Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

Similar documents
A Top US Bank Trusts Neustar SiteProtect for Reliable DDoS Protection Depth

Neustar Security Solutions Overview

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

WHITE PAPER Hybrid Approach to DDoS Mitigation

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

AKAMAI CLOUD SECURITY SOLUTIONS

Arbor White Paper Keeping the Lights On

DDoS MITIGATION BEST PRACTICES

Securing Your Amazon Web Services Virtual Networks

The Interactive Guide to Protecting Your Election Website

SUPERCHARGE YOUR DDoS PROTECTION STRATEGY

Internet2 DDoS Mitigation Update

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

NINE MYTHS ABOUT. DDo S PROTECTION

Securing Your Microsoft Azure Virtual Networks

Additional Security Services on AWS

Enterprise D/DoS Mitigation Solution offering

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

Magento Commerce Architecture and Security Model Last updated: Aug 2017

Cyber Attacks: Evolving Network Architectures to Meet the Challenge

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE

Imperva Incapsula Product Overview

WHITE PAPER. Best Practices for Web Application Firewall Management

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Cisco Firepower with Radware DDoS Mitigation

Pulse Secure Application Delivery

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

2020: Time to Shutdown DDoS?

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

FIREWALL BEST PRACTICES TO BLOCK

Deploying a Next-Generation IPS Infrastructure

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Demanding More From Your Enterprise CDN

THE ACCENTURE CYBER DEFENSE SOLUTION

A10 DDOS PROTECTION CLOUD

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

THE UTILITY OF DNS TRAFFIC MANAGEMENT

Business Strategy Theatre

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

Secure your Web Applications with AWS WAF & AWS Shield. James Chiang ( 蔣宗恩 ) AWS Solution Architect

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

DDoS Introduction. We see things others can t. Pablo Grande.

IoT Security for the Enterprise

Arbor Solution Brief Arbor Cloud for Enterprises

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

Best Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

Downtime by DDoS: Taking an Integrated Multi-Layered Approach. Arbor Solution Brief

Anti-DDoS. FAQs. Issue 11 Date HUAWEI TECHNOLOGIES CO., LTD.

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Deploying a Next-Generation IPS Infrastructure

DoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors

A Ready Business rises above infrastructure limitations. Vodacom Power to you

Intelligent and Secure Network

Beyond Blind Defense: Gaining Insights from Proactive App Sec

BUILDING A NEXT-GENERATION FIREWALL

SIEMLESS THREAT DETECTION FOR AWS

Analisi degli attacchi DDOS e delle contromisure

Security Automation Best Practices

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Cyber War Chronicles Stories from the Virtual Trenches

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

10 Hidden Costs of a Premises-based Phone System

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

Kaspersky Security. The Power to Protect Your Organization

Building a Self-Defending Border. Shane Baldacchino, Solutions Architect, AWS Marcus Santos, Solutions Architect, AWS

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Cloudflare Advanced DDoS Protection

Protect Against Evolving DDoS Threats: The Case for Hybrid

8 Must Have. Features for Risk-Based Vulnerability Management and More

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Comprehensive datacenter protection

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

Cloud-based architectures help Discovery Networks International plan for growth and changing business needs

Distributed Denial of Service (DDoS)

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

A GUIDE TO DDoS PROTECTION

Stakeholders Analysis

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Combating Cyberattacks Through Network Agility and Automation Sagi Chief Technology Officer

Services solutions for Managed Service Providers (MSPs)

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

Transcription:

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help. www.home.neustar

02 Think You're Safe from DDos Attacks?

Table of Contents Myth: Being on AWS Means You Have DDoS Protection 04 Without the Right Protection, You Could Be Down for Hours 06 An AWS Technology Partner, Neustar Can Protect You 08 Our Promise: Fully Managed and Affordable DDoS Protection 09 What's in Your Cloud? It's Well Worth Protecting 11 About Neustar 12 Think You're Safe from DDos Attacks? 03

Think You're Safe from DDos Attacks? MYTH Being on AWS Means You Have Some DDoS Protection Amazon Web Services is the world s top cloud platform. That s probably why you re on it to enjoy reliable, scalable and affordable cloud computing. But while AWS excels at many things, it s mainly left to the developer to protect against a range of cyber-attacks, including DDoS. In fact, AWS does NOT have customer-specific DDoS detection or prevention. Unless you re paying for Enterprise Support, AWS may not be able to help you in the event of a DDoS attack. You re responsible for fending off threats. In AWS EC2, clients must protect their content from malicious activity, including DDoS. Firewalls, WAFs, IPS/IDS are not built to stop widely distributed attacks. To stop DDoS in particular, you need purposebuilt protection on top of intrusion and fraud prevention systems. 04

DDOS ATTACKS ARE GETTING WORSE 2-3 Tbps 1+ Tbps 1.2 Tbps 500+ Gbps 650 Gbps 256 Gbps 2015 Largest average attack Aug 31, 2016 Attack against Olympic websites Sept 16, 2016 Attack against Brian Krebs (Security Blog) Sept 19, 2016 Attack against OVH (French ISP) Oct 21, 2016 Attack impacted large DNS Provider Projected 2017 and beyond 2016 attacks driven by malware-infected IoT device botnets 11 million + infected IoT devices Attacks targeting individual organizations as well as DNS providers Think You're Safe from DDos Attacks? 05

Think You're Safe from DDos Attacks? Without the Right Protection, You Could Be Down for Hours Botnets can range in the thousands of computers, too many to block manually with a firewall. If you re an AWS client with Developer-level support, their guaranteed response time is <12 hours. If you have Businesslevel support, it s <1 hour. You could be down for an hour before AWS even responds to your trouble ticket. One major problem: your AWS Elastic Load Balancer (ELB) doesn t scale instantaneously, leaving you vulnerable to fast-ramping DDoS attacks. Likewise, EC2 instances don t scale on a dime. If DDoS hits, AWS response times range from: <12 hours for Developerlevel support <1 hour for Businesslevel support And that s just to respond, not resolve. 06

Think You're Safe from DDos Attacks? 07

Think You're Safe from DDos Attacks? As an AWS Technology Partner, Neustar Can Protect You Neustar offers powerful and flexible options for DDoS protection. Thousands of domains, business and governments worldwide rely on Neustar to protect their online assets. We re compatible with AWS EC2 instances and guard your ELBs. Neustar SiteProtect, our cloud-based DDoS protection solution, is fully compatible with AWS EC2 instances and elastic load balancers (ELBs). ELBs are great at auto-scaling, if demand rises at a reasonable rate or at known intervals. However, a DDoS attack can overwhelm an ELB before it can scale, resulting in 503 errors and loss of availability. Neustar will rescue your ELB by redirecting traffic to our scrubbing cloud. 08

OUR PROMISE Fully Managed and Affordable DDoS Protection Neustar s 24x7 Security Operations Center (SOC) manages all mitigations. After creating a unique profile of your network traffic, the SOC guarantees it can restore normal service to your cloud computing instance within minutes. Neustar even supports custom protocols. We never charge by attack size. A predictable monthly fee based on normal traffic adds up to affordable protection. Other DDoS providers charge more for larger attacks. As Neustar continues to put down attacks of more than 500 Gbps, with some peak sizes exceeding 700 Gbps, protecting your budget is important, too. Expertise to block all types of DDoS attacks. Neustar guards against all Layer 7 DDoS attacks like Object Request floods and slow and low attacks and will block malicious hosts. Neustar can also provide AWS Best Practices to help insulate AWS instances from DDoS. Think You're Safe from DDos Attacks? 09

10 Think You're Safe from DDos Attacks?

What s in Your Cloud? It s well worth protecting. Think of Neustar SiteProtect as an insurance policy against DDoS. You hope you don t need it, but it s there in case you do. It s also much more effective than old-school approaches. Remember, firewalls aren t designed to stop DDoS attacks. And blocking individual IP addresses on a large scale can be a nightmare for systems administrators. What if you block a wireless gateway or proxy server? You may be stopping thousands of legitimate users from accessing your site. Let the experts at Neustar stop attackers in their tracks, so you can focus on what you do best taking care of business. How We Can Help Make sure you re covered for DDoS. Contact us at 1.855.727.1209, email us at sales-aws@neustar.biz, or visit www.neustar.biz/services/ddos-protection. Think You're Safe from DDos Attacks? 11

About Neustar. Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar (NYSE: NSR) isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. As one of the few companies capable of knowing with certainty who is on the other end of every interaction, we re trusted by the world s great brands to make critical decisions some 20 billion times a day. We help marketers send timely and relevant messages to the right people. Because we can authoritatively tell a client exactly who is calling or connecting with them, we make critical real-time responses possible. And the same comprehensive information that enables our clients to direct and manage orders also stops attackers. We know when someone isn t who they claim to be, which helps stop fraud and denial of service before they re a problem. Because we re also an experienced manager of some of the world s most complex databases, we help clients control their online identity, registering and protecting their domain name, and routing traffic to the correct network address. By linking the most essential information with the people who depend on it, we provide more than 11,000 clients worldwide with decisions not just data. More information is available at www.home.neustar 2017 Neustar, Inc. All rights reserved. All logos, trademarks, servicemarks, registered trademarks, and/or registered servicemarks are owned by Neustar, Inc. All other logos, trademarks, servicemarks, registered trademarks, and registered servicemarks are the property of their respective owners. EB-SEC-69278-04.11.2017