Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Similar documents
War Stories from the Cloud: Rise of the Machines. Matt Mosher Director Security Sales Strategy

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

The Presence and Future of Web Attacks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

Multi-vector DDOS Attacks

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

IBM Cloud Internet Services: Optimizing security to protect your web applications

Intelligent and Secure Network

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

akamai s [state of the internet] / security

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

Innovation in the Cloud: How to Grow Markets, Reduce Risks, and Improve the Customer Experience

Global DDoS Threat Landscape

Preparing your network for the next wave of innovation

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

DDoS attack patterns across the APJ cloud market. Samuel Chen CCIE#9607 Enterprise Security Architect, Manager - APJ

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

Prolexic Attack Report Q4 2011

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Distributed Denial of Service (DDoS)

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

2015 VORMETRIC INSIDER THREAT REPORT

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Sales Presentation Case 2018 Dell EMC

The Windstream Enterprise Advantage for Banking

MULTIPLAYER GAMING SOLUTION BRIEF

Analisi degli attacchi DDOS e delle contromisure

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Cyber War Chronicles Stories from the Virtual Trenches

( ) 2016 NSFOCUS

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

Opportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies

IBM Rational Software

Disaster Recovery Is A Business Strategy

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

AKAMAI THREAT ADVISORY. Satori Mirai Variant Alert

August 14th, 2018 PRESENTED BY:

CABLE MSO AND TELCO USE CASE HANDBOOK

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

Arbor White Paper Keeping the Lights On

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Global Information Security Survey. A life sciences perspective

Hongbo Yang, Xiaobing Sun, Richard Zhao

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Cisco Firepower with Radware DDoS Mitigation

and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

Angela McKay Director, Government Security Policy and Strategy Microsoft

Welcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date

Corero & GTT DDoS Trends Report Q2 Q3 2017

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

DDoS Detection&Mitigation: Radware Solution

Service Provider View of Cyber Security. July 2017

Pushed to the Limit! Network and Application Security Threat Landscape Lior Zamir Technical Account Manager

WHITE PAPER Hybrid Approach to DDoS Mitigation

Securing Digital Transformation

Express Monitoring 2019

The Trusted Choice for Online Business

Retail Security in a World of Digital Touchpoint Complexity

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

Mitigating DDoS Attacks in Zero Seconds with Proactive Mitigation Controls

DDoS MITIGATION BEST PRACTICES

Radware: Anatomy of an IoT Botnet and Economics of Defense

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

What is an application delivery controller?

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Cybersecurity. Securely enabling transformation and change

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

DIGITAL TRUST Making digital work by making digital secure

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Endpoint Protection : Last line of defense?

SECURE YOUR APPLICATIONS, SIMPLIFY AUTHENTICATION AND CONSOLIDATE YOUR INFRASTRUCTURE

Emerging Technologies The risks they pose to your organisations

Keys to a more secure data environment

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Transcription:

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile Business devices and Continuity data collection. & Cybersecurity Anna Chan, Marketing Director, Akamai Technologies 1

Instant Web performance for any device, anywhere The ultimate in video quality over IP at scale The Web must be secure Fast, affordable IP access in the workplace and branch office 2 2016 2014 AKAMAI FASTER FORWARD TM

We are the leading provider of cloud services for delivering, optimizing and securing online content and business applications. Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile CORPORATE devices STATS: and data collection. $2.2B Revenue 6,000+ Employees 6,000+ Customers 1,400 Locations OUR HISTORY: Founded 1998 and rooted in MIT technology solving Internet congestion with math not hardware. 20mil Servers 3 2016 2014 AKAMAI FASTER FORWARD TM

WEB PERFORMANCE SOLUTIONS Accelerate websites to grow revenue and conduct business globally on any device, anywhere MEDIA DELIVERY SOLUTIONS Simplify workflow and deliver the highest quality media affordably and at scale AKAMAI SOLUTIONS Grow revenue opportunities with fast, personalized web experiences CLOUD and NETWORKING manage complexity from peak demand, mobile devices SOLUTIONS and data collection. SOLUTIONS CLOUD SECURITY SOLUTIONS Secure websites and data centers to reduce the risk of downtime and data theft Transform the enterprise network to accelerate applications, lower costs, and connect to clouds NETWORK OPERATOR Optimize network traffic, enable new revenue streams and control costs SERVICES & SUPPORT 4 2016 2014 AKAMAI FASTER FORWARD TM

Santa Clara, CA San Francisco, CA Web, Media, Cloud Networking, Security, Portal San Diego, CA Pasadena, CA Media Ottawa, Canada Web Cambridge, MA Westford, MA Web, Media, Hybrid Cloud, Security, Carrier, Portal Fort Lauderdale, FL Security Prague Media Poland Portal Grow revenue opportunities with fast, personalized Israel web experiences Web, Security, and Cloud manage complexity from peak Networking demand, mobile devices and data collection. India Portal, Security Building the Internet of the future Development Centers Of Excellence 5 2016 2014 AKAMAI FASTER FORWARD TM

Empowering our customers to innovate 1. List compiled by Fortune Magazine 6

Topics What is Happening at the Consumer Landscape How has Security Threats Evolved The definition of Business Continuity 7

Topics What is Happening at the Consumer Landscape How has Security Threats Evolved The definition of Business Continuity 8

Topics Results from a Hong Kong Survey, October 2015 9

Q1. Which device drives the most traffic to your website? 0% 52% 48% Desktop Mobile Tablet 10

Q2. What percentage of your total retail revenue is influenced by mobile? (that is, was mobile used as some point to research, compare or buy a product or service)? 40% 35% 30% 25% 20% 15% 10% 5% 0% 36% 36% 14% 9% 5% 0-20% 21-40% 41-60% 61-80% 80%+ 28% 11

Q3. How are you using social media? 77% Drive Revenue Drive BOTH 0% 23% Do Not Use Drive Traffic 12

Q4. Have you experienced any downtime issues this year due to heavy traffic or malicious cyber attacks? Yes, it has been down: 50% 45% 40% 35% 30% 25% 20% 47% 25% 15% 10% 5% 19% 9% 9% 16% 0% Never Once 2 Times 3 Times > 3 Times 13

Q5. What do you believe is the biggest impact of your site going down? 70% 60% 50% 40% 30% 61% 20% 39% 10% 0% 0% 0% Negative Brand Image Loss of Revenue Penalties No impact 14

It all starts with the Customer Akamai Customers: Up to 80% Branch ATM Call Center Desktop Mobile 1-2 time 3-5 times 4-8 times 7-10 times 20-30 times per year per month per month per month per month 15 Source: Bank 3.0, Brett King; Akamai customers

User Expectations in a Digital World Your customer s expectations: Service Always On! Commerce and mobile experiences Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Financial services consumer and mobile experiences 16

Consumer Trends Put Pressure on Business & Service Continuity The Internet is Ubiquitous and Multi Device Akamai Intelligent Platform Users expect performance on any device anywhere Device and browser fragmentation drives complexity Users demand fast and engaging web experiences We no longer go online, we are online 17

Service Levels Affects Revenue and Conversions Sharp decline in conversion rate as average site load time increases from 1 to 4 seconds 1 second delay = 7% decline in conversion 100 millisecond delay = 1% drop in revenue 18 Walmart Page Performance & Site Conversion Study - Feb 2012

Business Continuity = Service Level = Customer Satisfaction 10.7 Page Load Time (Seconds) 6.6 7.2 Average page load time 2012 2013 2014 Users willingness to wait Source: httparchive.org, Akamai, Radware 54% of visitors who applied for an online banking account abandon the process 19

Topics What is Happening at the Consumer Landscape How has Security Threats Evolved The definition of Business Continuity 20

Security Breaches in Hong Kong are On the Rise Headline Daily, 15 Sep 2015 62.5% of mobile apps for Securities have breaches 34% of mobile apps are 55% vulnerable of mobile apps for eshopping/tourism to hackershave breaches 12.5% of mobile apps for Online banking have breaches 21

HK Standard 15/09/2015 SCMP 15/09/2015 22

Latest DDoS Incidents Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 23

Latest Data Breach Incidents 24

State of the Internet Security Report, Q3 2015 www.stateoftheinternet.com/security-report 25

DDoS Attacks 26

DDoS Attacks 27

Web Application Attacks 28

Web Application Attacks 29

Attacks Are Growing in Size Traditional DDoS attacks harness the scale of global botnets Newer attacks target protocol vulnerabilities to amplify size SNMP (6.3x) 2014 320 270 DNS (28x-54x) CharGEN (358.8x) NTP (556.9x) 2013 190 144 Gbps Mpps 2005 11 2 2006 18 8 2007 22 11 2008 39 15 2009 48 29 2010 68 38 2011 79 45 2012 82 69 30 2016 2015 AKAMAI FASTER FORWARD TM

Organizations Are Being Attacked More Frequently Increasing number of network- and application-layer attacks Easier for attackers to launch or participate in an attack Knowledge of application vulnerabilities spreading Number and availability of attack tools proliferating DDoS for hire 2013 2014 2012 2010 2011 991 1317 2002 2936 5634 31 x1000 Source: Akamai 2016 AKAMAI FASTER FORWARD TM

Targeting Applications for Data Theft Increasing number of attacks focused on data and financial theft Web applications are a primary target due to number of vulnerabilities 3 out of 4 companies will be targeted by Web application exploits Web apps targeted in 54% of hacking-based data breaches SQL injection is the primary culprit in 30% of data breaches 32 Source: Veracode

Top Threats (2012 2015) --Business Continuity Institute Horizon Scan Report 2015 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 33

Topics What is Happening at the Consumer Landscape How has Security Threats Evolved The definition of Business Continuity 34

Business Continuity: A Game Changer Service Disruption System Downtime Negative Financial Impact 35

Business Continuity: Making It a Game Changer Service DisruptionBusiness Opportunity System Downtime Negative Financial Customer Impact Satisfaction 36

DNS DDoS - Hong Kong Persistent Attack (June/July 2014) Attack Waves over multiple days (still ongoing) Peak 90 Gbps, 45Mpps, 2.3M DNS req/sec Attack Pattern DNS Volume TCP SYN Floods UDP Floods Malformed DNS Malformed IP 37

Web Apps DDoS - 320 Gbps attack in Asia (Q3 2014) Largest attack ever mitigated by Akamai against a single customer DDoS Attack: Targeted primary website, supporting network infrastructure, and DNS Multiple attack vectors: SYN / UDP floods against an entire subnet Volumetric attack against DNS DNS Attack: Attack characteristics: 320 Gbps and 71.5 Mpps peak DDoS attack traffic 2.1 million requests/s peak DNS attack traffic Point to ponder: 17 x 100Gbps attacks July to Sept to one single target 38

China Singles Day (11.1) (Nov, 2015) 39

Future Trends Change of consumer behaviour and Internet of Things (IoT) will lead to increase in attack size & frequency. IPv6 provides many more addresses, making it is easier to spoof, while breaking many existing security controls. Further spread and growth of DDoS cybercrime ecosystem. More active campaigns related to social unrest, geopolitical rivalries and state sponsored attacks. 40 Increase in payload complexity and multi-vector attack campaigns.

Advice for Today s Companies 41

Thank you! Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. achan@akamai.com www.akamai.com/trynow 42