SlideShare a Scribd company logo
© 2019 Nexusguard Limited – Confidential & Proprietary
360° DDoS Protection for SMEs
Donny Chong
Director, Product and Marketing
31 May, 2019
© 2019 Nexusguard Limited – Confidential & Proprietary
The Forrester Wave™
DDoS Mitigation Solutions 2017
Best Security-As-A-Service
Information Management Awards
2018
Best DDoS Protection
2018 #2
Years experience
fighting DDoS
Tbps
Scrubbing Capacity
Security
Operation
Center
Global
DDoS Scrubbing Centers
2Tbps 24x71510 +
Global DDoS Mitigation
Entrepreneurial Company of the
Year Award 2016
Authority in DDoS Protection
© 2019 Nexusguard Limited – Confidential & Proprietary
Nexusguard PoP
Nexusguard Registered Partner PoP
Global
Scrubbing
Network
15 PoPs
© 2019 Nexusguard Limited – Confidential & Proprietary
Agenda
● DDoS Attack Landscape
● The Age of IOT – What it means for you?
● 360 DDoS Protection Solution
© 2019 Nexusguard Limited – Confidential & Proprietary
Global DDoS Attack Landscape
© 2019 Nexusguard Limited – Confidential & Proprietary
What a DDoS attack looks like
© 2019 Nexusguard Limited – Confidential & Proprietary
Size of Attacks
2008 2018
1Gbps ~300Gbps
© 2019 Nexusguard Limited – Confidential & Proprietary
Duration Of Attacks
2008 2018
6 - 8 Hours ~19 Days
© 2019 Nexusguard Limited – Confidential & Proprietary
Sophistication Of Attacks
2008 2018
1~2 Vectors >10 Vectors
© 2019 Nexusguard Limited – Confidential & Proprietary
Application attack Trend (SMEs)
2018 2019
59.76% HTTP
40.24% HTTPS
81.18% HTTP
18.89% HTTPS
49.08% HTTP
50.92% HTTPS
2017
© 2019 Nexusguard Limited – Confidential & Proprietary
3 out of 5 DDoS Attack targeted Enterprise
2017
13,739 DDoS attacks
2018
11,389 DDoS attacks
© 2019 Nexusguard Limited – Confidential & Proprietary
Q1 Perpetrators tapped into the attack with a huge amplification factor:
Memcached attacks (51,000X) in Q1 2018
Q2 IoT-botnet generated attacks occasionally skyrocketed. It was caused by
Satori evolving from Mirai to exploit zero-day vulnerabilities;
Q3, Q4 Perpetrators employed a newly-adopted tactic of Amplification Attack,
referred to as a "Bit-and-Piece” Attack, a hard-to-detect attack stealthily
converging at the distinction by evading detection.
2018 Attack Trends
Total 37,728 attacks (Successfully detected and mitigated by Nexusguard)
Open Public DNS
Servers
Open Public DNS
Servers
Open Public DNS
Servers
Open Public DNS
Servers
Victim
Bot
Open Public DNS
Servers
Amplified attack traffic
Attacker sending Command to Bot
Small DNS request and spoofed source IP to
Victim
BotBot
51,000 times!
© 2019 Nexusguard Limited – Confidential & Proprietary
The Age of IoT
The Botnet Outbreak
© 2019 Nexusguard Limited – Confidential & Proprietary
Outbreak of IoT Botnet
Since the release of its source code in August of 2016, the number of IoT botnets
greatly grew. The outbreak of the Mirai botnet was concurrent with the rise in the
number and size of attacks in 2016 Q4 was concurrent with the outbreak of the
Mirai like botnet. 2018 Q2, the dramatic rise in IoT botnet activity coincided with
Satori malware exploits. Satori, a variant of the notorious Mirai malware, is
designed to generate network-layer DDoS attacks by exploiting zero-day
vulnerabilities in certain types of home routers. Today…
© 2019 Nexusguard Limited – Confidential & Proprietary
News of IoT Botnet
© 2019 Nexusguard Limited – Confidential & Proprietary
Type of Bots (by Percentage)
Before 2016 2019
> 90% is
Computers and
Servers
> 60% is
Mobile Devices
© 2019 Nexusguard Limited – Confidential & Proprietary
Attack sources of DDoS attack Q1 2019
Attack Sources(Application Attack) Percentage
Mobile
Devices
Android (Samsung, Huawei, etc.) 39.00%
IOS (iPhone, iPad and iPod) 21.34%
Others (e.g. BlackBerry) 0.002%
Computers
and servers
Windows 24.06%
Macintosh 1.26%
Others OS’s 6.73%
Others Playstation, Smart TV, Smart Hub, etc. 7.61%
• Capture from REAL application
attack daily. Counting base on
application attack’s source IPs.
(Application attack can’t use spoofed
IP)
• Over 90% attack come from
computer before 2017. Over 60% of
attack come from Mobile Devices,
now.
• Problem not only come from poor
security devices, poor security
awareness also is the root cause.
© 2019 Nexusguard Limited – Confidential & Proprietary
360° DDoS Protection
from a Partner You Can Trust
© 2019 Nexusguard Limited – Confidential & Proprietary
Our Offering - 360° DDoS Protection
Our cloud-based 3-pillar Cybersecurity Platform
Application Protection, Origin Protection, DNS
Protection provides comprehensive protection on
websites, applications, backend infrastructure and DNS
servers, from the latest threats.
© 2019 Nexusguard Limited – Confidential & Proprietary
Our Difference
Our own R&D Our own Technology Our own Infrastructure Our Products
- Attack Study Lab
- Product Development
- Real time Data & Report
- Automated Intelligence
- Multi layered Mitigation
- Global + Local Scrubbing
- Nexusguard Technology
- Dandelion Network
- Application Protection
- Origin Protection
- DNS Protection
- Infra Protect
Highly customizable solutions with white glove services
To secure access and performance for up-time protection,
in compliance with PCI DSS, ISO 27001 and Data Sovereignty
Premium Sector
High Demand Organizations
TAP (Transformational Alliance Partner) Program
Innovation in technology and solutions for entire supply chain
Service Provider Sector
Telco, Hosting, Data Center
Offerings from
Proprietary
Design
Strategies
based on
proprietary
Product design
Pure-play expert in DDoS mitigation since 2008;
Purpose built platforms to future-proof businesses across the entire performance value chain; End-to-end full service
© 2019 Nexusguard Limited – Confidential & Proprietary
Look forward to
Growing with Your Business
www.nexusguard.com

More Related Content

PPTX
Netpluz Managed SOC - MSS Service
PDF
Cyber Risk Management in the New Digitalisation Age - eSentinel™
PDF
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
PDF
ICION 2016 - Cyber Security Governance
PPTX
The State of Ransomware 2020
DOCX
VAPT- A Service on Eucalyptus Cloud
PPTX
Top 5 Things to Look for in an IPS Solution
PPTX
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
Netpluz Managed SOC - MSS Service
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
ICION 2016 - Cyber Security Governance
The State of Ransomware 2020
VAPT- A Service on Eucalyptus Cloud
Top 5 Things to Look for in an IPS Solution
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?

What's hot (18)

PDF
Insights into cyber security and risk
 
PPTX
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
PPTX
Securing the Cloud
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PDF
Cyber Security 4.0 conference 30 November 2016
PDF
The State of Threat Detection 2019
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PDF
M-Trends® 2013: Attack the Security Gap
PDF
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
PDF
From Business Architecture to Security Architecture
PPTX
Cyber Ethics: Cyber Security Services | VAPT and WAPT
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PDF
Game Changing Cyber Defensive Strategies for 2019
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Cyber Security 4.0 conference 30 November 2016
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
Insights into cyber security and risk
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Securing the Cloud
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Cyber Security 4.0 conference 30 November 2016
The State of Threat Detection 2019
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
M-Trends® 2013: Attack the Security Gap
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
From Business Architecture to Security Architecture
Cyber Ethics: Cyber Security Services | VAPT and WAPT
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Game Changing Cyber Defensive Strategies for 2019
Big Data Analytics for Cyber Security: A Quick Overview
Cyber Security 4.0 conference 30 November 2016
Application Security | Application Security Tutorial | Cyber Security Certifi...
Ad

Similar to Netpluz DDoS Mitigation - Managed Cyber Security (20)

PPTX
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
PDF
Nexusguard Selected Entrepreneurial Company 2016
PPTX
IoT DDoS Attacks: the stakes have changed
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PDF
A10 issa d do s 5-2014
PPT
Protecting your business from ddos attacks
PPTX
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
PDF
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
PPTX
Cyber security fundamentals (Cantonese)
PDF
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
PDF
Protecting against modern ddos threats
PDF
Nexusguard d do_s_threat_report_q1_2017_en
PDF
IoT Security, Mirai Revisited
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
PPTX
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PPTX
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
PDF
Detecting DDoS Attacks: 8 Key Warning Signs for Enterprises
PDF
Arbor Presentation
PDF
The role of DDoS Providers
PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
Nexusguard Selected Entrepreneurial Company 2016
IoT DDoS Attacks: the stakes have changed
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
A10 issa d do s 5-2014
Protecting your business from ddos attacks
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Cyber security fundamentals (Cantonese)
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Protecting against modern ddos threats
Nexusguard d do_s_threat_report_q1_2017_en
IoT Security, Mirai Revisited
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
Detecting DDoS Attacks: 8 Key Warning Signs for Enterprises
Arbor Presentation
The role of DDoS Providers
The_Forrester_Wave_DDoS_S 2015Q3.PDF
Ad

More from Netpluz Asia Pte Ltd (20)

PDF
Netpluz corp presentation 2020
PPTX
Secure & Protect your Data with Druva
PPTX
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
PPTX
SAY HELLO TO MICROSOFT TEAMS
PDF
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
PDF
eSentinel™ – 360° Cybersecurity Platform Simplified
PPTX
Using a secured, cloud-delivered SD-WAN to transform your business network
PPTX
Netpluz - Managed Firewall & Endpoint Protection
PPTX
Netpluz Managed Cyber Security
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PDF
SME Cyber Insurance
PPTX
Netpluz Managed Services Portfolio
PPTX
Y5Zone Singapore - Wifi Advertisement & EDM services
PPTX
Getting ready for wi-fi 6 and IOT
PPTX
Managed Security Operations Centre Alternative - Managed Security Service
PPTX
Email Phishing Test Simulation, Educating the Users
PPTX
The Best Just Got Better, Intercept X Now With EDR
PPTX
Understanding the Threat Landscape by SOPHOS
PPTX
Y5Zone Singapore Presentation
PPTX
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Netpluz corp presentation 2020
Secure & Protect your Data with Druva
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
SAY HELLO TO MICROSOFT TEAMS
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel™ – 360° Cybersecurity Platform Simplified
Using a secured, cloud-delivered SD-WAN to transform your business network
Netpluz - Managed Firewall & Endpoint Protection
Netpluz Managed Cyber Security
VAPT - Vulnerability Assessment & Penetration Testing
SME Cyber Insurance
Netpluz Managed Services Portfolio
Y5Zone Singapore - Wifi Advertisement & EDM services
Getting ready for wi-fi 6 and IOT
Managed Security Operations Centre Alternative - Managed Security Service
Email Phishing Test Simulation, Educating the Users
The Best Just Got Better, Intercept X Now With EDR
Understanding the Threat Landscape by SOPHOS
Y5Zone Singapore Presentation
Sophos synchronized security in action @Netpluz CS Event Nov 2017

Recently uploaded (20)

PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
How to Get Business Funding for Small Business Fast
DOCX
Business Management - unit 1 and 2
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Types of control:Qualitative vs Quantitative
PPTX
5 Stages of group development guide.pptx
PPTX
Amazon (Business Studies) management studies
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Chapter 5_Foreign Exchange Market in .pdf
Probability Distribution, binomial distribution, poisson distribution
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
How to Get Business Funding for Small Business Fast
Business Management - unit 1 and 2
340036916-American-Literature-Literary-Period-Overview.ppt
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
MSPs in 10 Words - Created by US MSP Network
Types of control:Qualitative vs Quantitative
5 Stages of group development guide.pptx
Amazon (Business Studies) management studies
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Unit 1 Cost Accounting - Cost sheet
Nidhal Samdaie CV - International Business Consultant
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Power and position in leadershipDOC-20250808-WA0011..pdf
Lecture (1)-Introduction.pptx business communication
Chapter 5_Foreign Exchange Market in .pdf

Netpluz DDoS Mitigation - Managed Cyber Security

  • 1. © 2019 Nexusguard Limited – Confidential & Proprietary 360° DDoS Protection for SMEs Donny Chong Director, Product and Marketing 31 May, 2019
  • 2. © 2019 Nexusguard Limited – Confidential & Proprietary The Forrester Wave™ DDoS Mitigation Solutions 2017 Best Security-As-A-Service Information Management Awards 2018 Best DDoS Protection 2018 #2 Years experience fighting DDoS Tbps Scrubbing Capacity Security Operation Center Global DDoS Scrubbing Centers 2Tbps 24x71510 + Global DDoS Mitigation Entrepreneurial Company of the Year Award 2016 Authority in DDoS Protection
  • 3. © 2019 Nexusguard Limited – Confidential & Proprietary Nexusguard PoP Nexusguard Registered Partner PoP Global Scrubbing Network 15 PoPs
  • 4. © 2019 Nexusguard Limited – Confidential & Proprietary Agenda ● DDoS Attack Landscape ● The Age of IOT – What it means for you? ● 360 DDoS Protection Solution
  • 5. © 2019 Nexusguard Limited – Confidential & Proprietary Global DDoS Attack Landscape
  • 6. © 2019 Nexusguard Limited – Confidential & Proprietary What a DDoS attack looks like
  • 7. © 2019 Nexusguard Limited – Confidential & Proprietary Size of Attacks 2008 2018 1Gbps ~300Gbps
  • 8. © 2019 Nexusguard Limited – Confidential & Proprietary Duration Of Attacks 2008 2018 6 - 8 Hours ~19 Days
  • 9. © 2019 Nexusguard Limited – Confidential & Proprietary Sophistication Of Attacks 2008 2018 1~2 Vectors >10 Vectors
  • 10. © 2019 Nexusguard Limited – Confidential & Proprietary Application attack Trend (SMEs) 2018 2019 59.76% HTTP 40.24% HTTPS 81.18% HTTP 18.89% HTTPS 49.08% HTTP 50.92% HTTPS 2017
  • 11. © 2019 Nexusguard Limited – Confidential & Proprietary 3 out of 5 DDoS Attack targeted Enterprise 2017 13,739 DDoS attacks 2018 11,389 DDoS attacks
  • 12. © 2019 Nexusguard Limited – Confidential & Proprietary Q1 Perpetrators tapped into the attack with a huge amplification factor: Memcached attacks (51,000X) in Q1 2018 Q2 IoT-botnet generated attacks occasionally skyrocketed. It was caused by Satori evolving from Mirai to exploit zero-day vulnerabilities; Q3, Q4 Perpetrators employed a newly-adopted tactic of Amplification Attack, referred to as a "Bit-and-Piece” Attack, a hard-to-detect attack stealthily converging at the distinction by evading detection. 2018 Attack Trends Total 37,728 attacks (Successfully detected and mitigated by Nexusguard)
  • 13. Open Public DNS Servers Open Public DNS Servers Open Public DNS Servers Open Public DNS Servers Victim Bot Open Public DNS Servers Amplified attack traffic Attacker sending Command to Bot Small DNS request and spoofed source IP to Victim BotBot 51,000 times!
  • 14. © 2019 Nexusguard Limited – Confidential & Proprietary The Age of IoT The Botnet Outbreak
  • 15. © 2019 Nexusguard Limited – Confidential & Proprietary Outbreak of IoT Botnet Since the release of its source code in August of 2016, the number of IoT botnets greatly grew. The outbreak of the Mirai botnet was concurrent with the rise in the number and size of attacks in 2016 Q4 was concurrent with the outbreak of the Mirai like botnet. 2018 Q2, the dramatic rise in IoT botnet activity coincided with Satori malware exploits. Satori, a variant of the notorious Mirai malware, is designed to generate network-layer DDoS attacks by exploiting zero-day vulnerabilities in certain types of home routers. Today…
  • 16. © 2019 Nexusguard Limited – Confidential & Proprietary News of IoT Botnet
  • 17. © 2019 Nexusguard Limited – Confidential & Proprietary Type of Bots (by Percentage) Before 2016 2019 > 90% is Computers and Servers > 60% is Mobile Devices
  • 18. © 2019 Nexusguard Limited – Confidential & Proprietary Attack sources of DDoS attack Q1 2019 Attack Sources(Application Attack) Percentage Mobile Devices Android (Samsung, Huawei, etc.) 39.00% IOS (iPhone, iPad and iPod) 21.34% Others (e.g. BlackBerry) 0.002% Computers and servers Windows 24.06% Macintosh 1.26% Others OS’s 6.73% Others Playstation, Smart TV, Smart Hub, etc. 7.61% • Capture from REAL application attack daily. Counting base on application attack’s source IPs. (Application attack can’t use spoofed IP) • Over 90% attack come from computer before 2017. Over 60% of attack come from Mobile Devices, now. • Problem not only come from poor security devices, poor security awareness also is the root cause.
  • 19. © 2019 Nexusguard Limited – Confidential & Proprietary 360° DDoS Protection from a Partner You Can Trust
  • 20. © 2019 Nexusguard Limited – Confidential & Proprietary Our Offering - 360° DDoS Protection Our cloud-based 3-pillar Cybersecurity Platform Application Protection, Origin Protection, DNS Protection provides comprehensive protection on websites, applications, backend infrastructure and DNS servers, from the latest threats.
  • 21. © 2019 Nexusguard Limited – Confidential & Proprietary Our Difference Our own R&D Our own Technology Our own Infrastructure Our Products - Attack Study Lab - Product Development - Real time Data & Report - Automated Intelligence - Multi layered Mitigation - Global + Local Scrubbing - Nexusguard Technology - Dandelion Network - Application Protection - Origin Protection - DNS Protection - Infra Protect Highly customizable solutions with white glove services To secure access and performance for up-time protection, in compliance with PCI DSS, ISO 27001 and Data Sovereignty Premium Sector High Demand Organizations TAP (Transformational Alliance Partner) Program Innovation in technology and solutions for entire supply chain Service Provider Sector Telco, Hosting, Data Center Offerings from Proprietary Design Strategies based on proprietary Product design Pure-play expert in DDoS mitigation since 2008; Purpose built platforms to future-proof businesses across the entire performance value chain; End-to-end full service
  • 22. © 2019 Nexusguard Limited – Confidential & Proprietary Look forward to Growing with Your Business www.nexusguard.com