Arbor Networks solutions

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
2011 Infrastructure Security Report 7 th Annual Edition CE Latinamerica Carlos A. Ayala
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
Frederic Fleurat SIT mazagan 2014 Frederic Fleurat
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
Arbor Multi-Layer Cloud DDoS Protection
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Mitigating network security threats for superior online availability and service in the iGaming industry Tony Teo, Arbor Networks.
Worldwide Infrastructure Security Report C F Chui, Arbor Networks.
Wowza and Microsoft Azure Enable Easy Deployment and Management of Cloud-Based Streaming Solutions that Deliver Live and On-Demand Video to Any Device.
ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.
Norman SecureSurf Protect your users when surfing the Internet.
2012 Infrastructure Security Report Darren Anstee, Arbor Solutions Architect 8 th Annual Edition.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Distributed Denial of Service Attacks Dennis Galinsky, Brandon Mikelaitis, Michael Stanley Brandon Williams, Ryan Williams.
© 2010 Akamai Headlines You May Have Seen. © 2010 Akamai Headlines You DID NOT See POWERING A BETTER INTERNET President Delays Trip Due to Cyber Attacks.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Dell Connected Security Solutions Simplify & unify.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
The Changing World of Endpoint Protection
Denial of Service (DoS) Attacks: A Nightmare for eCommerce Jearanai Muangsuwan Strayer University.
Built on the Powerful Microsoft Azure Platform, Media Sonar Brings Social Media Investigation to the Public Cloud MICROSOFT AZURE ISV PROFILE: MEDIA SONAR.
© 2012 IBM Corporation IBM Security Services smarter security for a smarter planet.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
TidyWork Enterprise Streamlines Your Business with Powerful Project and Inventory Management Tools, Delivered on the Microsoft Azure Platform MICROSOFT.
FOR INTERNAL USE ONLY [Your business] exceeds with COLT Network Response to DDoS attacks – TNC 2006 Nicolas FISCHBACH Senior Manager, Network Engineering.
Network security Product Group 2 McAfee Network Security Platform.
Design and implementation of SIP-aware DDoS attack detection system By: Arif Iqbal.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Combining Cloud Power with Mobile Technology, Fielding Systems Is Delivering the Digital Oilfield to Modern Oil and Gas Production Companies COMPANY PROFILE:
Corporate Relationship Networks Prepared for Beyond Blogs and Social Networks December 2005.
The Dark Menace: Characterizing Network-based Attacks in the Cloud
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
MidVision Enables Clients to Rent IBM WebSphere for Development, Test, and Peak Production Workloads in the Cloud on Microsoft Azure MICROSOFT AZURE ISV.
DDoS Defense: Utilizing P2P architecture By Joshua Aslan Smith.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Taking Advantage of the Microsoft Azure Platform, Pingvalue Connects People, Products, Stores, and Brands to Deliver Better Experiences for Everyone MICROSOFT.
Avantida is Helping Ocean Carriers to Optimize Their Empty Shipping Container Flows, Based on the Highly Scalable Microsoft Azure Platform MICROSOFT AZURE.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco ASR 9000 vDDoS Solution Protection Vikash Sharma, PM, Cisco Systems.
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2015 ARBOR ® CONFIDENTIAL & PROPRIETARY1 Rob Pollock - Sr. Channel Sales Manager Bilal Javaid - Manager, Consulting Engineering, Central U.S. Data Connectors.
Page 2 Biggest DDoS attack in history slows Internet, breaks record at 300 Gbps 'Biggest cyber-attack in history' slows down internet worldwide after.
Financial Services Sector Coordinating Council (FSSCC) 1 Current DDoS landscape - Potential Impact Solutions – ISP v.s Carrier Agnostic Solutions – Fundamental.
Powered by Microsoft Azure, The Tyros Allows Sports Coaches, Athletes, and Officials to Share and Analyze Game Videos Anywhere There’s an Internet Connection.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Spike DDoS Toolkit A Multiplatform Botnet Threat.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Guard Semineri Hakan Tağmaç Consulting System Engineer.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
File Transfer Issues with TCP Acceleration with FileCatalyst
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Arbor Networks solutions Cisco Live 2015, Milan Ivan Straniero, Territory Manager, Italy & SE Europe

Corporate Video…

Some numbers from ATLAS…

Largest Monitored Attack Sizes Year on Year 2014 ATLAS Initiative : Anonymous Stats, World-Wide Largest Monitored Attack Sizes Year on Year BPS PPS 2012 100.84Gb/sec, destination unknown Lasted 20 mins 82.36Mpps, destination unknown Lasted 24 mins 2013 245Gb/sec (TCP SYN) Lasted 16 mins 202Mpps (UDP/9656) Lasted 8 mins 2014 (so far) 325Gb/sec (NTP), France Lasted 4 h 22 mins 98.93Mpps, All UDP Ports Lasted 1 hour 4 mins

Peak Attack Growth trend in Gbps 2014 ATLAS Initiative : Anonymous Stats, World-Wide Peak Attack Growth trend in Gbps 100Gbps+ attacks in every month this year bar one. Peak attack sizes clearly higher this year.

Peak Attack Growth trend in Mpps 2014 ATLAS Initiative : Anonymous Stats, World-Wide Peak Attack Growth trend in Mpps Peak sizes have been over 50Mpps every month this year As with peak BPS rates, peak PPS rates are trending up this year.

Arbor Networks Overview Arbor’s proud history of productizing innovation in distributed networks. Arbor sees more global traffic and threats than anyone else on the planet. Honored as a top 10 global innovations Key patents in networking & security. Analyzing over 90TB of data per second Monitoring over 200K malware families Arbor is the most trusted and widely deployed solution for DDoS & Botnets. Only Arbor has a fully integrated solution to quickly detect & stop advanced threats. Over 90% of the world’s Tier 1 ISPs 9 of the top 10 largest business networks Integrated to detect & stop threats anywhere See beyond the network through ATLAS

The New Breed of Advanced Threats Bots & Botnets Multi-Vector DDoS Corporate Espionage Application- Layer DDoS Nation State Malware Volumetric DDoS THREAT SPECTRUM Mobile Malware Availability IMPACT Confidentiality

Arbor’s Solution Layers PEAKFLOW PRAVAIL MNA SP NSI SA Mobile Networks Provider Networks Enterprise Networks Enterprise Assets TMS APS ARBOR CLOUD External Attacks Internal Attacks Attack Traffic Legitimate Traffic

THANK YOU