©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Attackers Vs. Defenders: Restoring the Equilibrium Ron Meyran Director of Security Marketing January 2013.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
MSIT 458: Information Security & Assurance By Curtis Pethley.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
12/6/2010CS Andrew Bates - UCCS1 Intrusion Detection and Advanced Persistent Threats CS 591 Andrew Bates University of Colorado at Colorado Springs.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Anomaly Detection and Mitigation. Outline DoS and DDoS Anomaly Detection and Mitigation Systems Cisco DDoS Anomaly Detection and Mitigation Solutions.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Norman SecureSurf Protect your users when surfing the Internet.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Dell Connected Security Solutions Simplify & unify.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Web Application Firewall (WAF) RSA ® Conference 2013.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
Bandwidth Distributed Denial of Service: Attacks and Defenses.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Design and implementation of SIP-aware DDoS attack detection system By: Arif Iqbal.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Marin Frankovic Datacenter TSP
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Page 2 Biggest DDoS attack in history slows Internet, breaks record at 300 Gbps 'Biggest cyber-attack in history' slows down internet worldwide after.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
Richard Bible Security Solution Architect, F5 Networks DDOS EQUALS PAIN.
DDoS Attacks on Financial Institutions Presentation
Barracuda Web Filtering Service
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
بهترین راهکار را انتخاب کنید...
Beyond Today’s Perimeter Defense: Radware Attack Mitigation System (AMS) Benjamin Radtke Senior SE Radware North/East Germany September 2011.
Check Point Connectra NGX R60
Hosted Security.
Presentation transcript:

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012

2©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Cybercrime Trends for 2012 SQL Injections 44% APTs 35% Botnet 33% DDoS 32% Ponemon Institute, May % DDoS 65% Businesses Experienced Attacks Average $214,000 of Damage Per Attack

3©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Victims of Recent DDoS Attacks Sony “didn’t notice the security breaches that compromised 101 million user accounts because it was distracted by distributed denial of service attacks…” Sony in a letter to US Congress 2011 “Amazon.com claims its widely publicized DDoS attack resulted in a loss of $600,000 during the 10 hours it was down…” Amazon.com “While Yahoo was down, it suffered a loss of e- commerce and advertising revenue of about $500,000…” According to analysts

4©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | More DDoS attacks today than ever before More damage with application attacks No need to flood network bandwidth Today’s Attacks Are More Sophisticated

5©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Application Layer Attacks Network Layer Attacks DDoS Attacks by Type More attacks are targeted at the Application Layer DNS Web Other Application TCP SYN Flood OtherNetwork Radware 2011

6©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Application Layer DDoS Attacks  Exploit application weakness with Low&Slow attacks Undetectable by threshold- or volume-based solutions New Application Attacks Are Stealthier…  Utilize relatively low volume and fewer connections  Used in conjunction with volume-based attacks

7©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | DDoS Protection Fast Response Time Adaptable Application Layer Protections Network Layer Protection Network Layer Protection The Right DDoS Solution Should Have…

8©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Block Denial of Service Attacks Within Seconds! Introducing Check Point DDoS Protector ™

9©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point DDoS Protector ™ Customized multi-layered DDoS protection Protects against attacks within seconds Integrated security management and expert support

10©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Multi-Vectored DDoS Attacks Network Flood High volume of packets Server Flood High rate of new sessions Application Web / DNS connection- based attacks Low & Slow Attacks Advanced attack techniques

11©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Network Flood High volume of packets Server Flood High rate of new sessions Application Web / DNS connection- based attacks Low & Slow Attacks Advanced attack techniques Multi-Layered Protections Behavioral network analysis Stateless and behavioral engines Automatic and pre-defined signatures Protections against misuse of resources Behavioral HTTP and DNS Challenge / response mitigation methods Granular custom filters Create filters that block attacks and allow users

12©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | DDoS Protector Product Line Enterprise Grade  Up to 3 Gbps throughput  2M concurrent sessions  1 Mpps max. DDoS flood attack rate Datacenter Grade  Up to 12 Gbps throughput  4M concurrent sessions  10 Mpps max. DDoS flood attack rate  7 models to choose from  1GbE copper and 10GbE fiber connections  Low latency  7 models to choose from  1GbE copper and 10GbE fiber connections  Low latency

13©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | + Where to Protect Against DDoS On-Premise Deployment DDoS Protector Appliance Off-Site Deployment DDoS Protector Appliance Scenarios:

14©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Appliance Specifications ModelDP 506DP 1006DP 2006DP 3006DP 4412DP 8412DP Capacity0.5Gbps1Gbps2Gbps3Gbps4GBps8Gbps12Gbps Max Concurrent Sessions 2 Million4 Million Max DDoS Flood Attack Protection Rate 1 Million packets per second10 Million packets per second Latency<60 micro seconds Real-Time Signatures Detect and protect against attacks in less than 18 seconds

15©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Unified Logs and Monitoring …and Unified Reporting Leverage SmartView Tracker, SmartLog and SmartEvent for historic and real- time security status Integrated Security Management

16©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Flexible Deployment Options Low Maintenance and Support Optional Learning Mode Deployment Fits to Existing Network Topology Ready to Protect in Minutes

17©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Emergency Response and Support Emergency Response Team  Help from security experts when under DoS attacks  Leverage experience gathered from real-life attacks  Help from security experts when under DoS attacks  Leverage experience gathered from real-life attacks Check Point customer support  World-class support infrastructure  Always-on support 7x24  Flexible service options  World-class support infrastructure  Always-on support 7x24  Flexible service options

18©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Integrated with Check Point Security Management Customized multi-layered DDoS protection Ready to protect in minutes Summary Blocks DDoS Attacks Within Seconds

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Thank You