SlideShare a Scribd company logo
Arbor Networks
Poland. 3rd October 2013
Simon Cartwright
Director of Security Services!
Agenda	
  
	
  
•  Who	
  is	
  Arbor	
  ?	
  
•  What	
  is	
  DDoS	
  
•  Evolu3on	
  of	
  DDoS	
  	
  
•  Trends	
  in	
  DDoS	
  
•  A9ack	
  Traffic	
  Details	
  Poland	
  
•  Protec3on	
  Op3ons	
  
•  The	
  Enterprise	
  Ques3on	
  
•  Visibility	
  &	
  Control	
  
•  Ne3a/Arbor/NCR	
  Partnership	
  
•  Ques3ons.	
  At	
  Booth	
  
4	
  
Arbor - a Trusted & Proven Vendor Securing the World’s
Largest and Most Demanding Networks
90%
Percentage	
  of	
  world’s	
  	
  
Tier	
  1	
  service	
  providers	
  	
  
who	
  are	
  Arbor	
  customers	
  
107
Number	
  of	
  countries	
  
with	
  Arbor	
  products	
  
deployed	
  
47.1
Tbps
Amount	
  of	
  global	
  traffic	
  
monitored	
  by	
  the	
  ATLAS	
  security	
  
intelligence	
  ini3a3ve	
  right	
  now	
  –	
  
25%	
  of	
  global	
  Internet	
  traffic!	
  
#1
Arbor	
  market	
  posi3on	
  in	
  Carrier,	
  
Enterprise	
  and	
  Mobile	
  DDoS	
  
equipment	
  market	
  segments	
  –	
  	
  
61%	
  of	
  total	
  market	
  	
  
[Infone3cs	
  Research	
  Dec	
  2011]	
  
Number	
  of	
  years	
  Arbor	
  has	
  been	
  delivering	
  
innova3ve	
  security	
  and	
  network	
  visibility	
  
technologies	
  &	
  products	
  
13
$16B
2011	
  GAAP	
  revenues	
  [USD]	
  of	
  
Danaher	
  –	
  Arbor’s	
  parent	
  company	
  
providing	
  deep	
  financial	
  backing	
  
Arbor’s proud history of

productizing innovation

in distributed networks.#
Arbor is the most

trusted and widely

deployed solution for

DDoS & Botnets.#
Arbor sees more global

traffic and threats than

anyone else on the planet."
Only Arbor has a fully
integrated solution to
quickly detect & stop

advanced threats."
•  Honored as a top 10 global innovations#
•  Key patents in networking & security.#
•  Analyzing over 48TB of data per second#
•  Monitoring over 110K malware families#
•  Integrated to detect & stop threats anywhere#
•  See beyond the network through ATLAS#
•  Over 90% of the world’s Tier 1 ISPs#
•  9 of the top 10 largest business networks#
Arbor Networks Overview
Threat Landscape Era’s
Network	
  
Protocol	
  
Content	
  
Advanced	
  
Threats	
  
1999-­‐2005	
   2006-­‐2010	
   2010-­‐Today	
  
§  Synflood (Trinoo/TFN)
§  Code Red
§  Slammer
§  Zotob
§  Conficker (2008)
§  Web Browser
§  Web Applications
§  Doc/PDF/etc.
§  Flash/Shockwave
§  Java
§  Aurora
§  Operation Payback
§  Stuxnet/Flame/Duqu
§  APT
§  Cyber Warfare
During a Distributed Denial of Service (DDoS) attack,
compromised hosts or bots coming from distributed sources
overwhelm the target with illegitimate traffic so that the servers
can not respond to legitimate clients.
What is a DDoS Attack?
7	
  
DDoS
The DDoS weapon of
choice for Anonymous
activists LOIC, was
downloaded from the
internet 1.167.305 times
during 2011/12(sourceforge.net)
DDoS Motivations
9	
  
Everyone is a Target
10	
  
DDoS Devastating Costs
11	
  
*Neustar	
  Insights	
  DDoS	
  Survey:	
  Q1	
  2012	
  
The	
  impact	
  of	
  loss	
  of	
  service	
  availability	
  goes	
  beyond	
  financials:	
  
Opera@ons	
   Help	
  Desk	
   Recovery	
  
Employee	
  
Output	
  
Penal@es	
   Lost	
  Business	
  
Brand	
  &	
  
Reputa@on	
  
Damage	
  
35%	
  of	
  those	
  a9acked	
  
said	
  it	
  lasted	
  
More	
  than	
  a	
  day	
  
67%	
  of	
  retailers	
  said	
  outages	
  cost	
  
$100,000	
  	
  
per	
  hour	
  
21%	
  overall	
  said	
  outages	
  cost	
  
$50,000	
  	
  
per	
  hour	
  
Today’s Attacks are More Frequent
12	
  
Today’s Attacks
13	
  
2012	
   2013	
  (so	
  far….)	
  
Number	
  of	
  A9acks	
   713	
   986	
  
Average	
  Dura3on	
   38mins	
  37secs	
   29mins	
  50secs	
  
Longest	
  A9ack	
   1day	
  16hrs	
  07secs	
   1day	
  4hrs	
  45mins	
  58secs	
  
Volumetric
DDoS"
Bots &

Botnets"
Mobile

Malware"
Availability# Confidentiality#IMPACT"
THREAT

SPECTRUM"
The Next Generation of Threats
Netia’s Unique Threat Ecosystem
16	
  
The	
  ecosystem	
  between	
  smart	
  providers	
  &	
  enterprises	
  to	
  offer	
  
comprehensive	
  protec3on	
  from	
  ac3ve	
  threats	
  
Enterprise NetworksNetia
D	
  
Enterprise	
  data	
  center	
  services	
  are	
  now	
  fully	
  available	
  	
  
and	
  secure	
  from	
  advanced	
  threats!	
  
Diverse end-points are accessing
your network from anywhere."
Your assets are
distributed everywhere."
Corporate

Offices"
Broadband"Mobile"
Content" Corporate

Servers &

Applications"
SaaS"
A Global, Hybrid infrastructure"
Private

Network"
Public

Clouds"
Internet"
The Global Network is Your Business
CDNs"
Mobile

Carriers"
Service

Providers"
SaaS"
Cloud

Providers"
Enterprise

Perimeter"
Mobile

WiFi"
Employees"
Corporate

Servers"
Remote

Offices"
Internal

Apps"
Never see

the external

threat traffic"
Can’t

withstand a

direct attack"
Never see the

threat already

inside enterprise

"
Existing Solutions Have Critical Gaps
Cloud"
Pravail"
Availability Protection System"
Pravail"
Network Security Intelligence"
See and stop the

threat anywhere#
Stop

the threat#
See the threat lurking

inside the enterprise#
CDNs"
Mobile

Carriers"
Service

Providers"
SaaS"
Cloud

Providers"
Enterprise

Perimeter"
Mobile

WiFi"
Employees"
Corporate

Servers"
Remote

Offices"
Threat Dashboard"
Netia’s Solution Bridges the Gaps
Internal

Apps"
Users	
  
An@-­‐Virus	
  
IDS/IPS	
  
NAC	
  
Firewall	
  
	
  Secure	
  Trust	
  Perimeter	
  
Mobile	
  Users	
  
Malware	
  
BYOD	
  
Internet	
  
Mobile	
  Users	
  
Secure	
  Trust	
  Perimeter	
  
Insider	
  
Misuse	
  
Home	
  Office(s)	
  
Cloud	
  Services	
   VPN	
  
Malware	
  
Advanced Threats: From Outside AND Inside
Network boundaries are harder to define
–  Cloud based data and applications
–  Employee mobility / BYOD
–  Home Working 	
  	
  	
  	
  
Threats are harder to keep out
–  Targeted threats
–  Walk-in threats (on portable devices)
–  Malicious insider
Challenge: Control & Security of business data, applications and services
as businesses evolve.
Data	
  Center	
  
Attack Mitigation. In Poland
CP
TMS
Attack Mitigation. In Poland
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
2. Activate Mitigation (TMS)
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
2. Activate Mitigation (TMS)
3. Divert Traffic (Network wide: BGP OFF-Ramp announcement)
CP
TMS
Attack Mitigation. In Poland
1. Detect
(Network wide: CP using Flow)
2. Activate Mitigation (TMS)
4. Clean the Traffic and forward the legitimate
(Network wide: using ON-Ramp Technique [e.g. MPLS, GRE, VLAN, …])
5. Protected
3. Divert Traffic (Network wide: BGP OFF-Ramp announcement)
CP
TMS
Thank You
Questions?
Nas nie zaatakują!

More Related Content

PDF
Palo Alto Networks - Magnifier
PDF
Conférence ARBOR ACSS 2018
PPTX
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
PPTX
Authentication, Security, and Performance for the Internet of Things
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PPTX
Recent DDoS attack trends, and how you should respond
PPTX
Schneider electric powers security transformation with one simple app copy
PDF
Stopping DDoS Attacks in North America
Palo Alto Networks - Magnifier
Conférence ARBOR ACSS 2018
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Authentication, Security, and Performance for the Internet of Things
F5 Networks: The Internet of Things - Ready Infrastructure
Recent DDoS attack trends, and how you should respond
Schneider electric powers security transformation with one simple app copy
Stopping DDoS Attacks in North America

What's hot (20)

PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PPTX
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
PPTX
Four keys to securing distributed control systems and the industrial (IoT)
PPTX
IoT Panel, Part II: Security for Silicon, Software, and Sensors
PPTX
Minimizing Information Transparency
PDF
Forcepoint SD-WAN and NGFW + IPS
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PDF
Cisco Security Presentation
PPTX
Strengthening security posture for modern-age SaaS providers
PPTX
APrIGF 2015: Security and the Internet of Things
PPTX
Cyber Security 101
PPTX
Open Source and the Internet of Things
PDF
PANDI Meeting 12: Supporting resilience and security in Internet routing
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
Tenable Solutions for Enterprise Cloud Security
PPTX
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
PPTX
Ciena - the journey to the adaptive network
PDF
Privacy & Security for the Internet of Things
PPTX
The 2019 Security Strategy
PPTX
Security As A Service
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Four keys to securing distributed control systems and the industrial (IoT)
IoT Panel, Part II: Security for Silicon, Software, and Sensors
Minimizing Information Transparency
Forcepoint SD-WAN and NGFW + IPS
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Cisco Security Presentation
Strengthening security posture for modern-age SaaS providers
APrIGF 2015: Security and the Internet of Things
Cyber Security 101
Open Source and the Internet of Things
PANDI Meeting 12: Supporting resilience and security in Internet routing
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Tenable Solutions for Enterprise Cloud Security
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Ciena - the journey to the adaptive network
Privacy & Security for the Internet of Things
The 2019 Security Strategy
Security As A Service
Ad

Similar to Nas nie zaatakują! (20)

PPTX
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
PDF
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
PDF
Introduction of Cloudflare Solution for Mobile Payment
PPT
ICRTITCS-2012 Conference Publication
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PPTX
Alpha & Omega's Managed Security
PDF
Scalar Security Roadshow - Toronto Stop
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
Streamline and Secure Your Network and Users
PDF
MT17_Building Integrated and Secure Networks with limited IT Support
PDF
Sangfor's Presentation.pdf
PDF
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
PPTX
Protect against cybersecurity Umbrella .pptx
PDF
Cisco umbrella overview
PDF
Network Security: A Four Point Analysis of Appliances vs. the Cloud
PDF
Insecure magazine - 52
PDF
EMEA10: Trepidation in Moving to the Cloud
PPTX
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
PDF
Scalar Security Roadshow - Ottawa Presentation
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
Introduction of Cloudflare Solution for Mobile Payment
ICRTITCS-2012 Conference Publication
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Alpha & Omega's Managed Security
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Streamline and Secure Your Network and Users
MT17_Building Integrated and Secure Networks with limited IT Support
Sangfor's Presentation.pdf
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Protect against cybersecurity Umbrella .pptx
Cisco umbrella overview
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Insecure magazine - 52
EMEA10: Trepidation in Moving to the Cloud
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Scalar Security Roadshow - Ottawa Presentation
Ad

More from Biznes to Rozmowy (20)

PPTX
Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
PPT
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
PPTX
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
PDF
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
PDF
Driving at 200 km/ into a wall of security issues in personal cloud?
PDF
The future of human: brand interface
PDF
Brand video
PDF
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
PDF
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
PDF
Komunikacja po prostu.
PDF
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
PDF
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
PDF
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
PDF
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
PDF
Video will touch us all.
PDF
WiFi - jakiego nie znacie.
PDF
Golden Eye. I wiesz więcej.
PDF
What's Next
PDF
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
PDF
Megatrendy – nowoczesne technologie zmieniające przyszłość
Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Driving at 200 km/ into a wall of security issues in personal cloud?
The future of human: brand interface
Brand video
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Komunikacja po prostu.
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Video will touch us all.
WiFi - jakiego nie znacie.
Golden Eye. I wiesz więcej.
What's Next
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Megatrendy – nowoczesne technologie zmieniające przyszłość

Recently uploaded (20)

PPTX
A Presentation on Touch Screen Technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Mushroom cultivation and it's methods.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
TLE Review Electricity (Electricity).pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation theory and applications.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
DP Operators-handbook-extract for the Mautical Institute
A Presentation on Touch Screen Technology
OMC Textile Division Presentation 2021.pptx
Enhancing emotion recognition model for a student engagement use case through...
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Web App vs Mobile App What Should You Build First.pdf
Chapter 5: Probability Theory and Statistics
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Mushroom cultivation and it's methods.pdf
cloud_computing_Infrastucture_as_cloud_p
TLE Review Electricity (Electricity).pptx
A comparative analysis of optical character recognition models for extracting...
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation theory and applications.pdf
WOOl fibre morphology and structure.pdf for textiles
DP Operators-handbook-extract for the Mautical Institute

Nas nie zaatakują!

  • 1. Arbor Networks Poland. 3rd October 2013 Simon Cartwright Director of Security Services!
  • 2. Agenda     •  Who  is  Arbor  ?   •  What  is  DDoS   •  Evolu3on  of  DDoS     •  Trends  in  DDoS   •  A9ack  Traffic  Details  Poland   •  Protec3on  Op3ons   •  The  Enterprise  Ques3on   •  Visibility  &  Control   •  Ne3a/Arbor/NCR  Partnership   •  Ques3ons.  At  Booth  
  • 3. 4   Arbor - a Trusted & Proven Vendor Securing the World’s Largest and Most Demanding Networks 90% Percentage  of  world’s     Tier  1  service  providers     who  are  Arbor  customers   107 Number  of  countries   with  Arbor  products   deployed   47.1 Tbps Amount  of  global  traffic   monitored  by  the  ATLAS  security   intelligence  ini3a3ve  right  now  –   25%  of  global  Internet  traffic!   #1 Arbor  market  posi3on  in  Carrier,   Enterprise  and  Mobile  DDoS   equipment  market  segments  –     61%  of  total  market     [Infone3cs  Research  Dec  2011]   Number  of  years  Arbor  has  been  delivering   innova3ve  security  and  network  visibility   technologies  &  products   13 $16B 2011  GAAP  revenues  [USD]  of   Danaher  –  Arbor’s  parent  company   providing  deep  financial  backing  
  • 4. Arbor’s proud history of
 productizing innovation
 in distributed networks.# Arbor is the most
 trusted and widely
 deployed solution for
 DDoS & Botnets.# Arbor sees more global
 traffic and threats than
 anyone else on the planet." Only Arbor has a fully integrated solution to quickly detect & stop
 advanced threats." •  Honored as a top 10 global innovations# •  Key patents in networking & security.# •  Analyzing over 48TB of data per second# •  Monitoring over 110K malware families# •  Integrated to detect & stop threats anywhere# •  See beyond the network through ATLAS# •  Over 90% of the world’s Tier 1 ISPs# •  9 of the top 10 largest business networks# Arbor Networks Overview
  • 5. Threat Landscape Era’s Network   Protocol   Content   Advanced   Threats   1999-­‐2005   2006-­‐2010   2010-­‐Today   §  Synflood (Trinoo/TFN) §  Code Red §  Slammer §  Zotob §  Conficker (2008) §  Web Browser §  Web Applications §  Doc/PDF/etc. §  Flash/Shockwave §  Java §  Aurora §  Operation Payback §  Stuxnet/Flame/Duqu §  APT §  Cyber Warfare
  • 6. During a Distributed Denial of Service (DDoS) attack, compromised hosts or bots coming from distributed sources overwhelm the target with illegitimate traffic so that the servers can not respond to legitimate clients. What is a DDoS Attack? 7  
  • 7. DDoS The DDoS weapon of choice for Anonymous activists LOIC, was downloaded from the internet 1.167.305 times during 2011/12(sourceforge.net)
  • 9. Everyone is a Target 10  
  • 10. DDoS Devastating Costs 11   *Neustar  Insights  DDoS  Survey:  Q1  2012   The  impact  of  loss  of  service  availability  goes  beyond  financials:   Opera@ons   Help  Desk   Recovery   Employee   Output   Penal@es   Lost  Business   Brand  &   Reputa@on   Damage   35%  of  those  a9acked   said  it  lasted   More  than  a  day   67%  of  retailers  said  outages  cost   $100,000     per  hour   21%  overall  said  outages  cost   $50,000     per  hour  
  • 11. Today’s Attacks are More Frequent 12  
  • 12. Today’s Attacks 13   2012   2013  (so  far….)   Number  of  A9acks   713   986   Average  Dura3on   38mins  37secs   29mins  50secs   Longest  A9ack   1day  16hrs  07secs   1day  4hrs  45mins  58secs  
  • 14. Netia’s Unique Threat Ecosystem 16   The  ecosystem  between  smart  providers  &  enterprises  to  offer   comprehensive  protec3on  from  ac3ve  threats   Enterprise NetworksNetia D   Enterprise  data  center  services  are  now  fully  available     and  secure  from  advanced  threats!  
  • 15. Diverse end-points are accessing your network from anywhere." Your assets are distributed everywhere." Corporate
 Offices" Broadband"Mobile" Content" Corporate
 Servers &
 Applications" SaaS" A Global, Hybrid infrastructure" Private
 Network" Public
 Clouds" Internet" The Global Network is Your Business
  • 16. CDNs" Mobile
 Carriers" Service
 Providers" SaaS" Cloud
 Providers" Enterprise
 Perimeter" Mobile
 WiFi" Employees" Corporate
 Servers" Remote
 Offices" Internal
 Apps" Never see
 the external
 threat traffic" Can’t
 withstand a
 direct attack" Never see the
 threat already
 inside enterprise
 " Existing Solutions Have Critical Gaps
  • 17. Cloud" Pravail" Availability Protection System" Pravail" Network Security Intelligence" See and stop the
 threat anywhere# Stop
 the threat# See the threat lurking
 inside the enterprise# CDNs" Mobile
 Carriers" Service
 Providers" SaaS" Cloud
 Providers" Enterprise
 Perimeter" Mobile
 WiFi" Employees" Corporate
 Servers" Remote
 Offices" Threat Dashboard" Netia’s Solution Bridges the Gaps Internal
 Apps"
  • 18. Users   An@-­‐Virus   IDS/IPS   NAC   Firewall    Secure  Trust  Perimeter   Mobile  Users   Malware   BYOD   Internet   Mobile  Users   Secure  Trust  Perimeter   Insider   Misuse   Home  Office(s)   Cloud  Services   VPN   Malware   Advanced Threats: From Outside AND Inside Network boundaries are harder to define –  Cloud based data and applications –  Employee mobility / BYOD –  Home Working         Threats are harder to keep out –  Targeted threats –  Walk-in threats (on portable devices) –  Malicious insider Challenge: Control & Security of business data, applications and services as businesses evolve. Data  Center  
  • 19. Attack Mitigation. In Poland CP TMS
  • 20. Attack Mitigation. In Poland CP TMS
  • 21. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) CP TMS
  • 22. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) 2. Activate Mitigation (TMS) CP TMS
  • 23. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) 2. Activate Mitigation (TMS) 3. Divert Traffic (Network wide: BGP OFF-Ramp announcement) CP TMS
  • 24. Attack Mitigation. In Poland 1. Detect (Network wide: CP using Flow) 2. Activate Mitigation (TMS) 4. Clean the Traffic and forward the legitimate (Network wide: using ON-Ramp Technique [e.g. MPLS, GRE, VLAN, …]) 5. Protected 3. Divert Traffic (Network wide: BGP OFF-Ramp announcement) CP TMS