
Campaigns, Actors
— Critical Vulnerabilities
— Weekly, Monthly
Quarterly Reports
S T R AT E G I C
+
ACTIONABLE
DATA FEEDS
— IP Reputation
— Malicious Web/URL
— Malware Hashes
— Command & Control
TA C T I C A L
NTI DATA –UNIQUE, ACCURATE, FRESH
• 4.2 billion global IP addresses
(port/application/banner)
• 50 billion passive DNS records crossing 8
years
• IoT intelligence
• Geographic location /Whois /ASN info
• IP tagging with industry and network info
Basic Intelligence
• 300,000+ high-quality vulnerabilities
• Vulnerability description, ID, risk level,
topicality, solution, and whether PoC is
available
Vulnerability
• 50,000,000+ malicious IPs (DDoS, intrusion,
scanning, spam, etc.)
• 30,000,000+ botnets (main control servers and
controlled endpoints)
• Hundreds of millions of malicious domain
names/URLs
• Tens of millions of malicious files
• 50,000+ mining pools and miners
Indicators of Compromise
• Weekly/Monthly/Annual threat trend report
• Threat alert and containing report
• Topical threat campaigns and IOCs
• Attack group and attack tool intelligence
• DDoS/botnet research report
Security Campaigns
Used for Internet exposure audit
and attacker profiling
Used for detection of compromised hosts
Used for vulnerability alerting
and vulnerability lifecycle management
Used for campaign alerting and security
trend analysis
IOC (Threat
Indicators)
Basic Intelligence
Advanced
Intelligence
Vulnerability
NTI supports STIX/TAXII V2.0
3RD PARTY INTEGRATION
No se puede mostrar la imagen.
FIREWALLS, IDPS, TIPS, SIEM/SOC SYSTEMS
No se puede mostrar la imagen.
NSFOCUS REPORTS
For more NSFOCUS reports, visit:
https://nsfocusglobal.com/company-overview/resources#reports
MORE INFORMATION
30
www.nsfocus.com
Info@nsfocusglobal.com
https://www.linkedin.com/company/nsfocus
https://www.facebook.com/nsfocus/
https://twitter.com/NSFOCUS_Intl

More Related Content

What's hot

What's hot (20)

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 

Similar to DETENIENDO LOS ATAQUES DDOS CON NSFOCUS

Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
Alan Rudd
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
Sergiy Pitel
 

Similar to DETENIENDO LOS ATAQUES DDOS CON NSFOCUS (20)

PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr WojciechowskiPLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Rethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security EnforcementRethinking Security: Corsa Red Armor Network Security Enforcement
Rethinking Security: Corsa Red Armor Network Security Enforcement
 
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
bestpracticesforusingyournetworkandtheciscoasr9kforddos-150603185523-lva1-app...
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
Corsa Giga Filter
Corsa Giga FilterCorsa Giga Filter
Corsa Giga Filter
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 

More from Cristian Garcia G.

More from Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

DETENIENDO LOS ATAQUES DDOS CON NSFOCUS

  • 1. SECURITY MADE SMART AND SIMPLE April, 2020 Santiago Chile Renato Soares Principal SE LATAM Patricio Campos TAM SOLA
  • 2. Sao Paulo Santa Clara, CA London TokyoBeijing Singapore ABOUT NSFOCUS 7 years Offices worldwide Protects over 20% of Fortune Global 500 Protects 4 of the 5 largest banks Protects 5 out of 10 largest telcos Named ‘Challenger’ in Gartner MQ Active member of global security community
  • 4. DDOS LANDSCAPE 4 • The total attack count increased 30.2%. • The average attack peak size rose a little to 42.9 Gbps and the technical maturity of large- and medium-scale attacks has grown year by year. • UDP floods, SYN floods, and ACK floods still dominated DDoS attacks, and, in super-sized attacks, those combining multiple vectors stole the limelight. • IoT devices were more frequently seen in DDoS attacks.
  • 5. DDOS Key Findings 5 • Maturity • Combination • Recidivists • Gangs • IoT • Malware families
  • 6. WAF Web Vuln. Scanning System DDoS ON PREMISE HOLISTIC HYBRID SECURITY Threat Intelligence WAF SaaS/IaaS Web Vuln. Scanning System SaaS/IaaS Cloud DPS Smart Patch (IaaS) Smart Patch Smart Patch TASNGIPS 30 Second Diversion 30 Second Diversion 30 Second Diversion 30 Second Diversion (IaaS) Smart Patch CLOUD IN A BOX Intelligent Detection File IOCs SaaS Anti-DDoS Business Operation System (ADBOS)
  • 8. W W W. N S F O C U S . C O M Protects Customers Generates Revenue On-Premises Defenses • 5 T mitigation capacity deployed in 2019 • Available in hardware and virtualized platforms • Widely used in ISP, BFSI, media, government and gaming industry • 24x7 MSS with experienced security experts Hybrid Defenses • Integrated Solution • Protects Customer Traffic & Infrastructure • Fastest Time To Mitigation Cloud Defenses • Service Provider Ready • Global Cloud Centers • Experienced in handling large attacks – 430G in 2019 • Fully automatic diversion • Low network latency Protects Infrastructure COMPLETE DDOS DEFENSE
  • 9. NSFOCUS CLOUD DATACENTERS • 7Tbps of scrubbing capacity with 8+ POPs • Flexible return traffic location choices • Minimum latency with scrubbing centers worldwide • ISO/IEC 27001:2013 compliance Singapore Frankfurt Ashburn London Silicon Valley 8+ geographically distributed cloud centers hosted by Tier1 Level data centers Coresite/LA Hong Kong Sao Paulo DamDDoS
  • 10. W W W. N S F O C U S . C O M CLOUD DPS MIGRATION SOLUTION 1. NTA sends DDoS alert to NSFOCUS Cloud DPS 2. Cloud will divert customer traffic from Internet via pre- defined BGP session 3. NSFOCUS Global Network redirects traffic to the closest Cloud Center 4. Malicious traffic will be discarded 5. Legitimate traffic will be returned to customer Internet BGP Diversion GRE Tunnel / Direct Connection / Partner Connection NTA Signaling
  • 11. Reliable & Accurate Powered by NSFOCUS flagship Anti-DDoS products, provide responsive and reliable DDoS mitigation against L3 to L7 attacks 24 x 7 Mitigation of DDoS attacks through always-on or on- demand cloud connectivity options Easy to Use The NSFOCUS Cloud Portal provides visibility, reporting, and analytics to manage and contain DDoS risks Basic, Standard or Advanced package for different levels of mitigation requirement Smart Hybrid Architecture Seamlessly integration of on-premises ADS with Cloud DPS provides low latency automatic mitigation and protection against volumetric attacks CLOUD DPS KEY BENEFITS Rich & Flexible Service Package
  • 12. ON-PREMISES DDOS PROTECTION SOLUTION ADS, NTA, ADS-M • Algorithmic, multi-filter, rule-based approach • Highly accurate and surgical mitigation • Integrated with built in threat intel module (NTI) • Low false-positive rates • Specific algorithm for APP traffic • Full visibility during mitigation process • Low latency with minimal packet loss • Flexible Deployment Options • Inline, out-of-path, cluster • Automated or manual mitigation options MSS For ADS Service • 24x7 monitoring & response Management & Reporting DDoS Protection Solution ADS-M Traffic Flow Monitoring & Alert NTA Attack Mitigation ADS NTI
  • 13. W W W. N S F O C U S . C O M
  • 14. W W W. N S F O C U S . C O M ON-PREMISES INLINE DEPLOYMENT • Quick and easy to install • Up to 40 Gbps @ 30M pps • Inspects all traffic • Immediate, always on defenses Attack Traffic Good Traffic Protected Network Border Router Anti-DDoS System (ADS) Firewalls ADS can be deployed on either side of Border Router Internet Legend
  • 15. W W W. N S F O C U S . C O M ON-PREMISES OUT-OF-PATH DEPLOYMENT • Quick and easy to install • Preferred method for larger customers • Unlimited scalability via clustering • Manual or automated BGP redirection • GRE, VLAN, MPLS, PBR reinjection Attack Traffic Good Traffic Legend Control Traffic ADS Notification to ADS Protected Network Internet NTA ADS-M BGP Advertisement FlowData Attack Detection Attack Filtering Logs AttackLogs
  • 16. W W W. N S F O C U S . C O M NTI-EMPOWERED DDOS PROTECTION Download Bad IP Feeds Threat Intel Query on Attackers Botnets & Known Attackers Legitimate Traffic • Up to 20% scrubbed via NTI • Auto filtering with high accuracy • Daily update • Threat intel traceback o IP reputation o ASN & geographic location o Open ports o Associated domains ADS NTA Internet Protected Network Flow Data Attack Detection NTI (ANALYSIS, FORENSICS, SHARING)
  • 17. NSFOCUS HYBRID DDOS PROTECTION Cloud Defenses Engage Cloud Defenses Attacks Defeated On Premise 0 Gbps 3 Gbps 6 Gbps 9 Gbps Time to Reroute Approaching Pipe Saturation On-Premise Defenses Automated Cloud Defense Signaling Malicious Traffic Legitimate Traffic Legitimate Traffic Protected Infrastructure Legitimate Traffic Malicious Traffic Legitimate Traffic ADS Attack Mitigation ADS-M Management & Reporting NTA Traffic Flow & Monitoring On-Premises DDoS Defenses ADS – Inline Cloud DPS Volumetric Attack Mitigation • Multi-Vector DDoS • Volumetric Attack Defense • Local Scrubbing • Business-Centric Protection NSFOCUS IDC/ISP END USERINTERNET INTERNET
  • 18. Customers - Telecom Carriers & Data Center
  • 20. WHO MAY NEED ADBOS? — ADBOS is tailored to: • ISP, IDC, MSSP and other service providers who are operating or plan to operate Anti-DDOS services and generate revenue from reselling/upselling the Anti-DDoS services • Mixed vendor scrubbing centers • Local and cloud scrubbing owners who need collaborative SOC platform — ADBOS has been deployed by • Top 10 Telcos in the world • Top 3 online gaming in the world
  • 21. ADBOS: BRAIN OF THE ANTI-DDOS SERVICES LEGITIMATE TRAFFIC MALICIOUS TRAFFIC NSFOCUS CLOUD DPS VOLUMETRIC ATTACK MITIGATION END USERINTERNET SECURITY BORDER MANAGEMENT & REPORTING ADS ATTACK MITIGATION NTA TRAFFIC FLOW & MONITORING IDC / ISP BUSINESS AVAILABILITY DIAL-UP MOBILE APP WEB CUSTOMER OPERATION & UNIFIED MANAGEMENT CLEAN TRAFFIC ADBOS PROTECTED INFRASTRUCTURE INTERNET MANAGEMENT & REPORTING AUTOMATED CLOUD DEFENSE SIGNALING
  • 22. VALUE ADDED SERVICE SOLUTION WITH ADBOS Cost Saving • Scalable, flexible, cost effective • Smart orchestration of scrubbing resources • Virtualized products requiring thin provisioning • Optimized operational procedures with less domain knowledge requirements Mitigation Resource Integration • Automated scheduling and provisioning of protection nodes • Collaboration with 3rd party mitigation service (Upstream ISP) • Supports Mixed Vendor scrubbing deployment Easy O&M • Agile response to attacks through mobile app • Intuitive centralized device management • Closed-loop Anti-DDoS operation • Visualized mitigation Value Added Service Enablement • Enhanced portal & mobile app • Report customization & branding • Mass device, customer, order management • Differentiated service offering (Detection, Protection, Customer Self-Service, Threat Intel) • Cloud based security service ready
  • 23. W W W. N S F O C U S . C O M NSFOCUS MANAGED SECURITY SERVICES (MSS) Before Attack During Attack After Attack Configuration Apply Security Best Practice Constantly Monitoring Customized Countermeasures Customized Report With Rich Insight NSFOCUS MSS experts CUSTOMER PARTNER Real Time Response TAM Governance MeetingTimely Attack Mitigation Smooth business operations with minimum impact from DDOS attacks. Obtain professional security insight of your network. Maximize your security investment returns. Rich Insights
  • 25. W W W. N S F O C U S . C O M GLOBAL THREAT INTELLIGENCE • Actionable Threat Intelligence • Real-Time Information Sharing • Custom Threat Information 90+threat researchers, malware experts • Unique Intel from China • Intel from Rest of World 8143Active Customers 12,000 Network Sensors 400 Million Endpoints
  • 26. GLOBAL THREAT INTELLIGENCE STRATEGIC AND TACTICAL TI DELIVERABLES + NSFOCUS THREAT INTELLIGENCE (NTI) PORTAL — Threat Information & Knowledge — Drill Down to Details on Threats — Incident Response THREAT ANALYSIS REPORTS — Threat Trends, Campaigns, Actors — Critical Vulnerabilities — Weekly, Monthly Quarterly Reports S T R AT E G I C + ACTIONABLE DATA FEEDS — IP Reputation — Malicious Web/URL — Malware Hashes — Command & Control TA C T I C A L
  • 27. NTI DATA –UNIQUE, ACCURATE, FRESH • 4.2 billion global IP addresses (port/application/banner) • 50 billion passive DNS records crossing 8 years • IoT intelligence • Geographic location /Whois /ASN info • IP tagging with industry and network info Basic Intelligence • 300,000+ high-quality vulnerabilities • Vulnerability description, ID, risk level, topicality, solution, and whether PoC is available Vulnerability • 50,000,000+ malicious IPs (DDoS, intrusion, scanning, spam, etc.) • 30,000,000+ botnets (main control servers and controlled endpoints) • Hundreds of millions of malicious domain names/URLs • Tens of millions of malicious files • 50,000+ mining pools and miners Indicators of Compromise • Weekly/Monthly/Annual threat trend report • Threat alert and containing report • Topical threat campaigns and IOCs • Attack group and attack tool intelligence • DDoS/botnet research report Security Campaigns Used for Internet exposure audit and attacker profiling Used for detection of compromised hosts Used for vulnerability alerting and vulnerability lifecycle management Used for campaign alerting and security trend analysis IOC (Threat Indicators) Basic Intelligence Advanced Intelligence Vulnerability NTI supports STIX/TAXII V2.0
  • 28. 3RD PARTY INTEGRATION No se puede mostrar la imagen. FIREWALLS, IDPS, TIPS, SIEM/SOC SYSTEMS No se puede mostrar la imagen.
  • 29. NSFOCUS REPORTS For more NSFOCUS reports, visit: https://nsfocusglobal.com/company-overview/resources#reports