0
Customer Solution Brief           Harald Krimmel – Senior Consultant,circular Informationssysteme GmbH / depulsio         ...
CustomerSolution Brief:Harald Krimmel– circularInformationssysteme GmbH /depulsioNovember 2012Tom BienkowskiDirector of Pr...
The Customer Harald Krimmel – Senior Consultant, circular  Informationssysteme GmbH & depulsio  – Responsible for bringin...
A Long Relationship with Arbor Networks circular and Arbor have had a relationship for 7  years. circular has become and...
depulsio   DDoS Protection Services depulsio – A new managed security services  company that offers data center and carri...
depulsio - DDoS Protection Services  depulsio is the 1st carrier and data center   independent Managed DDoS Protection Se...
DDoS in the News…7           Page 7 – Company Confidential
You Know the Impact of DDoS Attacks…                                                                                      ...
Large and Small are Potential TargetsFact: As long as your business is Internet facing, it is             vulnerable to DD...
DDoS Attacks are Increasing    More Attack Motivations                                         Greater Availability of Bot...
Two Types of DDoS Attacks              Page 11 – Company Confidential
Volumetric DDoS AttacksVolumetric DDoS attacks are designed to saturate and     overwhelm network resources, circuits etc....
Application Layer DDoS Attacks Use much less bandwidth; harder to detect; targetapplications where they slowly exhaust res...
The Evolving Threat Against Data Centers      Attackers Use a Combination of Both                                         ...
So What’s The Solution?              Page 15 – Company Confidential
Two Types of DDoS Attacks              Page 16 – Company Confidential
Volumetric DDoS AttacksVolumetric DDoS attacks are designed to saturate and     overwhelm network resources, circuits etc....
Application Layer DDoS Attacks Use much less bandwidth; harder to detect; targetapplications where they slowly exhaust res...
The Evolving Threat Against Data Centers      Attackers Use a Combination of Both                                         ...
So What’s The Solution?              Page 20 – Company Confidential
The Need for Intelligent DDoS Mitigation SystemsFact: Firewalls & IPS Cannot Stop DDOS Attacks   DDoS attack traffic flow...
Arbor’s Intelligent, Layered DDoS Protection Solution                                                                     ...
Arbor Based DDoS Protection Services In-cloud protection from volumetric attacks with  Arbor’s Peakflow SP & TMS.  – Trad...
Arbor Based DDoS Protection Services Data Center-based protection from application-  layer DDoS attacks with Pravail APS....
Comprehensive DDoS Protection   Arbor Peakflow SP & TMS                             Page 25 – Company Confidential
depulsio DDoS Protection Services1) In-cloud Managed DDoS Protection (reactive   mitigation only)2) In-cloud Managed DDoS ...
For More Information Visit: www.arbornetworks.com                 Page 27 – Company Confidential
Questions? Thank You!Tom BienkowskiDirector of Product MarketingArbor Networkstbienkowski@arbor.net
Upcoming SlideShare
Loading in...5
×

Arbor Networks customer case study: depulsio

1,272

Published on

Tom Bienkowski, Director of Product Marketing for Arbor Networks and Harald Krimmel from circular Informationssyteme GmbH talk about how depulsio is utilizing the entire Arbor solution to deliver a new in-cloud managed DDoS protection service from a new company they created called depulsio.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,272
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
78
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Examples include…
  • Examples include…
  • Examples include…
  • Transcript of "Arbor Networks customer case study: depulsio"

    1. 1. Customer Solution Brief Harald Krimmel – Senior Consultant,circular Informationssysteme GmbH / depulsio November 2012
    2. 2. CustomerSolution Brief:Harald Krimmel– circularInformationssysteme GmbH /depulsioNovember 2012Tom BienkowskiDirector of Product Marketing, Arbor Networks
    3. 3. The Customer Harald Krimmel – Senior Consultant, circular Informationssysteme GmbH & depulsio – Responsible for bringing DDoS Protection Services to German market. – Services include:  IT strategy consulting, security consulting, project planning, hardware and software delivery and systems integration. – DDoS Protection solutions are customized to customer needs. Page 3 – Company Confidential
    4. 4. A Long Relationship with Arbor Networks circular and Arbor have had a relationship for 7 years. circular has become and expert in DDoS Protection circular’s portfolio of services consist of “best of breed” products such as Arbor’s Peakflow solution which is the market leader in DDoS Protection. Page 4 – Company Confidential
    5. 5. depulsio DDoS Protection Services depulsio – A new managed security services company that offers data center and carrier independent DDoS Protection Services. What drove the creation of depulsio? – Customers demand data center availability of 99.999%. – But in many of today’s data centers DDoS Protection doesn’t exist. – depulsio is an independent Managed Security Service Provider who offers cloud-based DDoS Protection services to everyone. Page 5 – Company Confidential
    6. 6. depulsio - DDoS Protection Services  depulsio is the 1st carrier and data center independent Managed DDoS Protection Service Provider in Germany. Page 6 – Company Confidential
    7. 7. DDoS in the News…7 Page 7 – Company Confidential
    8. 8. You Know the Impact of DDoS Attacks… Botnets & DDoS attacks cost an average enterprise $6.3M* for a 24-hour outage * Source: McAfee – Into the Crossfire – January 2010Source: Ponemon Institute – 2010 State of Web Application Security Page 8 – Company Confidential
    9. 9. Large and Small are Potential TargetsFact: As long as your business is Internet facing, it is vulnerable to DDoS attacks. SMB Large Enterprise E-Commerce Government Page 9 – Company Confidential
    10. 10. DDoS Attacks are Increasing More Attack Motivations Greater Availability of Botnets• Geopolitical “Burma taken offline by DDOS attack”• Protests “Visa, PayPal, and MasterCard attacked”• Extortion “Techwatch weathers DDoS extortion attack” + • Better Bots More infected PCs with faster connections • Easy Access Using web 2.0 tools to control botnets • Commoditized Cloud-based botnets, cheaper Increased Volume Increased Complexity Increased Frequency Largest volumetric DDoS has Over quarter of attacks are now More than 50% of data center grown from 9 to 100 Gbps in 5 years application-based DDoS mostly operators are seeing more than targeting HTTP, DNS, SMTP 10 attacks per month Page 10 – Company Confidential
    11. 11. Two Types of DDoS Attacks Page 11 – Company Confidential
    12. 12. Volumetric DDoS AttacksVolumetric DDoS attacks are designed to saturate and overwhelm network resources, circuits etc. DATA CENTER Firewall IPS Load Balancer Page 12 – Company Confidential
    13. 13. Application Layer DDoS Attacks Use much less bandwidth; harder to detect; targetapplications where they slowly exhaust resources. DATA CENTER Exhaustion Firewall IPS Load Balancer Exhaustion Page 13 – Company Confidential
    14. 14. The Evolving Threat Against Data Centers Attackers Use a Combination of Both Application-Layer DDoS Impact DATA CENTER Firewall IPS Load Balancer Volumetric DDoS Impact Page 14 – Company Confidential
    15. 15. So What’s The Solution? Page 15 – Company Confidential
    16. 16. Two Types of DDoS Attacks Page 16 – Company Confidential
    17. 17. Volumetric DDoS AttacksVolumetric DDoS attacks are designed to saturate and overwhelm network resources, circuits etc. DATA CENTER Firewall IPS Load Balancer Page 17 – Company Confidential
    18. 18. Application Layer DDoS Attacks Use much less bandwidth; harder to detect; targetapplications where they slowly exhaust resources. DATA CENTER Exhaustion Firewall IPS Load Balancer Exhaustion Page 18 – Company Confidential
    19. 19. The Evolving Threat Against Data Centers Attackers Use a Combination of Both Application-Layer DDoS Impact DATA CENTER Firewall IPS Load Balancer Volumetric DDoS Impact Page 19 – Company Confidential
    20. 20. So What’s The Solution? Page 20 – Company Confidential
    21. 21. The Need for Intelligent DDoS Mitigation SystemsFact: Firewalls & IPS Cannot Stop DDOS Attacks  DDoS attack traffic flows through untouched.  DDoS attacks exhaust TCP state tables. Page 21 – Company Confidential
    22. 22. Arbor’s Intelligent, Layered DDoS Protection Solution In-Cloud DDoS Protection  Block volumetric attacks before they reach the customer infrastructure Peakflow SP & TMS Cloud Signaling “I need help!” DATA CENTER Firewall IPS Load Balancer Pravail APS CPE-Based DDoS Protection Stop application DDoS attacks on the customer premise Backed by industry leading expertise of ASERT Page 22 – Company Confidential
    23. 23. Arbor Based DDoS Protection Services In-cloud protection from volumetric attacks with Arbor’s Peakflow SP & TMS. – Traditional security solutions such as firewalls or IPS can not offer DDoS protection. Peakflow SP used for pervasive network visibility and DDoS attack detection Threat Management System (TMS) used surgical mitigation of DDoS attacks. Page 23 – Company Confidential
    24. 24. Arbor Based DDoS Protection Services Data Center-based protection from application- layer DDoS attacks with Pravail APS. Page 24 – Company Confidential
    25. 25. Comprehensive DDoS Protection Arbor Peakflow SP & TMS Page 25 – Company Confidential
    26. 26. depulsio DDoS Protection Services1) In-cloud Managed DDoS Protection (reactive mitigation only)2) In-cloud Managed DDoS Protection + Monitoring (proactive)3) In-cloud Managed DDoS Protection + Monitoring + Data Center-based protection from application-layer attacks + Cloud Signaling for “help” scenarios. Page 26 – Company Confidential
    27. 27. For More Information Visit: www.arbornetworks.com Page 27 – Company Confidential
    28. 28. Questions? Thank You!Tom BienkowskiDirector of Product MarketingArbor Networkstbienkowski@arbor.net
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×