Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Similar documents
86% of websites has at least 1 vulnerability and an average of 56 per website WhiteHat Security Statistics Report 2013

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

A different approach to Application Security

Comprehensive datacenter protection

ForeScout Extended Module for Splunk

A GUIDE TO DDoS PROTECTION

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

IBM Cloud Internet Services: Optimizing security to protect your web applications

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Imperva Incapsula Product Overview

AKAMAI CLOUD SECURITY SOLUTIONS

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

The Top 6 WAF Essentials to Achieve Application Security Efficacy

WHITE PAPER Hybrid Approach to DDoS Mitigation

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Imperva Incapsula Website Security

F5 Warsaw SOC. Kamil Woniak. Security Operations Manager, F5 Networks

Silverline DDoS Protection. Filip Verlaeckt

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

The Interactive Guide to Protecting Your Election Website

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Mario Arriaza - Fundador

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Arbor White Paper Keeping the Lights On

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

Securing Your Microsoft Azure Virtual Networks

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

The IBM Platform Computing HPC Cloud Service. Solution Overview

Web Applications Security. Radovan Gibala F5 Networks

Application Security at Scale

NINE MYTHS ABOUT. DDo S PROTECTION

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Downtime by DDoS: Taking an Integrated Multi-Layered Approach. Arbor Solution Brief

TRUE SECURITY-AS-A-SERVICE

locuz.com SOC Services

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

THE ACCENTURE CYBER DEFENSE SOLUTION

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

Unlocking the Power of the Cloud

Securing Your Amazon Web Services Virtual Networks

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Sichere Applikations- dienste

Cisco Firepower with Radware DDoS Mitigation

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

Radware: Anatomy of an IoT Botnet and Economics of Defense

Data Privacy and Protection GDPR Compliance for Databases

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Retail Security in a World of Digital Touchpoint Complexity

Use Cases. E-Commerce. Enterprise

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Transform your network and your customer experience. Introducing SD-WAN Concierge

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

Securing Digital Transformation

DDoS Introduction. We see things others can t. Pablo Grande.

DDoS MITIGATION BEST PRACTICES

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

align security instill confidence

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

Enterprise D/DoS Mitigation Solution offering

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Introducing CloudGenix Clarity

AKAMAI THREAT ADVISORY. Satori Mirai Variant Alert

F5 Networks Defence Methodiken auf Transportund Applikationsebene. Specialist SE - Security

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

Security

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

Cybersecurity for Service Providers

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Security Vendor Line Card

Key Considerations in Choosing a Web Application Firewall

DDoS Managed Security Services Playbook

May the (IBM) X-Force Be With You

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

CABLE MSO AND TELCO USE CASE HANDBOOK

Cisco Firepower NGFW. Anticipate, block, and respond to threats

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

Transform your network and your customer experience. Introducing SD-WAN Concierge

Arbor Solution Brief Arbor Cloud for Enterprises

Mastering The Endpoint

Transcription:

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline PRESENTED BY: RICH BIBLE, EMEA SILVERLINE SA November 22, 2018 1 2018 F5 NETWORKS

DDoS and Application Attack Trends 2 2018 F5 NETWORKS

3 DDoS attacks are easy to launch nmap hping3 Low Orbit ION Dirt Jumper killapache.pl slowloris High Orbit ION RussKill slowhttptest metasploit PhantomJS Pandora, Jmeter, Scapy, Httpflooder, PhantomJS, SSLyze, THC-SSL-DOS, and many more 20173F5 NETWORKS 2018 F5 NETWORKS

BoTs, Meet IoT Devices 1 Tbps+ DDoS Attack F5 Labs Research Powered by 150,000 Hacked IOT Devices DNS DDoS attack article on Mirai IoT Botnet Making sense of DDoS Attacks, F5 Networks 4 2018 F5 NETWORKS 4

BoT Automation is the Single Biggest Threat Half of Internet traffic comes from bots 30% is malicious EBOOK_Bots-Mean-Business, F5 Networks web attacks account takeover Vulnerability Scanning Web Scraping Denial of Service Verizon 2017 Data Breach Investigations Report 2017 Identity Fraud Study, Javelin Strategy & Research 2018 5 2018 F5 NETWORKS F5

#1 Target: Apps Apps are the first target in the majority of breaches Breaches starting at the app, have the highest breach costs Valuable Lessons Learned from a Decade of Data Breaches, F5 Labs, Threat Intelligence Report 2017 6 2018 F5 NETWORKS 2018 F5 NETWORKS 24% ID s 29% Other 53% 47% 22% INITIAL TARGETS BREACH COSTS RECORDS BREACHED BIGGEST BUSINESS RISK

Attacks Hurt Your Business Evolving security threats $11.7M Avg. annual cost of cyber security 1 Damages brand reputation Results in significant downtime and revenue loss 130 54M Successful attacks per year per company 1 Monitored cyber attacks Worldwide 2 Compromises sensitive enterprise, employee and customer data Breaches compliance required to conduct business online Source: 1 Accenture/ Ponemon, 2017 Cost of Cyber Crime Study, 2 IBM X-Force Threat Intelligence Index 2017 7 2018 F5 NETWORKS

How Does F5 Protect Against DDoS and Application Attacks? 11 2018 F5 NETWORKS

The Evolution of Silverline WAF 2014 2015 2016 Hybrid Threat Intelligence WAF Express 2016 2016 2017 Dynamic Dashboards and Detailed Visibility 2017 DNS Services Improved Usability and Automated Signaling Hybrid 2018 F5 Acquires Defense.net- Silverline is born Managed Web Application Firewall Introduced DDoS Hybrid Signaling SSL, HTTP Traffic Insight Syslog, TI WAF Express Dynamic Dashboards Usability and Improved signaling DNS Services Completing the F5 Anti- DDOS Vision Full Layer 3-7 Protection on the same platform Enables automatic burst to cloud scrubbing for high-volume mitigation Increasing visibility and transparency Agile, self-service WAF Reporting & Analytics Speedy Mitigation More Services 12 2018 F5 NETWORKS

F5 Silverline Enterprise-grade application services in minutes Cloud based, enterprise-grade Rapidly deploy enterprise-grade security services across hybrid environments with 24x7 support from F5 experts. Drive operational and cost efficiencies DDoS Protection Web Application Firewall F5 Silverline Threat Intelligence Deliver application services, anywhere Cloud-based application services 24x7 Expert Support 13 2018 2018 F5 NETWORKS F5

SOC Global Coverage SOC SOC 24/7 Support F5 Security Operations Center (SOC) in Seattle: staffed 24x7 with security experts for DDoS Protection, WAF, and Threat Intelligence. Seattle, WA U.S. Warsaw, Poland 16 2018 F5 NETWORKS 2017 F5 NETWORKS Global Coverage Fully redundant and globally distributed data centers world wide in each geographic region San Jose, CA, US Ashburn, VA, US Frankfurt, Germany Singapore, SG London, UK Industry-Leading Bandwidth Attack mitigation bandwidth capacity over 1.8 Tbps Dedicated L3/L4 and L7 scrubbing infrastructure Guaranteed bandwidth with Tier 1 carriers

SOC Expert Mitigation and In-Depth Visibility Challenge: Finding quality experts to design and manage security $145K/yr. avg. cost of Security Pro* Limited visibility is a #1 cloud problem.*** Biggest obstacles to stronger cybersecurity = lack of skilled employees and budget. ** Solution: Cloud-based DDoS scrubbing with certified security experts, in-depth attack visibility, and expert DDoS mitigation Key Benefits Mitigation of DDoS attacks in cloud High availability of private network Dedicated security team Detailed analytics and reporting Packet capture, + SLAs on response times 17 2018 F5 NETWORKS

22 2018 F5 NETWORKS