Improving Resilience and Performance in Light of Recent Internet Outages Troy Whitney – Manager, Solutions Engineering.

Slides:



Advertisements
Similar presentations
Hello i am so and so, title/role and a little background on myself (i.e. former microsoft employee or anything interesting) set context for what going.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
John Whittle Sales Specialist Case Study: Manage Transactions Across the Enterprise Featuring BMC Middleware Management.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
DIRECT-TO-CLOUD Issues & Implications Dale McCarty.
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
Network Techlab (India) Pvt. Ltd.
Building Sustainable MIS Infrastuctures
Effectively Explaining the Cloud to Your Colleagues.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
IPv4 TO IPv6 TRANSITION AND INTEROPERABILITY FOR TELECOM SERVICE PROVIDER Business Problem In today’s environment of growing connectivity where almost.
Exploring the Network.
Module 2: Creating Efficient Replication Solutions.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Chapter 1: Explore the Network
Cybersecurity concerns persist Global attacks are increasing and costs are rising 4 Cybercrime extracts between 15% and 20% of the value created by.
Primary and Backup Connectivity. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or.
Azure-Powered Solution to Monitor, Manage and Backup Servers and Websites Lets Users Keep Control of IT Infrastructure and Prevent Downtime MICROSOFT AZURE.
Chapter 1: Explore the Network
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Direct-to-cloud Issues & Implications Dale McCarty.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 1: Explore the Network
Chapter 6: Securing the Cloud
Chapter 1: Exploring the Network
Decoding Major Internet Outages in 2017
Optimize your network for the cloud
IOT Critical Impact on DC Design
Microsoft Operations Management Suite Insight and Analytics
Cybersecurity BGP hijacking DDoS Botnets What’s next?
Boomerang Adds Smart Calendar Assistant and Reminders to Office 365 That Increase Productivity and Simplify Meeting Scheduling OFFICE 365 APP BUILDER.
Chapter 1: Explore the Network
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
CCNET Managed Services
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Veeam Backup Repository
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
CompTIA Security+ Study Guide (SY0-401)
What Do We Do? Managed IT services
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
2018 Real CompTIA N Exam Questions Killtest
Determined Human Adversaries: Mitigations
Audit Plan Michelangelo Collura, Folake Stella Alabede, Felice Walden, Matthew Zimmerman.
Is Your Online Security Intelligent? Internet Performance Management
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
PostBeyond Delivers an Enterprise Solution That Strengthens Communications with Employees and Integrates Seamlessly with Microsoft Office 365 OFFICE 365.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
AKAMAI INTELLIGENT PLATFORM™
The Challenges of DNS Resolution in China Tim Hale, Solutions Engineer.
Business Contingency Planning
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
Emerging technologies-
Introduction to Network Security
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Determined Human Adversaries: Mitigations
Amazon Web Services.
Cloud Security AWS as an example.
Cloud Security AWS as an example.
AT&T Dedicated Internet (ADI)
Microsoft Virtual Academy
Presentation transcript:

Improving Resilience and Performance in Light of Recent Internet Outages Troy Whitney – Manager, Solutions Engineering

We now live in an Internet-centric IT world Employee Productivity Business Operations DDoS Attack Cloud Outages Customer Experience

So what’s changed? Everything. INTERNET Data Center ‘Private’ circuits connect the corporate WAN through Internet Service Providers Branch

Cloud data centers host business critical apps INTERNET Data Center Apps Applications hosted in the cloud or remote data centers Branch

Direct Internet Access connects branches Data Center Apps Direct Internet connectivity to cloud services and software-defined routing between branches Branch

Wireless is everywhere INTERNET Data Center Apps Wireless is the primary connection at the branch Branch

And employees work where convenient INTERNET Data Center Apps Home Employees access applications from home and on the road Branch

Managed DNS is a linchpin of service delivery DNS services are managed by external providers INTERNET Data Center Apps Home Branch

CDNs and DDoS mitigation act as intermediaries CDNs offload traffic, filter attacks and reduce latency CDN / DDoS Mitigation DNS INTERNET Data Center Apps Home Branch

IaaS has become your additional data center CDN / DDoS Mitigation IaaS providers host services and entire applications IaaS DNS INTERNET Data Center Apps Home Branch

Internet Outages Happen All the Time ~ 170 affected interfaces / hour ~ 1.6K prefixes / hour

Internet Outage: AWS S3

50% of major retailers affected IaaS outages As business move critical apps and services to IaaS clouds, outages can be very damaging Despite fault-isolated regions, many apps aren’t multi- region Even those that are focus on compute, not resiliency of other services Impacts can be complex, correlated and externally introduced AWS S3 outage Feb 2017 4 hours 1000s of apps and sites Estimated $150M impact 50% of major retailers affected

Broad impact on sites and apps Impacted file storage, often not replicated across regions Impacted other dependent AWS services (Redshift, ELB, RDS, etc.) Impacted AWS monitoring services (Cloud Watch, status page) Impacted commonly-used third-party services (Blue Kai, etc.)

A large-scale operations error AWS unintentionally removed servers and had to restart the file storage systems The issue identification, system restart and recovery took hours This showed up as completely unavailable services

Internet Outage: Dyn DNS DDoS

DDoS attacks Attackers attempt to prevent users from reaching a service with a denial of service attack DDoS attacks overwhelm networks, network equipment or applications with traffic They happen with alarming frequency and scale, causing business interruption and covering traces of other attack types Largest attacks now exceed 500 Gbps Costs in excess of $40K per hour per company One attack cost a firm 8% of customers

Dyn DNS DDoS DNS matters! You can’t send a message if you don’t know the address An example from Oct 21st 2016

Service availability impacted for 24 hours DNS is application traffic too It needs the network to run A DDoS attack prevents that

Network connectivity to Dyn during the attack

Clogging the Pipes

Internet Outage: Rostelecom Route Leak

Dozens of large scale routing leaks each year Route leaks Networks around the world exchange routes, data on how traffic can move to its destination But, these routes can leak accidentally or another network can intentionally hijack them This causes Internet traffic to move to an incorrect destination, denying service or allowing traffic inspection Dozens of large scale routing leaks each year Lasting from seconds to days

Rostelecom route leak April 27th Rostelecom, a Russian state owned ISP leaked routes for dozens of networks Including major payments infrastructure: Visa, Mastercard, BNP Paribas, HSBC, MUFG, UBS, Santander Traffic flowed through Russian networks for over 7 minutes

Taking financial traffic for a ride Traffic entered the Rostelecom network Traversed 60+ interfaces either in a loop or as it was inspected Then returned back to the payment card network

A New Approach to Managing Internet Outages

Collect performance data from every perspective NY Branch INTERNET Data Center Apps Home Enterprise Agents Cloud Agents HK Branch Endpoint Agents

A unified view of performance from user to app End-to-End Performance Data User App Performance User Experience Network Connectivity Network Topology Routing Topology App Routing Enterprise, Endpoint and Cloud Agents

See every network like it’s your own Washington, DC Visualize your network topologies the way that critical services flow over it San Francisco, CA 182.50.78.169 182.50.78.41 182.50.78.41 Boston, MA See faults and dependencies in context 182.50.78.169 Hong Kong Dallas, TX 3 © 2017 ThousandEyes Inc. All Rights Reserved.  Vancouver, Canada

Quickly surface insights from a global data set Immediately identify issues from complex behaviors Algorithms sort through the data of all ThousandEyes users to find the answer NTT in Virginia New York Cloud Agent Salesforce Customer 1 Boston Enterprise Agent Google Los Angeles Cloud Agent Customer 2 Comcast in Denver AWS

Solve issues across shared infrastructure Washington, DC Dashboards / Reports Alerts Snapshots Your Network Your ISP Cloud or CDN

About Us 2010 San Francisco New York | London | Austin We’re a team of network experts, committed to helping you best connect your business FOUNDED IN 2010 HEADQUARTERS IN: San Francisco OFFICES IN: New York | London | Austin

Thank You