IPv6. Akamai. Faster Forward with IPv6. Eric Lei Cao Head, Network Business Development Greater China Akamai Technologies
|
|
- Vivian Higgins
- 5 years ago
- Views:
Transcription
1 Akamai Faster Forward with IPv6 IPv6 Eric Lei Cao Head, Network Business Development Greater China
2 Agenda What is Akamai? Akamai s IPv6 Capabilities Experiences & Lessons Measuring IPv6 Adoption
3 What is Akamai?
4 What Akamai does Makes the Internet fast, reliable, and secure for our customers Used by many of the World s top companies & web properties Solutions include: Web Performance Media Delivery Cloud Security Cloud Networking
5 Traditional Delivery ISP Data center Home Transit Network ISP Mobile 1 or more data centers Connect to 1 or more transit providers Connect directly or indirectly to a myriad of ISPs ISP Enterprise
6 Problems with Traditional Delivery Data center $$ $$ $$ ISP Home Transit Network X ISP Mobile Bad for application owners Bad for users Bad for ISPs ISP Enterprise
7 The Akamai Way Data center ISP Home Transit Network ISP Mobile ISP Bypass middle mile Directly deployed in over a thousand ISPs Enterprise
8 Solving Problems the Akamai Way ISP Data center Home Transit Network ISP Mobile Good for application owners Good for users Good for ISPs ISP Enterprise
9 The Akamai Platform A Global Platform Over 170,000 servers In over 2,400 locations In over 1,300 networks In over 650 cities In 102 countries With Enormous Scale 20+ trillion bits per second 30+ million hits per second 2+ trillion deliveries per day 100+ petabytes per day 240+ Gbps attacks defended
10 Akamai s IPv6 Capabilities
11 Akamai s goals around IPv6 Committed to help customers with a smooth transition Enable customers to make IPv6 content available to users Maintain or improve performance & reliability Deliver content from nearby dual-stack servers Provide IPv6 edge to IPv4 origin translation service Soon: Provide an IPv4 edge to IPv6 origin translation service! Many Akamai products & solutions include robust support for IPv6 Some limitations and feature gaps remain Most products opt-in today More products will dual-stack by default over time
12 How Akamai enables IPv6 Dual-stacked edge servers Customer properties can be dual-stacked Terminate IPv4 and IPv6 connections in server software Can go forwards to customer origin via IPv4 (and IPv6 soon) End-to-end testing recommended and occasional origin changes Akamai Origin IPv4 IPv4 or IPv6 Users
13 IPv6 dual-stacked content on Akamai Many thousands of dual-stacked hostnames on Akamai Over 200 customers have opted-in Major websites, images, videos, downloads, & more Multiple SaaS/IaaS/PaaS resellers and customers dual-stacked with tens of thousands of end-customer properties Thousands of US government websites on Akamai (driven by OMB mandate) Open challenge: how to convince and enable the rest? Complex web properties often need testing & back-end changes
14 Transition to IPv6 for Akamai - History Underlying Foundation Client-to- Edge Edge-to-Origin & Remaining Features IPv6-only Servers IPv6 client-to-edge HTTP support first launched in 2011 Started dual-stacking servers around the globe Since then, actively: Adding support to more products and closing feature gaps Deploying IPv6 in more locations Helping customers dual-stack their sites and content
15 Akamai and IPv6: current deployment status IPv6 now configured and live on Akamai servers in over 95 countries over 460 cities (in all continents except Antarctica) over 560 networks over 1,400 server locations (limited by some of our network partners not yet having working IPv6)
16 Akamai has IPv6 support in Our HTTP(S) edge server and TCP-termination systems Including most features handling, logging, & conveying IP addrs Required custom support in kernel, load balancers, BGP servers, Name server and global Internet Mapping systems Akamai s FastDNS DNS service with AnyCast IPv6 authorities Akamai s Global Traffic Manager Constantly measuring IPv6 global connectivity from locations EdgeScape geolocation database Metrics and monitoring agents Web Application Firewall and Client Reputation systems Many provisioning, reporting, analytics, and support systems.. hundreds of other systems
17 Challenges Shallow IPv6 support is easy, but deep and pervasive takes time Hundreds of custom software systems Reliance on over a thousand network partners Makes IPv6-only Akamai infrastructure less compelling Deep integration with many major Internet properties Interesting technical challenges around every corner
18 Coming soon Deliver content to IPv4 and IPv6 end-users from IPv6-only servers and data centers! Akamai Origin IPv6 IPv4 or IPv6 Users * No committed availability or dates --- contact your account team with interest
19 IPv6 Adoption: HTTP(S) traffic levels Major factors Content availability Client network connectivity Client & CPE devices Date IPv6 Addresses Observed / week IPv6 Addresses Observed / day Akamai IPv6 Requests / Day June 2011 (W6D) 280 thousand 8.3 million June 2012 (W6L) 19 million 3.8 billion June million 10+ billion Dec million 20+ billion Sept billion 211 million 38+ billion Feb billion million 50+ billion More Content x More Clients More Traffic
20 Additional Akamai Resources for IPv6 Erik Nygren
21 Experiences & Lessons
22 Areas for Content Providers to be careful Systems handling IP addresses may need updates Storing Client IP addresses in a database Example: trying to store a 30 char IPv6 address in a 15 char client_ip database field Auth & session cookies with IP addrs highly problematic Multi-homed or dual-stacked client may use multiple addresses Client reputation, fraud prevention, and auditing IP ACLs, especially in the case of split IPv4-only VPNs IP Geo location Custom client software, such as on mobile devices
23 Other common IPv6 pitfalls Not everything claiming to support IPv6 does so fully IPv6 connectivity still spotty in some areas Pockets of the IPv6 Internet that can t reach other pockets IPv6 PMTUD is a common area for breakage Vendors, end networks, & content providers must regularly test Could benefit from better technology and testing tools Impact (today) limited to small set of users Increased complexity from IPv4 and IPv6 in-parallel
24 Another thing supporting IPv6: Bots! Even in 2011 we observed one set of infected hosts that saw a AAAA record appear and followed it I guess the malware was IPv6-ready? Akamai blocking ongoing probes over IPv6 Over 15 million per day in 2015 from all around the world! Make sure your firewalls support IPv6!
25 Measuring IPv6 Adoption
26 Virtuous cycle Ideally, with better performance over IPv6 than IPv4 More IPv6 Eyeballs More IPv6 Content More IPv6 Traffic More IPv6 Connectivity
27 IPv6 Adoption: Ramping US IPv6 Growth IPv6 in US is a major factor in increased client adoption
28 More Stats: Akamai s State of the Internet Akamai s quarterly State of the Internet report Daily IPv6 stats at Breakdowns by country and network Additional stats reported through ISOC s worldipv6launch.org
29 Additional Akamai Resources for IPv6 Erik Nygren
30 Leading countries: 19 months of IPv6 growth
31 Leading networks: 20 months of IPv6 growth
32 More Stats: Akamai s State of the Internet Akamai s quarterly State of the Internet report Daily IPv6 stats at Breakdowns by country and network Additional stats reported through ISOC s worldipv6launch.org
33 IPv6 on Akamai, Greater China
34 Overall Taiwan IPv6 adoption observed by AKamai
35 Thanks
IPv6 is Here: The Future is Now. Owen DeLong Akamai Technologies 2017 North American IPv6 Summit
IPv6 is Here: The Future is Now Owen DeLong Akamai Technologies 2017 North American IPv6 Summit Agenda IPv6 Background What is Taking So Long? Adoption & Landscape Preparing for IPv6 Akamai and IPv6 What
More informationAkamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.
Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges
More informationAkamai's V6 Rollout Plan and Experience from a CDN Point of View. Christian Kaufmann Director Network Architecture Akamai Technologies, Inc.
Akamai's V6 Rollout Plan and Experience from a CDN Point of View Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. Agenda About Akamai General IPv6 transition technologies Challenges
More informationUpdate on TLS SNI and IPv6 client adoption
Update on TLS SNI and IPv6 client adoption IETF 101 London - MAPRG March 20, 2018 Presenter: Erik Nygren, HTTPS Growth Motivation HTTPS is growing rapidly but no IP multi-tenancy without
More informationImperva Incapsula Website Security
Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as
More information2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015
2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING
More informationRosetta Stone Turns to Cedexis to Implement a Multi-CDN Strategy, Improving Performance for Users Worldwide
Rosetta Stone Turns to Cedexis to Implement a Multi-CDN Strategy, Improving Performance for Users Worldwide How does a global leader of language, literacy, and brain training programs optimize content
More informationSony Adopts Cisco Solution for Global IPv6 Project
Customer Case Study Sony Adopts Cisco Solution for Global IPv6 Project Sony aims to accelerate global collaboration and business across business units to realize goal of "One Sony." EXECUTIVE SUMMARY Customer
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationOpportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies
Opportunities for Exploiting Social Awareness in Overlay Networks Bruce Maggs Duke University Akamai Technologies The Akamai Intelligent Platform A Global Platform: 127,000+ Servers 1,100+ Networks 2,500+
More informationThe DNS of Things. A. 2001:19b8:10 1:2::f5f5:1d Q. WHERE IS Peter Silva Sr. Technical Marketing
The DNS of Things Peter Silva Sr. Technical Marketing Manager @psilvas Q. WHERE IS WWW.F5.COM? A. 2001:19b8:10 1:2::f5f5:1d Advanced threats Software defined everything SDDC/Cloud Internet of Things Mobility
More informationWar Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert
War Stories from the Cloud Going Behind the Web Security Headlines Emmanuel Mace Security Expert The leading cloud platform for enabling secure, high-performing user experiences on any device, anywhere.
More informationConsiderations and Actions of Content Providers in Adopting IPv6
Considerations and Actions of Content Providers in Adopting IPv6 Sheng Jiang / Huawei Brian Carpenter / University of Auckland www.huawei.com IPv6 Trends Global IPv4 registry (IANA) ran out of spare blocks
More informationThe Interactive Guide to Protecting Your Election Website
The Interactive Guide to Protecting Your Election Website 1 INTRODUCTION Cloudflare is on a mission to help build a better Internet. Cloudflare is one of the world s largest networks. Today, businesses,
More information14 January 2013 Presented by: Kevin L. Jones Agency IPv6 Transition Manager
NASA IPv6 Implementation Status TIP 2013 Presented by: Kevin L. Jones Agency IPv6 Transition Manager OMB IPv6 Mandate Goals 1. Designate an IPv6 Transition Manager by 10/30/2010 2. Ensure agency procurements
More informationINTELLIGENT DNS AS A CORNERSTONE OF DIGITAL TRANSFORMATION. CLOUDEXPO 2017
INTELLIGENT DNS AS A CORNERSTONE OF DIGITAL TRANSFORMATION. CLOUDEXPO 2017 BUILD A SMARTER INTERNET Carl Levine Senior Technical Evangelist @stuffcarlsays SLIDE 1 WWW.NS1.COM @NSONEINC Today s World Dynamic,
More informationECE 158A: Data Networks I. Fall 2015 Massimo Franceschetti
ECE 158A: Data Networks I Fall 2015 Massimo Franceschetti What is a Network? A system of links that interconnect nodes in order to exchange information A B We will focus on the INTERNET Where nodes are
More informationIPv6 deployment status: Where are we now and way forward. Miwa Fujii APNIC
IPv6 deployment status: Where are we now and way forward Miwa Fujii APNIC Table of contents Dissecting IPv6 adoption IPv6 deployment status in the AP region Way forward 2 Dissecting IPv6
More informationInside Cisco IT: Making the Leap to IPv6
Inside Cisco IT: Making the Leap to IPv6 COCRST-2464 COCRST-2464 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 IPv6 Sessions BRKRST-1069 BRKRST-2301 BRKRST-2311 BRKSEC-2003 BRKSPG-2604
More informationIPv6 Implementation Update DREN and SPAWAR
IPv6 Implementation Update DREN and SPAWAR VA Inter Agency IPv6 Meeting 2 Feb, 2011 Crystal City, VA Ron Broersma DREN Chief Engineer SPAWAR Network Security Manager Federal IPv6 Task Force ron@spawar.navy.mil
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationIPv6 Deployment Experiences. John Jason Brzozowski
IPv6 Deployment Experiences John Jason Brzozowski Overview Terminology Scope Core Concepts Goals and Objectives Lessons Learned Challenges IPv6 Data Services Considerations Content and Services 2 Terminology
More informationWEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM
SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud
More informationIPv6 in Asia from Akamai Perspective
IPv6 in Asia from Akamai Perspective TWNOG 2018 21st Jun 2018 Who am I? Name: Tonie Wong Company: Akamai Technologies (Hong Kong) Department: Network Partner Services APJ Responsibilities: Service and
More informationIPv6 Implementation Best Practices For Service Providers
IPv6 Implementation Best Practices For Service Providers Brandon Ross Chief Network Architect and CEO 2013 Utilities Telecom Council Network Utility Force www.netuf.net @NetUF RFC 6540 - IPv6 Support Required
More informationThe Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING
AKAMAI.COM The Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING PART 3: STEPS FOR ENSURING CDN PERFORMANCE MEETS AUDIENCE EXPECTATIONS FOR OTT STREAMING In this third installment of Best Practices
More informationThe poor state of SIP endpoint security
The poor state of SIP endpoint security Kamailio World, 03.04.2014 Henning Westerholt Head of IT Operations Access 1 Agenda Introduction Reasons for security issues, motivation for attackers Past security
More informationState of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager
State of the Internet Security Q2 2017 Mihnea-Costin Grigore Security Technical Project Manager Topics 1. Introduction 2. DDoS Attack Trends 3. Web Application Attack Trends 4. Spotlights 5. Resources
More informationEnterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE
Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of
More informationWEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING
WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany
More informationAnalisi degli attacchi DDOS e delle contromisure
Attacchi informatici: Strategie e tecniche per capire, prevenire e proteggersi dagli attacchi della rete Analisi degli attacchi DDOS e delle contromisure Alessandro Tagliarino 0 WHO IS ARBOR NETWORKS?
More informationIPv6 Deployment in Africa
IPv6 Deployment in Africa Adiel A. Akplogan CEO, AfriNIC INET Africa-2009 Spearheading Internet technology and policy development in the African Region The content IPv4 exhaustion Current situation IPv6
More informationSECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON
White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationNETWORK DDOS PROTECTION STANDBY OR PERMANENT INFRASTRUCTURE PROTECTION VIA BGP ROUTING
NETWORK DDOS PROTECTION STANDBY OR PERMANENT INFRASTRUCTURE PROTECTION VIA BGP ROUTING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered
More informationThe Internet Evolution and Opportunity
The Internet Evolution and Opportunity Leslie Daigle, Chief Internet Technology Officer, ISOC W3C Technical Plenary week, Developers Meeting November 5, 2009. The Internet Society Founded in 1992 A global
More informationSupporting Internet Growth and Evolution: The Transition to IPv6
2010/TEL41/DSG/WKSP2/004 Agenda Item: Panel Discussion 1 Supporting Internet Growth and Evolution: The Transition to IPv6 Submitted by: APNIC Workshop for IPv6: Transforming the Internet Chinese Taipei
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationNext Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line
Next Generation IPv6 Cyber Security Protection Through Assure6i TM Product Line Designed to Prevent, Detect, and Block Malicious Attacks on Both IPv4 and IPv6 Networks TM Introduction With the exponential
More informationSTATE OF MODERN APPLICATIONS IN THE CLOUD
STATE OF MODERN APPLICATIONS IN THE CLOUD 2017 Introduction The Rise of Modern Applications What is the Modern Application? Today s leading enterprises are striving to deliver high performance, highly
More informationIPv6 Enablement for Enterprises. Waliur Rahman Managing Principal, Global Solutions April, 2011
IPv6 Enablement for Enterprises Waliur Rahman Managing Principal, Global Solutions April, 2011 PROPRIETARY STATEMENT This document and any attached materials are the sole property of Verizon and are not
More informationValidating the Security of the Borderless Infrastructure
SESSION ID: CDS-R01 Validating the Security of the Borderless Infrastructure David DeSanto Director, Product Management Spirent Communications, Inc. @david_desanto Agenda 2 The Adversary The Adversary
More informationHow Cisco IT Is Accelerating Adoption of IPv6
Cisco IT Case Study How Cisco IT Is Accelerating Adoption of IPv6 Priority projects are IPv6-based public website and end-to-end reference implementation. Cisco IT Case Study / Borderless Networks / IPv6:
More informationWe re ready. Are you?
We re ready. Are you? Deploying Scalable, Resilient WAN Architectures with Meraki MX and IWAN Joe Aronow - Product Specialist, Meraki MX Agenda Introduction: Cloud networking Meraki MX Security Appliances
More informationLunch with John Curran. President and CEO, ARIN
Lunch with John Curran President and CEO, ARIN 3 April 2013 History of the Internet Protocol Internet Protocol version 4 (IPv4) Developed for the original Internet (ARPANET) in 1978 4 billion addresses
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationIPv4 Exhaustion at ARIN
IPv4 Exhaustion at ARIN 17 April 2013 INET Denver John Curran President and CEO, ARIN 2 History of the Internet Protocol Internet Protocol version 4 (IPv4) Developed for the original Internet (ARPANET)
More informationThink You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.
Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help. www.home.neustar 02 Think You're Safe from DDos Attacks?
More informationIPv4 Depletion and IPv6 Adoption Today. Richard Jimmerson
IPv4 Depletion and IPv6 Adoption Today Richard Jimmerson 2 History of the Internet Protocol Internet Protocol version 4 (IPv4) Developed for the original Internet (ARPANET) in 1978 4 billion addresses
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 1 1ST QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2017 4 DDoS
More informationComcast IPv6 Trials NANOG50 John Jason Brzozowski
Comcast IPv6 Trials NANOG50 John Jason Brzozowski October 2010 Overview Background Goals and Objectives Trials Observations 2 Background Comcast IPv6 program started over 5 years ago Incrementally planned
More informationThe F5 Application Services Reference Architecture
The F5 Application Services Reference Architecture Build elastic, flexible application delivery fabrics that are ready to meet the challenges of optimizing and securing applications in a constantly evolving
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationWar Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy
War Stories from the Cloud: Rise of the Machines Matt Mosher Director Security Sales Strategy The Akamai Intelligent Platform The Platform 175,000+ Servers 2,300+ Locations 750+ Cities 92 Countries 1,227+
More informationSept 24th IPv6 adoption. Alain Fiocco, Sr. Director CTO Office, Head of IPv6 High Impact Project
Sept 24th 2014 adoption Alain Fiocco, Sr. Director CTO Office, Head of High Impact Project When a tree falls, we can hear it. When the forest grows, not a sound Gandhi Cisco Public 2 6lab.cisco.com @cisco6lab
More informationGlobal DDoS Threat Landscape
DDOS REPORT Global DDoS Threat Landscape OVERVIEW Overview The number of network layer attacks continued to fall in, the fourth consecutive quarterly drop since peaking in Q2 2016. After reaching a record
More informationCisco CloudCenter Solution Use Case: Application Migration and Management
Cisco CloudCenter Solution Use Case: Application Migration and Management Application migration and management Cloud computing is here to stay. According to recent Gartner research 1, from 2011 to 2014
More informationWorkshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA
Transition to IPv6 Drivers and Challenges Dr. Abdelfattah ABUQAYYAS ICT Consultant CITC- KSA 1 MAIN POINTS The ICT sector is developing rapidly - new services, and new modes of service delivery. The Internet
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Adopting IPv6 @ Oracle Data Centers, Desktops, and Delivery Rich Lewis IPv6 Product Manager, Global IT TXv6TF, November 2012 2 Program Agenda Do we need IPv6? Plotting a course for Oracle. Oracle s vessel
More information2610:f8:ffff:2010:04:13:0085:1
2610:f8:ffff:2010:04:13:0085:1 Qwest IPv6 Implementation Experience Shawn Carroll 2610:f8:ffff:2010:04:13:0085:55 Previous Qwest Implementation Work Obtained 6bone Pseudo Next Level Aggregator (pnla) from
More informationThe Future of P2P. A Retrospective. Eric Armstrong President Kontiki, Inc.
The Future of P2P A Retrospective Eric Armstrong President Kontiki, Inc. The BIG Opportunity An enormous Digital Video Marketplace is Inevitable We are passed the threshold where Digital compression +
More informationDDoS Detection&Mitigation: Radware Solution
DDoS Detection&Mitigation: Radware Solution Igor Urosevic Head of Technical Department SEE CCIE #26391 Ingram Micro Inc. 1 Agenda DDoS attack overview Main point of failures Key challenges today DDoS protection
More informationVishal Shirodkar Technology Specialist Microsoft India Session Code:
Vishal Shirodkar Technology Specialist Microsoft India Session Code: Session Objectives And Takeaways Explain how DirectAccess differs from a traditional VPN Identify some of the key requirements for installing
More informationChanging the Voice of
Changing the Voice of Telecommunications Level 3 Solutions for Voice Service Providers Competitive: It is a word you know well. As a voice services provider, you face a unique set of challenges that originate
More informationIPv6 Readiness in the Communication Service Provider Industry
IPv6 Readiness in the Communication Service Provider Industry An Incognito Software Report Published April 2014 Executive Summary... 2 Methodology and Respondent Profile... 3 Methodology... 3 Respondent
More informationDDoS MITIGATION BEST PRACTICES
DDoS MITIGATION BEST PRACTICES DDoS ATTACKS ARE INCREASING EXPONENTIALLY Organizations are becoming increasingly aware of the threat that Distributed Denial of Service (DDoS) attacks can pose. According
More informationTOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS
TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and
More informationAugust 14th, 2018 PRESENTED BY:
August 14th, 2018 PRESENTED BY: APPLICATION LAYER ATTACKS 100% 80% 60% 40% 20% 0% DNS is the second most targeted protocol after HTTP. DNS DoS techniques range from: Flooding requests to a given host.
More informationIBM Next Generation Intrusion Prevention System
IBM Next Generation Intrusion Prevention System Fadly Yahaya SWAT Optimizing the World s Infrastructure Oct 2012 Moscow 2012 IBM Corporation Please note: IBM s statements regarding its plans, directions,
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationWhy, When & How? Asela Galappattige Sri Lanka Telecom PLC
Why, When & How? Asela Galappattige Sri Lanka Telecom PLC LkNOG Conference, Colombo Sri Lanka, 20 th Oct 2017 Precursor World has run out of IPv4 addresses IPv6 is the new Network Address Scheme for the
More informationIn the Domain Name System s language, rcode 0 stands for: no error condition.
12/2017 SIMPLE, FAST, RESILIENT In the Domain Name System s language, rcode 0 stands for: no error condition. If a DNS server answers a query with this result code, the service is running properly. This
More informationSecurity Correlation Server System Deployment and Planning Guide
CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices
More informationIoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense
IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack
More informationCYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION
SELF-AUDIT GUIDE CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION A Primer for Moving Beyond AV and Firewalls 1 The Problem As software systems become more distributed and interactive
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationHow Cisco ASR 1000 Enables Cisco Business Strategies by Providing Capacity and Resiliency for Collaborative Applications
Cisco IT Case Study How Cisco ASR 1000 Enables Cisco Business Strategies by Providing Capacity and Resiliency for Collaborative Applications Cisco ASR 1000 Routers support company shift toward virtualized
More informationThe Regional Internet Registries
The Regional Internet Registries Managing Internet Number Resources www.afrinic.net www.apnic.net www.arin.net www.lacnic.net www.ripe.net www.nro.net Global Coordination A Fair and Stable Platform Whether
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationSoftware-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time
A CONNECTED A CONNECTED Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time Service providers gain a competitive advantage by responding to customer
More informationCisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments
OVERVIEW + Cisco and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments KEY BENEFITS Quickly create private clouds Tested with industry-leading BIG-IP ADC platform Easily scale
More informationAutomating Security Response based on Internet Reputation
Add Your Logo here Do not use master Automating Security Response based on Internet Reputation IP and DNS Reputation for the IPS Platform Anthony Supinski Senior Systems Engineer www.h3cnetworks.com www.3com.com
More informationEvidence-based protection of web resources a must under the GDPR. How the Akamai Intelligent Platform helps customers to mitigate risks
AKAMAI WHITE PAPER Evidence-based protection of web resources a must under the GDPR How the Akamai Intelligent Platform helps customers to mitigate risks Table of Contents GDPR: What is it? 1 How can Akamai
More informationHow we measure IPv6. Geoff Huston, Joao Damas George Michalson APNIC. George Michaelson. Geoff Huston. Joao Damas. APNIC Labs
How we measure IPv6 George Michaelson Geoff Huston, Joao Damas George Michalson APNIC Geoff Huston Joao Damas APNIC Labs Background Measurement is a big topic in today s Internet Reliable, unbiased, open
More informationEmpirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion
Empirical Analysis of the Effects and the Mitigation of IPv4 Address Exhaustion wissenschaftliche Aussprache 2. August 2017 Philipp Richter Internet Penetration, 2017, ISOC. The Internet connects 3.5 billion
More informationHow Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners
How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners Offloading XML processing to the ACE XML Gateway improves service performance and simplifies
More informationSichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More informationHySecure Quick Start Guide. HySecure 5.0
HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current
More informationNetworking for a dynamic infrastructure: getting it right.
IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for
More informationUpdate from the RIPE NCC
Update from the RIPE NCC INEX Meeting, Dublin, 14 December 2011 Mirjam Kühne, RIPE NCC Outline RIPE Labs - Background, Purpose, Content, Participation IPv6 Activities and Statistics RIPE Atlas RIPEstat
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape 5 big cyber security trends for 2018 More data, more danger. Data proliferation brings many new opportunities but also many downsides:
More informationSentryWire Next generation packet capture and network security.
Next generation packet capture and network security. 1 The data landscape More data, more danger. Data proliferation brings many new opportunities but also many downsides: more data breaches, more sophisticated
More informationCase Study: Tata Communications Delivering a Truly Interactive Business Intelligence Experience on a Large Multi-Tenant Hadoop Cluster
Case Study: Tata Communications Delivering a Truly Interactive Business Intelligence Experience on a Large Multi-Tenant Hadoop Cluster CASE STUDY: TATA COMMUNICATIONS 1 Ten years ago, Tata Communications,
More informationHow Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010
How Akamai delivers your packets - the insight Christian Kaufmann SwiNOG #21 11th Nov 2010 What is a Content Distribution Network? The RFCs and Internet Drafts define a Content Distribution Network, CDN,
More informationSupporting Internet Growth and Evolution: The Transition to IPv6
Supporting Internet Growth and Evolution: The Transition to IPv6 Bali IPv6 Summit, Bali 9 June 2010 Sanjaya Services Director, APNIC 1 Overview Recap About APNIC Reality check: where are we now? Transition
More informationImperva Incapsula Product Overview
Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security
More informationNever Drop a Call With TecInfo SIP Proxy White Paper
Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon
More informationInfoblox Dossier User Guide
Infoblox Dossier User Guide 2017 Infoblox Inc. All rights reserved. ActiveTrust Platform Dossier and TIDE - June 2017 Page 1 of 16 1. Overview of Dossier... 3 2. Prerequisites... 3 3. Access to the Dossier
More information