SlideShare une entreprise Scribd logo
1  sur  30
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
SWITCHPOINT NV/SA Quarterly Experience Day 2016
Fabien Renaud : Presales Expert
Régis Penin : Sales Engineer
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Company Overview
Strong
Partnerships
Technology
Integration
USA-Westchester, PA
Innovative DDI Software Company
Simplicity - Security - Availability
100+
Employees
IDC
Fastest Growing
DDI Company*
*IDC DDI REPORT 2014
HQ - R&D
USA - Westchester, PA
EMEA - France, Paris
24x7
Follow-The-Sun
Support ServicesAwarded
Technologies
600+ Customers
110+ Countries
5 Continents
DDI (DNS-DHCP-IPAM)
A foundation for reliable, secure and agile Network Infrastructure
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
EfficientIP: Sample of Our Customers
Page 3
Telecommunication
Vodafone
Colt
T Mobile
SFR
Easynet
KPN
Telecom of Thailand
Qatar Telecom
Maskatel
Virgin Mobile
ONO
Energy
Repsol
EDF
GDF
Suez
Air Liquide
Education
Leeds University
Hamburg University
Paris University
Utrecht University
Pais Vasco University
Financial
Allianz
Zurich Financial Services
Swiss Re
Axa Wealth
Standard Life
Bank of France
BRED
Electronics-Defense
Philips
NXP
Nokia Siemens Network
Cassidian
EADS Astrium
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
DNS-DHCP-IPAM
Applications & Services
Network
Page 4
Why are Network Services so Critical?
The bridge between users and their applications
Customers Citizens StudentsEmployees
Web Apps.Internet emailVideo
IPV
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
NO DNS = NO BUSINESS
Applications & Services
Web Apps.Internet emailVideo
IPV
Page 5
Why are Network Services so Critical?
If the bridge is down…
Customers Citizens StudentsEmployees
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Solution Portfolio
Page 6
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Global visibility
End-to-end consistency
Management automation
Role-based delegation
Unified Management Framework “SMART DDI”
Reconcile
Manage
Deploy
Design
Device
Management
DDI & VLAN
Management
Network
Discovery
Network
Configuration
Solution Portfolio ‘SOLIDserver’ (1)
Page 7
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
IP addressing & VLAN Plan Management
Network Services Engines : DNS-DHCP-NTP-TFTP
DNS Guardian: 100% DNS cache availability under attack *
DNS Hybrid Technology: 3 differents DNS Engines on one Appliance
DNS Blast: Absorb up to 17 Million queries per second *
Multi-Vendor DNS&DHCP Services Management *
Microsoft – ISC – SOLIDServer™
Device Deployment Management: Device Manager *
Network Discovery & Configuration Management: NetChange*
Page 8
Solution Portfolio ‘SOLIDserver’ (2)
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Automate Deployment and Management
Multi-vendor DNS-DHCP: Microsoft, ISC, SOLIDserver
Enforce Best Practices
Reduce Complexity & TCO
Page 9
A centralized IPAM to manage SmartArchitecture™
(Secured, Reliable, Automated)
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016Page 10
Printer
Belgium
10.1.0.0 /16
Gand
10.1.0.0 /24
de
10.2.0.0 /16
fr
10.3.0.0 /16
uk
10.4.0.0 /16
Bruxelles
10.1.1.0 /24
Charleroi
10.1.2.0 /23
10.1.4.1
10.1.4.25
Block
Subnet
Pool
IP address
IP Space: Your Company
Liege
10.1.4.0 /24
ToIP
10.1.4.26
10.1.4.100
10.1.4.101
10.1.4.150
10.1.4.200
(server200)
10.1.4.151
10.1.4.253
10.1.4.254
(Gateway)
Global Consistency and Uniqueness Control within an IP Space
No duplicate IP address or subnet overlap
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
IPAM Corner stone of the Global DDI Solution
Page 11
Server
View
Zone
RR
IPAMDNS DHCP
Space
Block
Subnet
Pool
IP address
Server
Group
Static
with IP
Range
Scope
Lease
Lease
granted
Add subnet
Add IP
address
Add CNAME,
A,… records
Add subnet
Add pool
Add IP address
(with MAC)
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016Page 12
Enforcement of Company defined best practices &
Conformity Management
Templates of objects: Dedicated forms with specific list
of fields (i.e. for printer, server, router)
How to make sure naming convention is respected ?
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Much more than DDI
360°DNS Security
Solution To Protect Your
Business
Confidential-Property of EfficientIP - All rights reserved-Copyright © 201614Page 14
DNS Attacks Classification
Direct DoS, Amplification, Reflection
attacks
3 Main Types of DNS Attacks
EXPLOITS
VOLUMETRIC
Random QName, Phantom and Sloth
attacks...
DNS Tunnelling, poisoning, 0-day
!!
STEALTH
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Attack Objectives
Page 15
Multiple DNS Targets
For Many Objectives
PUBLIC
PRIVATE
Business Downtime
Embezzlement of Money
Intellectual Property Theft
Customer Data Theft
Damaged Reputation
Password Stealing
Volumetric
Stealth
Exploits
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Why Are DNS Attacks So Impacting?
Page 16
Traditional Security Solutions Are Not
Adapted to Mitigating DNS Attacks
Firewall & Next Generation Firewall
Anti-DDoS Appliances
IPS
Secure Web Gateway
...
A Specialized Layer of Defense Is Required To
Protect Users & DNS Services From Hidden Threats
in DNS Traffic
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
EfficientIP DNS Security Vision
Page 17
Protect All DNS Services
From All Attack Types
EXPLOITS
PRIVATE PUBLIC
VOLUMETRIC
!!
STEALTH
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016Page 18
EfficientIP Security Solution
Strengthen Security
Foundation
Block 0-Day Vulnerabilities
Enforce Best Practices
Ensure DNS Continuity
with Adaptive Security
Advanced Attack Detection
Graduated Countermeasures
Secure Public DNS
Availability
Resiliency & Robustness
Absorb Extreme DoS
Attacks on Cache Servers
Cache Security & Performance
Protect Users & Block DNS-
Based Malware Activity
Prevent, Detect & Mitigate
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
SOLIDserver DNS
Page 19
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Hardened Appliance
Enforce DNS Security Best Practices
SmartArchitecture Templates: Stealth DNS, Master-Slave, Multi-master
Block Zero-Day Vulnerabilities: Hybrid DNS Engines
Three DNS Engines transparently Managed as a single entity
Mitigate Amplification & Reflection Threat
Response Rate Limiting (RRL)
Ensure Data Integrity & Authenticity
DNSSEC Automation: “One Click” Deployment
Page 20
SOLIDserver DNS
IT Night WINNER
Best Security Product 2014
Most Innovative Security Solution
SOLIDserver Security Foundation
PUBLIC & PRIVATE
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
DNS Cloud
Page 21
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Amazon Route53 Integration
Advanced Protection For DDoS & 0-Day
52 DNS Spots – Hybrid DNS engine
High-Availability & Performance
Anycast resiliency – Ultra Low Latency
Simple & Flexible
Deployment –Management – Reversibility
Cost-Effective
Page 22
DNS Services In the Cloud
PUBLIC
UNIFIED MANAGEMENT OF
IN-HOUSE & AMAZON CLOUD DNS
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
DNS Firewall
Page 23
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
DNS Firewall
Page 24
PROTECT AGAINST MALWARE AND
PHISHING WITH RESPONSE POLICY ZONE
PRIVATE DNS SERVICES
Prevent Initial Infection
Block malicious sites
Detect and Block Malware Activity
Users & Applications, CnC Communications
Mitigate Data Exfiltration
Locate Infected Devices to Remediate
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
DNS Guardian
Page 25
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
DNS Guardian
Page 26
Inside DNS Transaction Analysis For Accurate Attack
Detection
Global & Per IP Statistics (cache & recursive)
Volumetric, Stealth & Exploit Attacks Detection
Tunnelling, RQName attacks, phantom attacks, anomalies
Graduated Protection With Smart Countermeasures
Block source IPs of the attacks
Quarantine suspected source IPs of attacks
Patented Rescue Mode: Ensure service continuity even if the attack
source is unidentifiable.
ADAPTIVE DNS SECURITY
PRIVATE DNS SERVICES
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
Comprehensive DNS Security Solution
Page 27
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
DNS Blast: Cache Security & Performance
Page 28
Absorbs DoS Attacks on DNS Cache & Eliminates Risks of Blocking
Legitimate Clients
World’s Fastest DNS Caching Server with 17 million qps
High Performance of ACL, RPZ & DNSSEC
Ensures Unparalleled High-Availability with Anycast Resilience
Decreases Costs & Network Complexity
No need to pile up DNS servers and expensive load-balancers
Improved User Experience with Ultra Low Latency
Unequalled Cache Hit Rate (CHR) with Multicast Cache Sharing
Persistent Cache (Restart & Restore)
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015
DNS Security Performance & Intelligence
Page 29
Complete Coverage of DNS Services
Public & Private
Comprehensive Attack Type Detection
Volumetric, Stealth & Exploit Attacks
Smart & Adaptive Threat Protection
Block, Quarantine & Rescue Modes
Simple to Deploy & Maintain
Cost Effective
Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016
Thank you for your attention!
Page 30

Contenu connexe

Tendances

Tendances (20)

Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
TAC Vision & Strategy
TAC Vision & StrategyTAC Vision & Strategy
TAC Vision & Strategy
 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Unravelling Managed SD-WAN Services
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
 
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN StrategyFlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
FlexiWAN Webinar - The Role of Open Source in Your SD-WAN Strategy
 
A10 slide deck: A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruptio...
A10 slide deck: A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruptio...A10 slide deck: A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruptio...
A10 slide deck: A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruptio...
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with Cisco
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
 
NetScaler ADC - Customer Overview
NetScaler ADC - Customer OverviewNetScaler ADC - Customer Overview
NetScaler ADC - Customer Overview
 
Presentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David GalloPresentation NetScaler SD-WAN - David Gallo
Presentation NetScaler SD-WAN - David Gallo
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 

Similaire à EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day on 7th June 2016.

PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PROIDEA
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
Belsoft
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 

Similaire à EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day on 7th June 2016. (20)

Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
 
Checkpoint Portfolio.pptx
Checkpoint Portfolio.pptxCheckpoint Portfolio.pptx
Checkpoint Portfolio.pptx
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Ciena - the journey to the adaptive network
Ciena - the journey to the adaptive networkCiena - the journey to the adaptive network
Ciena - the journey to the adaptive network
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
NeuStar's UltraDNS & Webmetrics Presentation_July2009sv
NeuStar's UltraDNS & Webmetrics Presentation_July2009svNeuStar's UltraDNS & Webmetrics Presentation_July2009sv
NeuStar's UltraDNS & Webmetrics Presentation_July2009sv
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
DNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS ProtectionDNS and Infrastracture DDoS Protection
DNS and Infrastracture DDoS Protection
 
G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solution
 
Information Security
Information SecurityInformation Security
Information Security
 

Plus de SWITCHPOINT NV/SA

Plus de SWITCHPOINT NV/SA (7)

PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
 
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
 
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
 
Aankondiging nieuw product bij SWITCHPOINT NV/SA.
Aankondiging nieuw product bij SWITCHPOINT NV/SA.Aankondiging nieuw product bij SWITCHPOINT NV/SA.
Aankondiging nieuw product bij SWITCHPOINT NV/SA.
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day on 7th June 2016.

  • 1. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 SWITCHPOINT NV/SA Quarterly Experience Day 2016 Fabien Renaud : Presales Expert Régis Penin : Sales Engineer
  • 2. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Company Overview Strong Partnerships Technology Integration USA-Westchester, PA Innovative DDI Software Company Simplicity - Security - Availability 100+ Employees IDC Fastest Growing DDI Company* *IDC DDI REPORT 2014 HQ - R&D USA - Westchester, PA EMEA - France, Paris 24x7 Follow-The-Sun Support ServicesAwarded Technologies 600+ Customers 110+ Countries 5 Continents DDI (DNS-DHCP-IPAM) A foundation for reliable, secure and agile Network Infrastructure
  • 3. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 EfficientIP: Sample of Our Customers Page 3 Telecommunication Vodafone Colt T Mobile SFR Easynet KPN Telecom of Thailand Qatar Telecom Maskatel Virgin Mobile ONO Energy Repsol EDF GDF Suez Air Liquide Education Leeds University Hamburg University Paris University Utrecht University Pais Vasco University Financial Allianz Zurich Financial Services Swiss Re Axa Wealth Standard Life Bank of France BRED Electronics-Defense Philips NXP Nokia Siemens Network Cassidian EADS Astrium
  • 4. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 DNS-DHCP-IPAM Applications & Services Network Page 4 Why are Network Services so Critical? The bridge between users and their applications Customers Citizens StudentsEmployees Web Apps.Internet emailVideo IPV
  • 5. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 NO DNS = NO BUSINESS Applications & Services Web Apps.Internet emailVideo IPV Page 5 Why are Network Services so Critical? If the bridge is down… Customers Citizens StudentsEmployees
  • 6. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Solution Portfolio Page 6
  • 7. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Global visibility End-to-end consistency Management automation Role-based delegation Unified Management Framework “SMART DDI” Reconcile Manage Deploy Design Device Management DDI & VLAN Management Network Discovery Network Configuration Solution Portfolio ‘SOLIDserver’ (1) Page 7
  • 8. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 IP addressing & VLAN Plan Management Network Services Engines : DNS-DHCP-NTP-TFTP DNS Guardian: 100% DNS cache availability under attack * DNS Hybrid Technology: 3 differents DNS Engines on one Appliance DNS Blast: Absorb up to 17 Million queries per second * Multi-Vendor DNS&DHCP Services Management * Microsoft – ISC – SOLIDServer™ Device Deployment Management: Device Manager * Network Discovery & Configuration Management: NetChange* Page 8 Solution Portfolio ‘SOLIDserver’ (2)
  • 9. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Automate Deployment and Management Multi-vendor DNS-DHCP: Microsoft, ISC, SOLIDserver Enforce Best Practices Reduce Complexity & TCO Page 9 A centralized IPAM to manage SmartArchitecture™ (Secured, Reliable, Automated)
  • 10. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016Page 10 Printer Belgium 10.1.0.0 /16 Gand 10.1.0.0 /24 de 10.2.0.0 /16 fr 10.3.0.0 /16 uk 10.4.0.0 /16 Bruxelles 10.1.1.0 /24 Charleroi 10.1.2.0 /23 10.1.4.1 10.1.4.25 Block Subnet Pool IP address IP Space: Your Company Liege 10.1.4.0 /24 ToIP 10.1.4.26 10.1.4.100 10.1.4.101 10.1.4.150 10.1.4.200 (server200) 10.1.4.151 10.1.4.253 10.1.4.254 (Gateway) Global Consistency and Uniqueness Control within an IP Space No duplicate IP address or subnet overlap
  • 11. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 IPAM Corner stone of the Global DDI Solution Page 11 Server View Zone RR IPAMDNS DHCP Space Block Subnet Pool IP address Server Group Static with IP Range Scope Lease Lease granted Add subnet Add IP address Add CNAME, A,… records Add subnet Add pool Add IP address (with MAC)
  • 12. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016Page 12 Enforcement of Company defined best practices & Conformity Management Templates of objects: Dedicated forms with specific list of fields (i.e. for printer, server, router) How to make sure naming convention is respected ?
  • 13. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Much more than DDI 360°DNS Security Solution To Protect Your Business
  • 14. Confidential-Property of EfficientIP - All rights reserved-Copyright © 201614Page 14 DNS Attacks Classification Direct DoS, Amplification, Reflection attacks 3 Main Types of DNS Attacks EXPLOITS VOLUMETRIC Random QName, Phantom and Sloth attacks... DNS Tunnelling, poisoning, 0-day !! STEALTH
  • 15. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Attack Objectives Page 15 Multiple DNS Targets For Many Objectives PUBLIC PRIVATE Business Downtime Embezzlement of Money Intellectual Property Theft Customer Data Theft Damaged Reputation Password Stealing Volumetric Stealth Exploits
  • 16. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Why Are DNS Attacks So Impacting? Page 16 Traditional Security Solutions Are Not Adapted to Mitigating DNS Attacks Firewall & Next Generation Firewall Anti-DDoS Appliances IPS Secure Web Gateway ... A Specialized Layer of Defense Is Required To Protect Users & DNS Services From Hidden Threats in DNS Traffic
  • 17. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 EfficientIP DNS Security Vision Page 17 Protect All DNS Services From All Attack Types EXPLOITS PRIVATE PUBLIC VOLUMETRIC !! STEALTH
  • 18. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016Page 18 EfficientIP Security Solution Strengthen Security Foundation Block 0-Day Vulnerabilities Enforce Best Practices Ensure DNS Continuity with Adaptive Security Advanced Attack Detection Graduated Countermeasures Secure Public DNS Availability Resiliency & Robustness Absorb Extreme DoS Attacks on Cache Servers Cache Security & Performance Protect Users & Block DNS- Based Malware Activity Prevent, Detect & Mitigate
  • 19. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 SOLIDserver DNS Page 19
  • 20. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Hardened Appliance Enforce DNS Security Best Practices SmartArchitecture Templates: Stealth DNS, Master-Slave, Multi-master Block Zero-Day Vulnerabilities: Hybrid DNS Engines Three DNS Engines transparently Managed as a single entity Mitigate Amplification & Reflection Threat Response Rate Limiting (RRL) Ensure Data Integrity & Authenticity DNSSEC Automation: “One Click” Deployment Page 20 SOLIDserver DNS IT Night WINNER Best Security Product 2014 Most Innovative Security Solution SOLIDserver Security Foundation PUBLIC & PRIVATE
  • 21. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 DNS Cloud Page 21
  • 22. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Amazon Route53 Integration Advanced Protection For DDoS & 0-Day 52 DNS Spots – Hybrid DNS engine High-Availability & Performance Anycast resiliency – Ultra Low Latency Simple & Flexible Deployment –Management – Reversibility Cost-Effective Page 22 DNS Services In the Cloud PUBLIC UNIFIED MANAGEMENT OF IN-HOUSE & AMAZON CLOUD DNS
  • 23. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 DNS Firewall Page 23
  • 24. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 DNS Firewall Page 24 PROTECT AGAINST MALWARE AND PHISHING WITH RESPONSE POLICY ZONE PRIVATE DNS SERVICES Prevent Initial Infection Block malicious sites Detect and Block Malware Activity Users & Applications, CnC Communications Mitigate Data Exfiltration Locate Infected Devices to Remediate
  • 25. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 DNS Guardian Page 25
  • 26. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 DNS Guardian Page 26 Inside DNS Transaction Analysis For Accurate Attack Detection Global & Per IP Statistics (cache & recursive) Volumetric, Stealth & Exploit Attacks Detection Tunnelling, RQName attacks, phantom attacks, anomalies Graduated Protection With Smart Countermeasures Block source IPs of the attacks Quarantine suspected source IPs of attacks Patented Rescue Mode: Ensure service continuity even if the attack source is unidentifiable. ADAPTIVE DNS SECURITY PRIVATE DNS SERVICES
  • 27. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 Comprehensive DNS Security Solution Page 27
  • 28. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 DNS Blast: Cache Security & Performance Page 28 Absorbs DoS Attacks on DNS Cache & Eliminates Risks of Blocking Legitimate Clients World’s Fastest DNS Caching Server with 17 million qps High Performance of ACL, RPZ & DNSSEC Ensures Unparalleled High-Availability with Anycast Resilience Decreases Costs & Network Complexity No need to pile up DNS servers and expensive load-balancers Improved User Experience with Ultra Low Latency Unequalled Cache Hit Rate (CHR) with Multicast Cache Sharing Persistent Cache (Restart & Restore)
  • 29. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2015 DNS Security Performance & Intelligence Page 29 Complete Coverage of DNS Services Public & Private Comprehensive Attack Type Detection Volumetric, Stealth & Exploit Attacks Smart & Adaptive Threat Protection Block, Quarantine & Rescue Modes Simple to Deploy & Maintain Cost Effective
  • 30. Confidential-Property of EfficientIP - All rights reserved-Copyright © 2016 Thank you for your attention! Page 30