IBM Cloud Internet Services: Optimizing security to protect your web applications

Similar documents
AKAMAI CLOUD SECURITY SOLUTIONS

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Protecting Your Cloud

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Best Practices in Securing a Multicloud World

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Protect vital DNS assets and identify malware

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

with Advanced Protection

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Achieving End-to-End Security in the Internet of Things (IoT)

DDoS MITIGATION BEST PRACTICES

Enterprise D/DoS Mitigation Solution offering

The Interactive Guide to Protecting Your Election Website

Networking for a smarter data center: Getting it right

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

SIEM Solutions from McAfee

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

Move, manage, and run SAP applications in the cloud. SAP-Certified Infrastructure from IBM Cloud

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Arbor White Paper Keeping the Lights On

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

8 Must Have. Features for Risk-Based Vulnerability Management and More

Cisco Start. IT solutions designed to propel your business

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Neustar Security Solutions Overview

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

IBM and Juniper Networks

Office 365 Buyers Guide: Best Practices for Securing Office 365

SUPERCHARGE YOUR DDoS PROTECTION STRATEGY

FOR FINANCIAL SERVICES ORGANIZATIONS

TechValidate Survey Report: SaaS Application Trends and Challenges

THALES DATA THREAT REPORT

Accelerating growth and digital adoption with seamless identity trust

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Are we breached? Deloitte's Cyber Threat Hunting

TREND MICRO SMART PROTECTION SUITES

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

Build Your Zero Trust Security Strategy With Microsegmentation

Securing Digital Transformation

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Deploying a Next-Generation IPS Infrastructure

Symantec Client Security. Integrated protection for network and remote clients.

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Why Enterprises Need to Optimize Their Data Centers

Preparing your network for the next wave of innovation

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Corero & GTT DDoS Trends Report Q2 Q3 2017

U.S. State of Cybercrime

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

IBM Z servers running Oracle Database 12c on Linux

SYMANTEC DATA CENTER SECURITY

A Top US Bank Trusts Neustar SiteProtect for Reliable DDoS Protection Depth

MITIGATE CYBER ATTACK RISK

Express Monitoring 2019

align security instill confidence

Sustainable Security Operations

Multi-vector DDOS Attacks

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Building a Strong Cybersecurity Program During IT Transformation

ForeScout ControlFabric TM Architecture

The Oracle Trust Fabric Securing the Cloud Journey

DIGITAL TRUST Making digital work by making digital secure

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Service Provider Consulting

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

Disaster Recovery Is A Business Strategy

Services solutions for Managed Service Providers (MSPs)

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

Service Provider View of Cyber Security. July 2017

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

IBM Security Guardium Analyzer

Smarter Computing at Sogeti

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

COMPETITIVE EDGE IN THE CLOUD DRIVING GROWTH AND VALUE WITH ADAPTIVE DELIVERY, SECURITY, AND ACCELERATION

Copyright 2011 Trend Micro Inc.

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Angela McKay Director, Government Security Policy and Strategy Microsoft

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

Evolve Your Security Operations Strategy To Account For Cloud

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

IBM Internet Security Systems October Market Intelligence Brief

RSA INCIDENT RESPONSE SERVICES

Deploying a Next-Generation IPS Infrastructure

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

THE ACCENTURE CYBER DEFENSE SOLUTION

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

2018 Cyber Security Predictions

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Transcription:

WHITE PAPER IBM Cloud Internet Services: Optimizing security to protect your web applications Secure Internet applications and APIs against denialof-service attacks, customer data compromise, and abusive bots. Websites and applications require the resilience and intelligence of a scalable network to combat the biggest and newest attacks. It s important to ensure that performance is never sacrificed for security and that systems have easy setup and configuration, avoiding configuration errors which can introduce security vulnerabilities.

IBM Cloud Internet Services: Security 02 Contents 01 Increased security threats on the Internet 04 The CIS advantage 02 Attack vectors 03 Securing and managing cloud networks

IBM Cloud Internet Services: Security 03 A proliferation of security threats on the Internet As worldwide public, private, and hybrid cloud adoption accelerates and enterprise applications are born on the cloud, the scale and scope of the threats to Internet-facing applications, websites, and workloads has increased. Attackers are now more sophisticated, wellfunded, and motivated in exploiting vulnerabilities in the Internet-facing SaaS environments, thirdparty applications, and public APIs. With the proliferation of smartphones, the surface area for attackers has dramatically expanded, making the need for mobile security increasingly important. The steady drumbeat of data breaches and theft has prompted heightened scrutiny from public and government entities, resulting in more stringent privacy and data protection regulations. In an October 2017 report based on surveys conducted with 1,021 organizations 1, researchers found that attacks were prevalent and meant significant risks to revenue: Average cost of a US data breach: more than $7 million 76 percent reported two or more Distributed Denial-of-Service (DDoS) attacks in the previous 12 months 49 percent estimated a DDoS attack could cost more than $250,000 per hour

IBM Cloud Internet Services: Security 04 Attack vectors: In depth With increased security exposure, companies and governments must strengthen their defenses. The frequency and volume of DDoS attacks continues to increase as attackers quickly and effectively execute large scale volumetric attacks. They leverage systems vulnerabilities to create botnets and harness millions of unsecured Internet-of-Things (IoT) devices online. Stronger and more sophisticated attackers Application-layer (Layer 7) attacks are harder to detect, often requiring fewer resources to bring down a website or application and disrupt operations. Attackers can monetize their attempts to bring down sites or steal sensitive data, for example, by holding sites for ransom. These attackers are more motivated, organized, and pervasive due to successful ransom payouts by their targets. Greater attack surface area from more public APIs, moving to the cloud, an increasing third-party integrations

IBM Cloud Internet Services: Security 05 Secure Internetfacing applications Our powerful suite of cloud security services combines a security immune system with advanced cognitive computing. As a proven leader in enterprise security, IBM enables organizations to innovate while reducing risk. Built on Cloudflare technology, IBM Cloud Internet Services (CIS) is a new offering with a full security and performance services suite for IBM Cloud platform workloads. These services are easy to deploy and configure, protecting web applications from cyberattacks within minutes. IBM CIS simplifies security without sacrificing the breadth of protection that our clients expect. Best of all, management of our key capabilities is simple with an intuitive user interface, single API, and single sign-on. Key capabilities: Turnkey DDoS protection: Easily enabled and provides a powerful set of capabilities to mitigate volumetric, protocol, and application attacks Web application firewall for Application Layer (Layer 7): Security while traffic from specific source networks is blocked using the IP firewall Standards support and Secure DNS (DNSSEC): Latest encryptions ensure data security and privacy Rate limiting: To mitigate brute force password exploitation and DDoS attacks Log data availability: For integration with IBM Security analytics applications and solutions Mobile device security support: Protect your data on-the-go

IBM Cloud Internet Services: Security 06 The IBM Cloud Internet Services advantage Scale Available worldwide on IBM Cloud and utilizing Cloudflare s Anycast network of over 150+ global data centers across almost 60 countries, IBM Cloud Internet Services (CIS) is engineered to deliver the highest levels of security without sacrificing performance. By protecting over 7 million customer websites, Cloudfare developed powerful insights into emerging global threats and deploys new security rules worldwide within 30 seconds. IBM CIS customers benefit from these insights and rapid response times that mitigate risks that cause downtime and loss of revenue. Increased security without sacrificing performance Clients traditionally had to choose between security and performance, but IBM CIS increases application performance thanks to low-latency security services integrated with traffic acceleration. Because the IBM CIS security services integrate with traffic optimization services, like caching and smart routing, applications experience faster performance without running insecurely. Ease-of-use Use IBM CIS to secure your websites and web applications within minutes. A security solution that s easy for users and administrators to use goes beyond an intuitive interface it also contributes to improving a company s security posture. Research from Gartner suggests that 99 percent of firewall breaches through 2020 will be caused by simple firewall misconfigurations, not flaws. 2 A quality user experience reduces security risks from misconfiguration and improves agility in an ever-shifting threat landscape. This enables companies to scale security policy management to more employees that aren t security experts, reduce time to change and deploy new policies, and improve timely adjustments to the security posture of complex applications.

IBM Cloud Internet Services: Security 07 Conclusion Security in a dynamic, always-on threat landscape challenges organizations to leverage a layered defense approach. IBM CIS enhances the security posture for clients by protecting against the growing sophistication of DDoS attacks, data ransomware, or exfiltration caused by bad actors, malicious bots, and botnets. With just a few clicks on the IBM Watson and Cloud Platform portal, clients have access to quick and costeffective security. With security expert- validated blocking policies, IBM CIS reduces the risk of human errors and simplifies security without sacrificing performance. Compromise is yesterday s news. A better Internet experience awaits. Ready to get started? With our single portal and API, a faster, more secure Internet is a click away. In an era where the customer is king, businesses must rethink their strategies and harness the best available technology to win loyalty. Where the cloud succeeded in bringing businesses closer to their customers, it has proven to be a worthwhile investment.

IBM Cloud Internet Services: Security 08 Cloud security solutions for your workloads are available from IBM Cloud today To learn more, visit ibm.com/cloud/cloud-internet-services Copyright IBM Corporation 2018 IBM Corporation New Orchard Road Armonk, NY 10504 Produced in the United States of America February 2018 1. Bezsonoff, Nicolai, et. al., Neustar Global Attacks and Cyber Security Insight Report, October 11, 2017. 2. Gartner, Inc., One Brand of Firewall Is a Best Practice for Most Enterprises, Adam Hils and Rajpreet Kaur, June 5, 2017. IBM, the IBM logo, and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at www.ibm.com/ legal/copytrade.shtml