©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY1 Rob Pollock - Sr. Channel Sales Manager Bilal Javaid - Manager, Consulting Engineering, Central U.S. Data Connectors.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Security Life Cycle for Advanced Threats
© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
1www.skyboxsecurity.com Skybox Cyber Security Best Practices Three steps to reduce the risk of Advanced Persistent Threats With continuing news coverage.
Attackers Vs. Defenders: Restoring the Equilibrium Ron Meyran Director of Security Marketing January 2013.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Frederic Fleurat SIT mazagan 2014 Frederic Fleurat
David Flournoy Bit9 Mid-Atlantic Regional Manager
Microsoft Ignite /16/2017 4:54 PM
Arbor Multi-Layer Cloud DDoS Protection
Arbor Networks solutions
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Worldwide Infrastructure Security Report C F Chui, Arbor Networks.
2012 Infrastructure Security Report Darren Anstee, Arbor Solutions Architect 8 th Annual Edition.
Protecting Customer Websites and Web Applications Web Application Security.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Akamai Technologies - Overview RSA ® Conference 2013.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Empowering Organisations to Thrive in the Face of Cyber Attacks An introduction to Resilient Systems Paul Ayers – General Manager, EMEA Chris Neely - Director.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
How to Make Cyber Threat Intelligence Actionable
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Enterprise Network Security Threats that are Overlooked.
Protect your Digital Enterprise
OIT Security Operations
Rob Pollock, Sr. Channel Sales Manager
Juniper Software-Defined Secure Network
Cloud Firewall.
Data Center Firewall.
DDoS Attacks: The Stakes Have Changed. Have You?
Vikas Uberoy -Channel Director ANZ
Real-time protection for web sites and web apps against ATTACKS
Introduction to a Security Intelligence Maturity Model
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Skybox Cyber Security Best Practices
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Protect Your Ecommerce Site From Hacking and Fraud
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY1 Rob Pollock - Sr. Channel Sales Manager Bilal Javaid - Manager, Consulting Engineering, Central U.S. Data Connectors – San Antonio, TX May 5, 2016 MISCONCEPTIONS and FACTS ABOUT MODERN DAY DDoS ATTACKS and ADVANCED THREATS

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY2 WHO IS ARBOR NETWORKS? 100% Percentage of world’s Tier 1 service providers who are Arbor customers 107 Number of countries with Arbor products deployed 120 Tbps Amount of global traffic monitored by the ATLAS security intelligence initiative right now! #1 Arbor market position in Carrier, Enterprise and Mobile DDoS equipment market segments – [Infonetics Research June, 2015] Number of years Arbor has been delivering innovative security and network visibility technologies & products 15

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY3 COMMON MISCONCEPTIONS ABOUT DDOS ATTACKS (AND ADVANCED THREATS) I have adequate DDoS protection solutions in place. (my firewall, IPS, ISP) I have adequate DDoS protection solutions in place. (my firewall, IPS, ISP) Impact does not justify the cost of protection Impact does not justify the cost of protection DDoS is old news … I’m more concerned with Advanced Threats DDoS is old news … I’m more concerned with Advanced Threats The odds are we will NOT be attacked. The odds are we will NOT be attacked.

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY4 The odds are we will NOT be attacked. The odds are we will NOT be attacked. COMMON MISCONCEPTIONS ABOUT DDOS ATTACKS (AND ADVANCED THREATS)

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY5 DDoS Attacks Increasing in Size, Frequency and Complexity Fact: DDOS ATTACK TRENDS *Source: Arbor Networks 11 th Annual Worldwide Infrastructure Security Report (per month)

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY6 Cost of DDoS Service Impact to Victim It’s never been easier to launch a DDoS attack Many motivations behinds DDoS attacks Fact: ABILITY & MOTIVATIONS Source: Arbor Networks 11 th Annual Worldwide Infrastructure Security Report

THE GAZA STRIP CONFLICT  July 27 th : [Reuters] “UN Security Council Calls For Cease-Fire As Muslims Start Celebrating Eid al-Fitr” – there is a noticeable reduction in physical and DDoS attacks.  July 29 th : [Jewish Daily Forward] “The Palestinian Authority announced that it had brokered a 24-hour humanitarian cease-fire with all Palestinian factions with the possibility of extending it an additional 48 hours.”  August 1 st : [NY Times] “Gaza fighting intensifies as cease fire falls apart”  August 3 rd : Notice that the number of attacks rises again sharply. From July 28th through August 2nd, there were a total of 192 attacks. On August 3rd there were 268. Number of DDoS attacks launched per day where destination country is Israel Aug 3, 2014 Start of Conflict

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY8 FIFA WORLD CUP BRAZIL Over 60 World Cup related websites were attacked. Also threatened to take down sponsor sites.

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY9 FLINT MICHIGAN WATER CONTAMINATION  Michigan.gov website was attacked on Saturday, Jan. 16  Hurley Medical Center confirmed on Thursday, Jan 21 it was the victim of a "cyber attack" a day after Anonymous hacktivists threatened action over Flint's water crisis.

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY10 Cost of DDoS Service Impact to Victim It’s never been easier to launch a DDoS attack Many motivations behinds DDoS attacks Fact: ABILITY & MOTIVATIONS Source: Arbor Networks 11 th Annual Worldwide Infrastructure Security Report

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY11 I have adequate DDoS protection solutions in place. (my firewall, IPS, ISP) I have adequate DDoS protection solutions in place. (my firewall, IPS, ISP) COMMON MISCONCEPTIONS ABOUT DDOS ATTACKS (AND ADVANCED THREATS)

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY12 MISCONCEPTION: FIREWALL / IPS WILL STOP DDOS ATTACKS  DDoS attacks use legitimate packets and do not violate protocols rules – thus many go undetected by firewalls and IPS.  Because firewalls and IPS (load balancers, WAF) are required to track state, they are vulnerable to some DDoS attacks (e.g. HTTP/TCP SYN floods) – and routinely fail during attacks. Confidentiality Integrity Availability? Firewalls and IPS (load balancers, WAF etc.) are not designed to stop DDoS attacks.  Completing The Security Triad: Firewalls and IPS are designed for protecting Confidentiality and Integrity. You need purpose built DDoS protection products to protect Availability. Fact:

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY13 MISCONCEPTION: DDOS ATTACKS ARE NOT COMPLEX Dynamic combination of multi-vector attacks Legit Traffic Your (ISP’s) Network Your Data Centers The Internet Botnet State Exhaustion/ Application Attack State Exhaustion State Exhaustion Volumetric Attack Saturation Case Study: “Operation Ababil”  Lesson Learned: Targets who only had on- premises protection realized they also needed in-cloud protection …and Vice Versa. Fact:

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY14 STOPPING MODERN DAY DDoS ATTACKS Layered DDoS Attack Protection Stop application layer DDoS attacks & other advanced threats; detect abnormal outbound activity 2 2 Your Data Centers/Internal Networks The Internet Application Attack Scrubbing Center Your (ISP’s) Network or Cloud MSSP Stop volumetric attacks In-Cloud 1 1 Intelligent communication between both environments Backed by continuous threat intelligence Backed by Continuous Threat Intelligence Volumetric Attack A Recommended Industry Best Practice:

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY15 Impact does not justify cost of protection Impact does not justify cost of protection COMMON MISCONCEPTIONS ABOUT DDOS ATTACKS (AND ADVANCED THREATS)

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY16 INCREASING EXPOSURE DDoS is a world wide problem and any organization can be a target. Fact:

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY17 Over 230,000 cyber professional jobs unfilled TODAY in the US*… 1.5 million cyber jobs worldwide will be unfilled by INCREASED PRESSURE ON SECURITY TEAMS Fact: Source: Arbor Networks 10 th Annual Worldwide Infrastructure Security Report * NIST (National Institute of Standards and Technology)

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY18 Source: Arbor Networks 11 th Annual WISR Note: Most respondents didn’t answer this question because they didn’t know ! UNDER ESTIMATED IMPACT Bottom Line: These numbers must be customized for your environment Fact:  Lost Revenue  Operational Costs to Mitigate Attack  Brand repair  Regulatory Fees  Customer Credits  Lost productivity  Lost future business  Others? Dunn & Bradstreet Impact can be immediate & severe

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY19 DDoS is old news … I’m more concerned with Advanced Threats DDoS is old news … I’m more concerned with Advanced Threats COMMON MISCONCEPTIONS ABOUT DDOS ATTACKS (AND ADVANCED THREATS)

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY20 Cost of DDoS Service Impact to Victim It’s never been easier to launch a DDoS attack Many motivations behinds DDoS attacks Fact: ABILITY & MOTIVATIONS Source: Arbor Networks 11 th Annual Worldwide Infrastructure Security Report

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY21 DDOS AS SMOKESCREEN

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY22 THE GAME HAS CHANGED Advanced threats have evolved from advanced malware to attack campaigns. Attack campaigns are organized human to human campaigns, using multiple tools and techniques. Fact:

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY23 Did You Know? THINGS YOU SHOULD KNOW ABOUT ADVANCED THREATS Advanced attacks in 2015 used 7 or more toolkits, less than half exploited a critical vulnerability. …of advanced attacks in 2015 did not involve malware. Average dwell time of breaches is greater than 200 days. …of enterprises take longer than 3 days to investigate a critical security event Days 60% 40% 7+ Toolkits 20% …of all Advanced threat attacks involved DDoS

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY24 ARBOR’S DDOS & ADVANCED THREAT PROTECTION SOLUTION Target / Compromised Hosts Arbor Spectrum Comprehensive Protection, Proactive Investigation and Proof Armed with Global Visibility & Actionable Threat Intelligence

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY25 PREVENT/DETECTINVESTIGATE/PROVEFORENSICS SOLUTION COST TIME $$$$$$$$$$ SANDBOXFIREWALLENDPOINTIDS/IPSSIEM INTELLIGENCE END-POINT FORENSICS PACKET FORENSICS Recon Network Installation/Delivery Sandbox Command/Control Network Mission Complete Forensics Exploitation Network Lateral Movement Network Exfiltration Network STAGE 1STAGE 3STAGE 5STAGE 7 STAGE 2STAGE 4STAGE 6 ORCHESTRATED CAMPAIGN STAGES TRADITIONAL “DETECT AND RESPOND” STRATEGIES Security operations and incident response spend 80% of their time trying to determine if indicators created by “detect and prevent” security tools are real attacks. Fact:

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY26 INVESTIGATE/PROVE FORENSICS SOLUTION COST MANHOURS REQUIRED RISK IMPACT $ Improved $$ Limited END-POINT FORENSICS PACKET FORENSICS TO “PROACTIVE INVESTIGATION AND PROVE” STRATEGY Recon Network Installation/Delivery Sandbox Command/Control Network Mission Complete Forensics Exploitation Network Lateral Movement Network Exfiltration Network STAGE 1STAGE 3STAGE 5STAGE 7 STAGE 2STAGE 4STAGE 6 ATTACK CAMPAIGN STAGES With Arbor Spectrum Threat Intel Traffic Analysis Intuitive Workflows Arbor Spectrum PREVENT/DETECT SANDBOXFIREWALL ENDPOINTIDS/IPS SIEM INTELLIGENCE Limited $$$ $ $

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY27 THE INTERNET: ATLAS & ASERT IF 15 years of deployment in a majority of world’s ISPs offer unique visibility into global threats Over 300 ISPs participating in ATLAS; providing Global Visibility and Threat Intelligence ASERT is a team of industry experts who conduct threat research, help customer mitigate DDoS attacks and create ATLAS Intelligence Feeds ATLAS & ASERT continuously arm all Arbor products and services with global threat intelligence called ATLAS Intelligence Feed allowing customers to stay abreast of DDoS and advanced threats

©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY