Your SlideShare is downloading. ×
Arbor Networks customer case study: depulsio
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Arbor Networks customer case study: depulsio

1,187

Published on

Tom Bienkowski, Director of Product Marketing for Arbor Networks and Harald Krimmel from circular Informationssyteme GmbH talk about how depulsio is utilizing the entire Arbor solution to deliver a …

Tom Bienkowski, Director of Product Marketing for Arbor Networks and Harald Krimmel from circular Informationssyteme GmbH talk about how depulsio is utilizing the entire Arbor solution to deliver a new in-cloud managed DDoS protection service from a new company they created called depulsio.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,187
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
75
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Examples include…
  • Examples include…
  • Examples include…
  • Transcript

    • 1. Customer Solution Brief Harald Krimmel – Senior Consultant,circular Informationssysteme GmbH / depulsio November 2012
    • 2. CustomerSolution Brief:Harald Krimmel– circularInformationssysteme GmbH /depulsioNovember 2012Tom BienkowskiDirector of Product Marketing, Arbor Networks
    • 3. The Customer Harald Krimmel – Senior Consultant, circular Informationssysteme GmbH & depulsio – Responsible for bringing DDoS Protection Services to German market. – Services include:  IT strategy consulting, security consulting, project planning, hardware and software delivery and systems integration. – DDoS Protection solutions are customized to customer needs. Page 3 – Company Confidential
    • 4. A Long Relationship with Arbor Networks circular and Arbor have had a relationship for 7 years. circular has become and expert in DDoS Protection circular’s portfolio of services consist of “best of breed” products such as Arbor’s Peakflow solution which is the market leader in DDoS Protection. Page 4 – Company Confidential
    • 5. depulsio DDoS Protection Services depulsio – A new managed security services company that offers data center and carrier independent DDoS Protection Services. What drove the creation of depulsio? – Customers demand data center availability of 99.999%. – But in many of today’s data centers DDoS Protection doesn’t exist. – depulsio is an independent Managed Security Service Provider who offers cloud-based DDoS Protection services to everyone. Page 5 – Company Confidential
    • 6. depulsio - DDoS Protection Services  depulsio is the 1st carrier and data center independent Managed DDoS Protection Service Provider in Germany. Page 6 – Company Confidential
    • 7. DDoS in the News…7 Page 7 – Company Confidential
    • 8. You Know the Impact of DDoS Attacks… Botnets & DDoS attacks cost an average enterprise $6.3M* for a 24-hour outage * Source: McAfee – Into the Crossfire – January 2010Source: Ponemon Institute – 2010 State of Web Application Security Page 8 – Company Confidential
    • 9. Large and Small are Potential TargetsFact: As long as your business is Internet facing, it is vulnerable to DDoS attacks. SMB Large Enterprise E-Commerce Government Page 9 – Company Confidential
    • 10. DDoS Attacks are Increasing More Attack Motivations Greater Availability of Botnets• Geopolitical “Burma taken offline by DDOS attack”• Protests “Visa, PayPal, and MasterCard attacked”• Extortion “Techwatch weathers DDoS extortion attack” + • Better Bots More infected PCs with faster connections • Easy Access Using web 2.0 tools to control botnets • Commoditized Cloud-based botnets, cheaper Increased Volume Increased Complexity Increased Frequency Largest volumetric DDoS has Over quarter of attacks are now More than 50% of data center grown from 9 to 100 Gbps in 5 years application-based DDoS mostly operators are seeing more than targeting HTTP, DNS, SMTP 10 attacks per month Page 10 – Company Confidential
    • 11. Two Types of DDoS Attacks Page 11 – Company Confidential
    • 12. Volumetric DDoS AttacksVolumetric DDoS attacks are designed to saturate and overwhelm network resources, circuits etc. DATA CENTER Firewall IPS Load Balancer Page 12 – Company Confidential
    • 13. Application Layer DDoS Attacks Use much less bandwidth; harder to detect; targetapplications where they slowly exhaust resources. DATA CENTER Exhaustion Firewall IPS Load Balancer Exhaustion Page 13 – Company Confidential
    • 14. The Evolving Threat Against Data Centers Attackers Use a Combination of Both Application-Layer DDoS Impact DATA CENTER Firewall IPS Load Balancer Volumetric DDoS Impact Page 14 – Company Confidential
    • 15. So What’s The Solution? Page 15 – Company Confidential
    • 16. Two Types of DDoS Attacks Page 16 – Company Confidential
    • 17. Volumetric DDoS AttacksVolumetric DDoS attacks are designed to saturate and overwhelm network resources, circuits etc. DATA CENTER Firewall IPS Load Balancer Page 17 – Company Confidential
    • 18. Application Layer DDoS Attacks Use much less bandwidth; harder to detect; targetapplications where they slowly exhaust resources. DATA CENTER Exhaustion Firewall IPS Load Balancer Exhaustion Page 18 – Company Confidential
    • 19. The Evolving Threat Against Data Centers Attackers Use a Combination of Both Application-Layer DDoS Impact DATA CENTER Firewall IPS Load Balancer Volumetric DDoS Impact Page 19 – Company Confidential
    • 20. So What’s The Solution? Page 20 – Company Confidential
    • 21. The Need for Intelligent DDoS Mitigation SystemsFact: Firewalls & IPS Cannot Stop DDOS Attacks  DDoS attack traffic flows through untouched.  DDoS attacks exhaust TCP state tables. Page 21 – Company Confidential
    • 22. Arbor’s Intelligent, Layered DDoS Protection Solution In-Cloud DDoS Protection  Block volumetric attacks before they reach the customer infrastructure Peakflow SP & TMS Cloud Signaling “I need help!” DATA CENTER Firewall IPS Load Balancer Pravail APS CPE-Based DDoS Protection Stop application DDoS attacks on the customer premise Backed by industry leading expertise of ASERT Page 22 – Company Confidential
    • 23. Arbor Based DDoS Protection Services In-cloud protection from volumetric attacks with Arbor’s Peakflow SP & TMS. – Traditional security solutions such as firewalls or IPS can not offer DDoS protection. Peakflow SP used for pervasive network visibility and DDoS attack detection Threat Management System (TMS) used surgical mitigation of DDoS attacks. Page 23 – Company Confidential
    • 24. Arbor Based DDoS Protection Services Data Center-based protection from application- layer DDoS attacks with Pravail APS. Page 24 – Company Confidential
    • 25. Comprehensive DDoS Protection Arbor Peakflow SP & TMS Page 25 – Company Confidential
    • 26. depulsio DDoS Protection Services1) In-cloud Managed DDoS Protection (reactive mitigation only)2) In-cloud Managed DDoS Protection + Monitoring (proactive)3) In-cloud Managed DDoS Protection + Monitoring + Data Center-based protection from application-layer attacks + Cloud Signaling for “help” scenarios. Page 26 – Company Confidential
    • 27. For More Information Visit: www.arbornetworks.com Page 27 – Company Confidential
    • 28. Questions? Thank You!Tom BienkowskiDirector of Product MarketingArbor Networkstbienkowski@arbor.net

    ×