Presentation is loading. Please wait.

Presentation is loading. Please wait.

Is Your Online Security Intelligent? Internet Performance Management

Similar presentations


Presentation on theme: "Is Your Online Security Intelligent? Internet Performance Management"— Presentation transcript:

1 Is Your Online Security Intelligent? Internet Performance Management
Corey Hamilton Product Marketing, Internet Performance Management

2 Everyone Talks About Internet Security

3 Cloud and Hosting Security Content Delivery Networks
Data Centers & Firewalls

4 Nobody Talks About Internet Security

5 Where’s the Security on the Internet?
Cloud and Hosting Providers Content Delivery Networks Customers Employees Partners The Internet: Fertile Grounds for an Attack Data Centers

6 OF INTERCONNECTED NETWORKS
THE INTERNET: IT’S A SYSTEM OF INTERCONNECTED NETWORKS @dyn

7 Where Does Your Data Flow?
● Average Path Across the Internet: Crosses the networks of between different NSPs and ISPs ● Each network typically includes hops ● Requests for data cross anywhere from hops across the Internet

8 Fertile Grounds for Security Threats
● You Don’t Own It ● You Can’t See Most of It ● Even non-malicious issues can affect your business These problems happen Thousands of times every day

9 So, Who’s Responsible for This?
● The Network Service Providers? ● The Internet Service Providers? ● Cloud Providers? ● Content Delivery Networks?

10 “My Hosting Provider/CDN Will Take Care of it”
Service Dashboard is Green “We are currently monitoring an external Internet provider issue that is causing interrupted service connectivity to AWS services for some customers. AWS services are not affected and continue to operate normally.” Netflix, Pinterest, and Slack (all AWS Customers) are knocked offline for 40 minutes

11 X It Wasn’t AWS’ Fault Netflix Customers Netflix Couldn’t See It
Pinterest Couldn’t See It Slack Couldn’t See It But...their customers were calling! Other Cloud Providers AWS Virginia Netflix Customers X The Internet Data Centers

12 Bad News: You Are Responsible for this
● You didn’t cause the problems ● You didn’t ask for it ● But, your customers will blame your company ● Who is/will be responsible for this at your company?

13 If You Can’t See It, You Can’t Defend It
What Kind Of Threats Are Out There?

14 A Couple Examples Man-in-the-Middle attacks ● DDoS Attacks
● Route Hijacking Man-in-the-Middle attacks ● Safe Harbor Compliance

15 The First Step in Defense:
Visibility Imagine somebody coming to rob your house. What if you could be alerted to this while they were still driving across town, rather than when they’re at your door??

16 Internet Visibility into DDoS Attacks
● Originate way outside your firewalls ● Detect the flood of traffic before it hits you ● Monitor for these 24x7 ● Global Networks ensure the bandwidth to withstand attacks

17 Early Mitigation of DDoS Attacks
● Be Alerted to DDoS Attacks occurring across the Internet ● Often seen as Enterprises shift traffic to scrubbing centers ● Redundancy provides options ● Two (or more) scrubbing centers ● Which is more available during an attack ● Shift traffic to scrubbing center that’s best able to keep up

18 Internet Visibility into Route Hijacking
● Identify Routing Anomalies ● Monitor changes to your prefixes and ASNs ● Visibility into Internet paths leading to your assets ● Identify and mitigate Man-in-the-Middle attacks

19 Example 1: Internet Initiative Japan (IIJ)
● Internal employee received fake letter to authorize an IP address block to another party ● Address space was transferred to malicious group ● IP address becomes associated with hacking efforts ● Occurred undetected for over a year ● Internet visibility eventually lead to its discovery

20 Example 2: Atomic Weapons Establishment
● Typically, data is passed from Houston to Great Britain ● Unintentional DNS update reroutes this traffic through Kiev, Ukraine ● Data ultimately arrives at destination in Great Britain ● Continues undetected for 5 days

21 How Do We Mitigate These Issues?
● Reactive Mitigation Begin monitoring your address space (ASNs, Prefixes) Ensure Redundant Paths (multiple providers or endpoints) Alerts when address space changes or performance to these assets is affected Update DNS to send traffic through desired paths

22 How Do We Mitigate These Issues?
● Planning Mitigation Leverage Internet Visibility to identify optimal locations for infrastructure Ensure ISP relationships send your data where you want it to go -- and not go Where you store your data dictates how end users will reach it. Internet paths flow through different networks depending on the destination

23 Current Trends

24 Safe Harbor Compliance
Where does your data travel?

25 Safe Harbor Compliance
A Friendlier Alternative

26 Where does your data travel?
A Performance Nightmare, Increased Risk

27 Where does your data travel?
A Performance Nightmare, Increased Risk -- Part 2

28 If you were a hacker, where would you focus your efforts?
Hackers Changing Their Focus If you were a hacker, where would you focus your efforts?

29 Thank You


Download ppt "Is Your Online Security Intelligent? Internet Performance Management"

Similar presentations


Ads by Google