Radware: Anatomy of an IoT Botnet and Economics of Defense

Similar documents
Cisco Firepower with Radware DDoS Mitigation

Pushed to the Limit! Network and Application Security Threat Landscape Lior Zamir Technical Account Manager

Pushed to the Limit! Network and Application Security Threat Landscape January 2018

Orange: Cisco & Orange: a human touch for a digital experience

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

NXOS in the Real World Using NX-API REST

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.

WHITE PAPER Hybrid Approach to DDoS Mitigation

Cisco Enterprise Agreement

NetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures

Securing Your Most Sensitive Data

Cisco Cyber Threat Defense Solution 1.0

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cyber War Chronicles Stories from the Virtual Trenches

IBM Cloud Internet Services: Optimizing security to protect your web applications

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Cisco Firepower NGIPS Tuning and Best Practices

Synchronized Security

Using Workload Automation to Optimize Hybrid Cloud Estates

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Cisco Spark. Questions? Use Cisco Spark to communicate with the speaker after the session. How

Cisco Security Exposed Through the Cyber Kill Chain

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco ASA with FirePOWER services Eric Kostlan, Technical Marketing Engineer Security Technologies Group, Cisco Systems LABSEC-2339

Cisco DNA Center and Italtel Netwrapper Evolution: Network and Applications come together

Drive Greater Value from Your Cisco Deployment with Radware Solutions

Is your IT Infrastructure Ready for Machine Learning & Artificial Intelligence?

Building a Threat Intelligence Program

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers

haltdos - Web Application Firewall

Stop Threats Before They Stop You

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

FirePower 2100 NGFW. Elodie Heurtevent Security BDM Commercial. 21 March 2017

Introducing Cisco Network Assurance Engine

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

CloudCenter for Developers

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

Gladiator Incident Alert

INVESTOR PRESENTATION

Threat Centric Network Security

Cybersecurity. Securely enabling transformation and change

Multi-vector DDOS Attacks

Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention

Corero & GTT DDoS Trends Report Q2 Q3 2017

Real time Location Services Overview and Use cases

How DDoS Mitigation is about Corporate Social Responsibility

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

DDoS Detection&Mitigation: Radware Solution

Cisco Firepower Thread Defence. Claudiu Boar

Business Strategy Theatre

A Guide to Ensuring Security and Resiliency

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Sourcefire Network Security Analytics: Finding the Needle in the Haystack

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Cyber Security Updates and Trends Affecting the Real Estate Industry

BGP in the Enterprise for Fun and (fake) Profit: A Hands-On Lab

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017

Your API Toolbelt Tools and techniques for testing, monitoring, and troubleshooting REST API requests

Cisco Tetration Analytics

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Cloud Mobility: Meraki Wireless & EMM

with Advanced Protection

2018 Cyber Security Predictions

Service Provider Security Architecture

Sales Presentation Case 2018 Dell EMC

AKAMAI CLOUD SECURITY SOLUTIONS

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

PSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco

The Artificial Intelligence Revolution in Cybersecurity

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN

AMP for Endpoints & Threat Grid

TRex Realistic Traffic Generator

Hands-On with IoT Standards & Protocols

Arbor White Paper Keeping the Lights On

Cisco Systems Korea

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Delivering HCI with VMware vsan and Cisco UCS

HEALTH CARE AND CYBER SECURITY:

Cisco Spark Messaging APIs - Integration Platforms as a Service Real World Use-Cases

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

Service Provider View of Cyber Security. July 2017

Use Cases. E-Commerce. Enterprise

Cisco Solution Support

Cisco Start. IT solutions designed to propel your business

Transcription:

BRKPAR-4000 Radware: Anatomy of an IoT Botnet and Economics of Defense Eric Grubel

Anatomy of an IoT Botnet and Economics of Defense Eric Grubel VP, Business Development January 2018

Theme of Discussion Today Time is Money

5 About Radware Financial Services Market Leader in Application Availability solutions 7/14 Top Stock Exchanges 12/22 Top Commercial Banks Awarded Best Managed Security Service 2016 Enterprise, Retail & Online Businesses 1/5 Top Brand in Every Key Vertical >$200M Revenue Carriers, Service & Cloud Providers 3/7 Top Cloud Service Providers 6/10 Top Carriers

6 Biggest Business Concern If Faced w/a Cyber-Attack Data loss followed by reputation loss were the biggest concerns related to cyber-attacks. Fewer were concerned with revenue loss this year, compared to 2016. Data Leakage/ information Availability / SLA Degradation Reputation loss Revenue loss Customer / partner loss Productivity loss 17% 13% 10% 10% 23% 28% 0% 5% 10% 15% 20% 25% 30% What is your concern if faced with a cyber-attack?

7 Vertical Highlights 40 % Of retailers report bot traffic above 75% of total 42% 31 % Of education institutes actually fear availability issues, over data theft or reputation loss Of service providers intend to invest in DDoS mitigation in 2018 24 % Of government and public sector organizations suffer attacks daily 73 % Of healthcare s express low to medium confidence in securing patient records 44 % Of financials do not track the dark web after a data security breach

8 Security Measures Following Attacks (2017) In general, customers are not holding organizations responsible for cyber-attacks Customers filing lawsuits following data breaches or DDoS downtime are more common in APAC DDoS downtime Data breach 13% 5% 12% 9% 10% 11% 70% 70% Customers asking for compensation Lawsuits Malware contamination and propogation 9% 7% 9% 75% 0% 20% 40% 60% 80% 100% Q.19b: Have any of your customers taken any measures because of any of the following attacks against your organization?

9 Modern Day Bots: IoT-Based Botnets IoT is the birthplace for new type of bots and malwares. Unsophisticated, yet very efficient and lethal. Mirai Hajime BrickerBot

10 IoT Botnets - Modus Operandi Taking advantage of factory flaws to infect Identify the device Upload the matching binary Drop the payload Remove other malware Scan for more devices Infection vectors: SSH/Telnet brute force TR-069 protocol Manufacturer backdoors

11 Failure Points in the Data Center Internet Pipe Saturation incidence grew 50% from 2016 Servers are compromised the most - as they keep the lucrative data 40% growth in complete outages over mere service degradation 37 % Internet pipe (Saturation) 17 % Firewa ll 6% 4% Load 35 The Serve Balancer % r (ADC) Unde IPS/IDS r Attac k 1% SQL Server Internet Pipe Firewall IPS/IDS Load Balancer/ADC Server Under Attack SQL Server

12 Cisco transforms security service integration Integrated Radware Virtual DefensePro (vdp) in-line DDoS mitigates attacks Available on Cisco Firepower 4100 / 9300 series Lower latency than a stand-alone DDoS solution Consolidation with simplified support and procurement Fully automated solution Data Packe t 1001 0001011 1100010 1110 URL DDoS SSL FW NGIPS AMP Filtering Maximum Protection Unified Threat Platform with Integrated Security Low Latency Scalable processing Key: Cisco Service 3 rd Party Service

13 Stay Focused. Be Prepared. Consolidate and automate Elastic, unified systems against multiple threats. Fight fire with fire AI based solutions to mitigate advanced cyberweapons. Hope for the best, Prepare for the worst Study new technologies, have an ER plan. Don t be the next Equifax. Build your protection strategy.

Thank You Eric Grubel VP, Business Development eric.grubel@radware.com

Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Complete Your Online Session Evaluation Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at www.ciscolive.com/global/on-demand-library/. 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Tech Circle Meet the Engineer 1:1 meetings Related sessions BRKPAR-4000 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

Thank you