Insight Guide into Securing your Connectivity

Similar documents
Comprehensive datacenter protection

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

Imma Chargin Mah Lazer

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

Data Plane Protection. The googles they do nothing.

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

Chapter 8 roadmap. Network Security

Security with Passion. Endian UTM Virtual Appliance

Network Security. Thierry Sans

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Configuring attack detection and prevention 1

Cisco RV180 VPN Router

A10 DDOS PROTECTION CLOUD

Corrigendum 3. Tender Number: 10/ dated

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

Fregata. DDoS Mitigation Solution. Technical Specifications & Datasheet 1G-5G

PROTECTING INFORMATION ASSETS NETWORK SECURITY

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

IxLoad-Attack TM : Network Security Testing

Deployments and Network Topologies

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

Configuring attack detection and prevention 1

Network. Arcstar Universal One

DDoS Mitigation & Case Study Ministry of Finance

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

CSC 4900 Computer Networks: Security Protocols (2)

DDoS Detection&Mitigation: Radware Solution

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Check Point DDoS Protector Introduction

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

ECE 435 Network Engineering Lecture 23

SonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

HP High-End Firewalls

Securing Online Businesses Against SSL-based DDoS Attacks. Whitepaper

Neustar Security Solutions Overview

Who We Are.. ideras Features. Benefits

WHITE PAPER ARUBA SD-BRANCH OVERVIEW

Cisco CCIE Security Written.

Herding Cats. Carl Brothers, F5 Field Systems Engineer

Palo Alto Networks PCNSE7 Exam

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

SONICWALL SECURITY HEALTH CHECK SERVICE

Building Resilience to Denial-of-Service Attacks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

BIG-IP otse vastu internetti. Kas tulemüüri polegi vaja?

CSc 466/566. Computer Security. 18 : Network Security Introduction

Architecture: Consolidated Platform. Eddie Augustine Major Accounts Manager: Federal

Simple and Powerful Security for PCI DSS

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

SECURITY SERVICES SECURITY

Cloudflare Advanced DDoS Protection

Security

SONICWALL SECURITY HEALTH CHECK PSO 2017

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

SONICWALL SECURITY HEALTH CHECK SERVICE

F5 DDoS Hybrid Defender : Setup. Version

Configuring Access Rules

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

Networks

Securing the Transition Mechanisms

All-in one security for large and medium-sized businesses.

VMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

SD-WAN Deployment Guide (CVD)

ECE 435 Network Engineering Lecture 23

CTS2134 Introduction to Networking. Module 08: Network Security

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

NETWORK DDOS PROTECTION STANDBY OR PERMANENT INFRASTRUCTURE PROTECTION VIA BGP ROUTING

F5 Synthesis Information Session. April, 2014

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Silverline DDoS Protection. Filip Verlaeckt

Check Point DDoS Protector Simple and Easy Mitigation

Distributed Denial of Service (DDoS)

Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0)

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Barracuda Link Balancer

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

TDC DoS Protection Service Description and Special Terms

GDPR Update and ENISA guidelines

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Draytek Vigor 2925 Dual-WAN Router Firewall

August 14th, 2018 PRESENTED BY:

Seceon s Open Threat Management software

ExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Ensuring the Success of E-Business Sites. January 2000

Are You Fully Prepared to Withstand DNS Attacks?

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

Reduce Your Network's Attack Surface

Transcription:

Insight Guide I Securing your Connectivity Insight Guide into Securing your Connectivity Cyber Security threats are ever present in todays connected world. This guide will enable you to see some of the innovative ways Stream Networks are securing our customers Internet connectivity providing possibly the most secure Internet service from a UK business ISP ever. Our intelligent network technologies can be rapidly deployed to deliver cost savings and provide multiple layers of protection from outside attack.

Insight Guide I Securing your Connectivity Don t I just need a good Firewall? GDPR legislation, the failure to protect your organisation from Cyber-attack is also costly. This shift is being felt in IT across virtually every industry. What s becoming increasingly clear is that securing your Internet Connectivity by an on premise Firewall alone no longer provides complete peace of mind. Businesses and organisations of all sizes are being challenged to extend their networks to more people, places and things than ever before. The rise of Cloud, SaaS, mobile devices, and Internet of Things (IoT) technologies are forcing more network traffic over the public Internet. Stream Networks have developed a unique proposition that incorporates DDoS protection alongside an additional highly resilient Cloud Firewall service that sits between the edge of our Core Network and the Customers network connection/s to ensure all connections are ultrasecure. As a result, the threats posed to an organisations IT security are increasing exponentially and with the implementation of DDoS Protection A Distributed Denial of Service (DDoS) attack is when an overwhelming level of traffic is purposely channelled to an online service resulting in a negative performance. They are becoming more and more commonplace, and worryingly more and more sophisticated. This means there has never been a more relevant time to protect your networks. DDoS attacks use a network of botnets, which are infected computers to launch attacks against any target. Once infected, these botnets will try to overwhelm targets by sending high volumes of connection requests or random data. A DDoS attack that can take down an SME for a week can be purchased for just $150! How the Stream network mitigates against DDoS Using our peering partners, our connectivity and Cloud solutions come with default DDoS protection as standard. Our network advertises your public Facing Internet addresses via our DDoS Scrubbing Centres. DDoS Scrubbing means that your service stays online during an attack. Your incoming and outgoing traffic is analysed with malicious traffic being removed and filtered, clean traffic is then passed on for delivery to your network. The Stream Scrubbing Centres are located in 9 Data Centres in 8 cities within the EU and US and have The ability to filter attacks up to 1TBS in size meaning that it its virtually impossible to flood a Stream Networks DDoS protected Internet connection or Cloud Server.

DDoS Features and Benefits + Attacks against your network are filtered up to 1Tbps in size + Analyse your DDoS protected traffic in real time via our innovative portal + Solution works in real time, 24x7x365 + Keeps your business and key Internet services on at all times we won t black hole your service. Types of DDoS attacks that are filtered + IP non-existing protocol attacks + ICMP & IGMP attacks; ICMP Flood, SMark, Smurf Attack, ICMP Flood + Layer 7, HTTP attacks; Slowloris, RUDY, HTTP Object Request Flood + TCP attacks/floods; SYN, SYN-ACK, ACK, FIN, RST, TCP, EXE, TCT NULL, Fake session + Fragment attacks such as mangled IP fragments with overlapping and oversized payloads to target machines + UDP attacks; Fraggle, DNS query, DNS Amplification, SNMPv2, NetBIOS, SDP, CharGEN, BitTorrent, Stream protocol Think you ve got nothing to worry about? FIFA, Uber, Google, Facebook, British Airways, Talk Talk, Pizza Hut, Yahoo, Bupa, Wonga, Sage, Three Mobile the list goes on. What do all these companies have in common? They have all been subject to cyber-attacks that have led to mass data breaches. Another thing all these companies have in common, maybe something they have in common with you too they all thought their network was secure if only they were using Stream Networks.

How a Cloud Firewall provides additional security Stream Networks operate and own two high availability Cloud platforms (OpenStack and VMware) within multiple UK Data Centres. Our primary site is located within a nuclear proof ex MOD bunker that meets multiple compliancy standards including ISO27001, PCI DSS and IGGSOC. Our Cloud Firewall service sits at the edge of our Core Network providing an additional level of Firewalling between our core and your edge connectivity. Based on trusted firewalling technology) customers also have the choice of deploying a cloud firewall from the vendor of their choice be it Fortinet, Palo Alto, Sophos, SonicWall; any Firewall vendor that provides their platform as a Virtual appliance. All customer Internet traffic incoming and outgoing passes through the Cloud Firewall ensuring that traffic is filtered within the Core network before arriving at the end point, where if required, traffic can be firewalled and filtered a second time via an on premise Firewall. In addition to providing Firewall protection within the Core, our Cloud Firewall Service allows for any Stream Networks connection to terminate as a LAN connection on the Cloud Firewall allowing customers to build a hybrid MPLS/SD-WAN adding additional sites into the network with ease, whilst managing the IP addressing schemes and Firewall rules from a single interface. Cloud Firewall Features Firewall and Router + Stateful Packet Inspection (SPI) + GeoIP blocking + Anti-Spoofing + Time based rules + Connection limits + Dynamic DNS + Reverse proxy + Captive portal guest network + Supports concurrent IPv4 and IPv6 + NAT mapping (inbound/outbound) + VLAN support (802.1q) + Configurable static routing + IPv6 network prefix translation + IPv6 router advertisements + Multiple IP addresses per interface + DHCP server + DNS forwarding VPN + IPsec and OpenVPN + Site-to-site and remote access + VPN support + SSL encryption + VPN client for multiple + Operating systems + L2TP/IPsec for mobile devices + Multi-WAN for failover + IPv6 support + Split tunnelling + Multiple tunnels + VPN tunnel failover + NAT support + Automatic or custom routing + Local user authentication or RADIUS/LDAPPPPoE Server Intrusion Prevention +Snort-based packet analyser +Layer 7 application detection +Multiple rules sources and categories +Emerging threats database +IP blacklist database +Pre-set rule profiles +Per-interface configuration +Suppressing false positive alerts +Deep Packet Inspection (DPI) +Optional open-source packages for application blocking

Stream Cloud Firewall Benefits + Attacks against your network are filtered within our core network before reaching the endpoint Firewall + Use free OpenSource technology or deploy vendor approved virtual appliances. + Add on additional network connections managing IP addressing and firewall rules from a single interface + Build a Hybrid MPLS/SD-WAN network providing greater control over your network Next steps To fast-track a conversation, simply click on the link below to send us an email and one of the team will call you back straight away. Call me now regarding ultra-secure connectivity Stream Networks Ltd info@stream-networks.co.uk 01635 884170 About Stream Stream Networks has been built for business use, enabling our customers to leverage the power of our 10GB network capacity and benefit from our peering agreements by lowering costs and increasing bandwidth. Our core is built using Cisco and Juniper to provide a fully meshed network between four key UK Data Centres, at which point we extend our footprint with our peering agreements and connections into the major carriers. Our network is managed and monitored 24x7x365 to ensure your business stays connected. With a significant capital investment in our high availability Cloud infrastructure (which continues to grow each year), businesses are able to realise the benefits of moving computing to the cloud whilst knowing their data is secure, UKbased, and available 24x7x365. Based in our core UK Data Centres, each cluster is designed to provide 100% uptime, and comprises the latest in replicated storage arrays, network capacity, and processing power, all built using VMware s HA HyperVisor. 2018 Stream Networks Ltd. All rights reserved.