Comprehensive datacenter protection
There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack are increasing in sophistication Customers have a variety of DDoS Protection solutions to choose from: Carriers and CDN s On-Premise Customer Premise Equipment (CPE) Cloud-based Services
Traditionally, data was secure inside the perimeter PERIMETER SECURITY Authorized User Managed Devices Apps Data Authorized Users Unknown Users Malicious Users DLP Firewall IPS
BIFURCATION OF FIREWALLS
Network Threats 25% of attacks are focused here 90% of security investment Source: Gartner
Application SSL DNS Network
Of companies reported application-layer DDoS threats, half experienced multi-vector attacks 64% Versign leverage multi-threat types Traditional approaches to defending against DDoS are designed for volumebased network-level attacks. Modern threats produce smaller volumes, and cover netwrok, authentication and application levels until they find a weak point to ensure the success of the attack. Additionally, adversaries are planting SSL-encrypted malware on compromised servers to evade network monitoring. Attackers easily go undetected without security tools that provide in-depth multi-layered defenses and behavioral analysis capabilities.
for comprehensive protection from the network through the application Network Protection Application Defenses SSL inspection DNS Security Silverline ON-PREMISES DDOS PROTECTION AND CLOUD SCRUBBING
On-premises and cloud-based services for comprehensive DDoS Protection F5 SILVERLINE DDOS PROTECTION When under attack F5 ON-PREMISES DDoS PROTECTION Turn on cloud-based service to stop volumetric attacks from ever reaching your network Multi-layered L3-L7 DDoS attack protection against all attack vectors 24/7 attack support from security experts Mitigate mid-volume, SSL, or application targeted attacks on-premises Advanced application DDoS attack protections Machine learning, intelligence and behavioral analysis
Next generation protection with comprehensive capabilities that rapidly defend against sophisticated L3-7 attacks. Blocks multi-layered DDoS to ensure availability of critical applications and the underlying infrastructure. Improves efficiencies and TCO by streamlining workflows, deployment and reducing timeto-mitigate
Unique simultaneous multi-vector threat protection Protects against simultaneous targeted multi-layered attacks Leverages advanced techniques like behavioral analysis, deep inspection, SSL decryption and more Discovers, and blocks malicious application bot traffic Integrates cloud overflow protection for infinite anti-ddos capacity Streamlines workflows and simplifies deployment
Customers ISPa DDoS Attack Layer 3-4 DoS mitigation Firewall Partners ISPb F5 DDoS Platform DDoS Attack Cloud Scrubbing Service Basic Layer 3 deployment inline in front of Firewall to protect against volumetric DDoS attacks.
Customers DDoS Attack ISPa Layer 3-4 DDoS mitigation Layer 7 DDoS mitigation SSL Termination Firewall Customers ISPb F5 DDoS Platform DDoS Attack Cloud Scrubbing Service Basic Layer 3 deployment inline in front of Firewall to protect against volumetric DDoS attacks and layer 7 application attacks. Requires SSL termination on the DDoS appliance Single box over sized appliance Configure for SSL flood with rate limiting
Customers DDoS Attack ISPa Tier 1 L3-4 DDoS mitigation Firewall Tier 2 L7 DDoS mitigation SSL Termination Customers ISPb F5 DDoS Platform F5 DDoS Platform DDoS Attack Silverline Basic Layer 3 deployment inline in front of Firewall to protect against volumetric DDoS attacks Layer 7 DDoS mitigation on the inside tier. Requires SSL termination on the DDoS appliance
Threat Intelligence Feed Next-Generation Firewall Corporate Users Scanner Anonymous Proxies Anonymous Requests Botnet Attackers Cloud Network Application Multiple ISP strategy Network attacks: ICMP flood, UDP flood, SYN flood SSL attacks: SSL renegotiation, SSL flood Financial Services Legitimate Users DDoS Attackers Cloud Scrubbing Service Volumetric attacks and floods, operations center experts, L3-7 known signature attacks ISPa/b DNS attacks: DNS amplification, query flood, dictionary attack, DNS poisoning Network and DNS HTTP attacks: Slowloris, slow POST, recursive POST/GET Application E-Commerce Subscriber Proactive Hybrid Reactive Hybrid Silverline is always on and the first point of detection and mitigation for volumetric attacks before traffic is passed to the datacenter. AFM alerts Silverline and traffic is diverts traffic for cloud-based mitigation when the datacenter is under volumetric attack IPS Strategic Point of Control
Only true multi-layered DDoS defense F5 DDoS Hybrid Defender Most comprehensive single box defense Full SSL decryption capabilities Sophisticated app attack protection surpassing competitive solutions Most flexible deployment options Uniquely integrated cloud scrubbing & next generation appliance protection Fastest time-to-mitigate for volumetric and blended attacks Best in value and overall price/performance Proven security with the most reliable protections Scales to the highest levels where other solutions fail
Cloud-based service customer benefits Keep your business online during a DDoS Attack Protect your business F5 Silverline DDoS Protection Protect against the largest of DDoS attacks Multi-layered, comprehensive L3-L7 protection Industry-leading attack mitigation bandwidth per customer Security Operations Center Protect against all DDoS attack vectors Access to DDoS experts 24x7x365 F5 customer portal Gain attack mitigation insights
Always On Primary protection as the first line of defense Stops bad traffic from ever reaching your network Continuously processes all traffic through the cloud-scrubbing service Delivers only legitimate traffic to your website Always Available Primary protection available on-demand Runs on stand-by Initiates when under DDoS attack Mitigates your traffic on arrival
Detailed visibility into policies and attacks Logging Generation and Storage of Individual Security Events Configure local and remote high-speed network firewall logging Independently controlled Logging for Access Control, DoS, IP-Intel Log Destinations & Publishers consistent with BIG-IP logging framework Reporting Visualization of Security Statistics Reporting used for Visualizing Traffic/Attack Patterns over time Geo & IPFIX & Stale Rules reporting Access-Control & DoS: Drill-Downs by contexts, IP, Rule, etc. Integration with 3rd party SIEM systems Report type HIPPA & PCI compliance reporting DDoS attack report IP Enforcer stats
6000+ Unique statistics >1M Log messages / sec 100 % See all security violation details