F5 Warsaw SOC. Kamil Woniak. Security Operations Manager, F5 Networks

Similar documents
Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Comprehensive datacenter protection

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

Integrated Web Application Firewall & Distributed Denial of Service (DDoS) Mitigation Solution

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Enterprise D/DoS Mitigation Solution offering

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

AKAMAI CLOUD SECURITY SOLUTIONS

haltdos - Web Application Firewall

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

F5 Networks Defence Methodiken auf Transportund Applikationsebene. Specialist SE - Security

How WebSafe Can Protect Customers from Web-Based Attacks. Mark DiMinico Sr. Mgr., Systems Engineering Security

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Intelligent and Secure Network

Unlocking the Power of the Cloud

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Comodo cwatch Web Security Software Version 1.6

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

Internet2 DDoS Mitigation Update

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Behavioral Analytics A Closer Look

Corrigendum 3. Tender Number: 10/ dated

86% of websites has at least 1 vulnerability and an average of 56 per website WhiteHat Security Statistics Report 2013

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

201 - TMOS TECHNOLOGY SPECIALIST

401 - SECURITY SOLUTION EXPERT

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Imperva Incapsula Website Security

A GUIDE TO DDoS PROTECTION

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

DDoS Detection&Mitigation: Radware Solution

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Kaspersky Security. The Power to Protect Your Organization

A senior design project on network security

Sichere Applikations- dienste

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

USG2110 Unified Security Gateways

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

The Presence and Future of Web Attacks

SIEMLESS THREAT DETECTION FOR AWS

Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Reducing the Cost of Incident Response

Bomgar Discovery Report

Reduce Your Network's Attack Surface

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

Prolexic Attack Report Q4 2011

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

Validating the Security of the Borderless Infrastructure

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

Security

Comodo cwatch Web Security Software Version 1.6

Neustar Security Solutions Overview

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

WHITE PAPER HIGH-FIDELITY THREAT INTELLIGENCE: UNDERSTANDING FALSE POSITIVES IN A MULTI-LAYER SECURITY STRATEGY

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Check Point DDoS Protector Introduction

WHITE PAPER. Applying Software-Defined Security to the Branch Office

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

The Interactive Guide to Protecting Your Election Website

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

akamai s [state of the internet] / security

DDoS MITIGATION BEST PRACTICES

Total Security Management PCI DSS Compliance Guide

Global DDoS Threat Landscape

DDoS Mitigation & Case Study Ministry of Finance

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

RSA INCIDENT RESPONSE SERVICES

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cisco Firepower NGIPS Tuning and Best Practices

Arbor White Paper Keeping the Lights On

Assessing Global Security Threat Levels Bryan Lu, Project Manager / Researcher

Imperva Incapsula Product Overview

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

Transcription:

F5 Warsaw SOC Kamil Woniak Security Operations Manager, F5 Networks k.wozniak@f5.com

Agenda The Story of the SOC Threat intelligence & Research F5 Anti-Fraud, DDOS and WAF protection services Highlights and Lowlights Reporting on Customer Growth and Customer expirience Customer Feedback SOC and F5 Networks priorities and focus points Publications

OUR Map

2013 Versafe acquisition AGENDA DRAFT 2014 F5 WebSafe release Seattle SOC launch Defense.net acquisition F5 Silverline Volumetric DDoS release 2015 Poland SOC Launch F5 Silverline Web Application Firewall release 2016 Delivering 3 SOC services 24x7x365 Silverline DDoS mitigation, Silverline WAFaaS, Anti Fraud services

Story of the SOC Warsaw Focus 1 2 3 4 5 6 7 8 9 10 Around two + years ago a decision has been made to create the a SOC outside of Seattle Extensive research started decision to choose Poland has been made In August 2015 we ve got our first 2 Analysts starting in F5 (AF roles) September 2015- official ribbon cutting event Aggressive hiring for all 3 groups Regular travels of the new hires to Seattle for weeks long boot camps Great results of the newly established teams after few months of being operational Great talent presenting the Warsaw office Employees and values GTM Japan

F5 Threat Monitor

Threat Intelligence Statistics

Threat Intelligence Statistics World wide web-injects map

F5 Anti-Fraud, DDOS and WAF protection services

Anti-Fraud & DDOS Specialized researchers and analyst at your service Unlimited Expert Malware Analysis Assess damage, understand attackers and resolve vulnerabilities understand attackers and mitigate to keep your business safe Analyzes any malware submitted including that detected by F5 Web Fraud Protection solutions Investigates and reports on malware including components, attributes, target, controls, purpose, etc.. Discovers indicators of compromise Identifies source and level of sophistication Helps prevent future malware attacks and eliminate risks associated with analyzing malware Constant traffic monitoring Mitigations applied within seconds Protection and analysis of different attack vectors Identifies source and level of sophistication Keep your business online during a DDoS attack Defends against the largest volumetric attacks Always available 24x7 Malware Analysis Team and Security Experts Includes C&C shutdown services, and WebSafe C&C drop zone investigation Protecting against all DDoS attack vectors

448 Gbps UDP/ICMP fragmentation

DDoS Attack Types 8% 11% Q1 FY17 15% 13% 15% UDP Fragment, 23% 15% UDP Fragment DNS Reflection UDP Flood ICMP SYN Flood NTP Reflection Other 9% 13% Q4 FY16 17% 18% [CATEGOR Y NAME], [PERCENT AGE] 21% DNS Reflection UDP Flood UDP Fragment SYN Flood NTP Reflection Other 15% Q3 FY16 9% 8% 21% 21% [CATEGOR Y NAME], [PERCENT AGE] UDP Fragment DNS Reflection UDP Flood SYN Flood NTP Reflection Other

WAF as a Service F5 security experts proactively monitor, and fine-tune policies to protect web applications and data from new and emerging threats. F5 Security Operations Center Expert policy setup Policy fine-tuning Proactive alert monitoring False positives tuning Detection tuning Whitelist / Blacklist Set up and monitoring

WarSOC Highlights, Customer Experience and Growth

Highlights Operations Local presence Cooperation Candidate pool The most rapidly growing F5 office worldwide Office Space doubling the office space

Customer Experience DDoS customers increase of almost 100% compared to the same period last year. WAF customers were up 136%, and Anti-fraud rose by 88%.

Customer Feedback You guys [SOC] have definitely raised the bar for customer service! Great Support and Great Product. [SOC Engineer] is very professional and knowledgeable The SOC analysts are very friendly and helpful regardless of the issue at hand. Really great to deal with.

Customer Feedback During the call today, Gibrail and the XYZ Company engineers mentioned that they were totally astounded by the superior quality of support provided by the Silverline support team so far. They went so far as to say it is the best support they have ever received, period It was awesome. One of the best service provided among tech company

THANK YOU