ירון אזרואל   רדוויר
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

ירון אזרואל רדוויר

on

  • 494 views

 

Statistics

Views

Total Views
494
Views on SlideShare
494
Embed Views
0

Actions

Likes
0
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

ירון אזרואל רדוויר Presentation Transcript

  • 1. Deploying and ProtectingApplications in the CloudYaron AzerualProduct Marketing Manager
  • 2. Agenda• Who is Radware?• A glance at recent local cyber attacks in the cloud• Making your ADC infrastructure Cloud Ready• Protecting your applications in the cloud Slide 2
  • 3. About RadwareOver 10,000 Customers Company Growth 167.0 144.1 108.9 94.6 88.6 77.6 81.4 68.4 54.8 38.4 43.3 43.7 14.1 4.9 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011Recognized ADC Market Leader Global Technology PartnersADC Magic Quadrant 2010 Slide 3
  • 4. Some Relevant Security AttacksRecent attacks by the Hacker – 0xOmar:• Some sites were brought down by DDoS attacks• Credit cards were stolen from other sites• One of the sites who suffered from data breaches was hosted on “dooble” – They thought they were well protected Slide 5
  • 5. Using a Shared ADC in a Hosted CloudEnd users, partners and employees Internet Cloud Data Center Shared ADC Hosted Hosted Hosted Hosted Hosted Customer … Customer D Customer C Customer B Customer A
  • 6. Making Your ADC Infrastructure Cloud Ready
  • 7. Data Center EvolutionEnd users, partners and employees Internet Data Center ADC layer remains physical and siloed Radware ADC-VXADC ADC ADC ADC
  • 8. Radware Virtual Application Delivery Infrastructure 3 ADC form factors: Plug-in – vADC instances for • Dedicated ADC • Can run on top Orchestration and Cloud and general • Radware ADC-VXTM of asystems specialized Management resources • Radware Alteoncomputing purpose VA • Provide datacenter foot print and cost per Fit any enterprise same ADC functionality regardless of form factor application requirements Virtualized Application Delivery Infrastructure• vADCs are integrated with the virtual infrastructure eco-system Virtualization Infrastructure – plug-in and SAN ADC through Radware’s vDirect™ SDK • Allows regarding all ADC form factors as Storage Network & one• vDirect™ is designed specifically Data Center Virtualized Enterprise for virtualized data pool of Application Delivery resources centers • Add special virtualization services for Application Delivery Slide 9
  • 9. ADC in the Cloud: Must Be Part of the End-to-End Automation Cloud Data CenterProvision vADC the Migrate across Automatically scale tofrom AppShapewhen ADC Fabric meet business needscatalogue is maxed out capacity Cloud Orchestrator • Full integration with Cloud management & orchestration systems Gold Customer A Silver • Faster application rollout Virtualized Application Delivery Infrastructure • Seamless scalability • Maximum ADC agility Silver Customer A • Higher resiliency • Lower costs
  • 10. Segregating Service in the Cloud, Containing the RiskEnd users, partners and employees Internet Cloud Data Center Virtual ADC per Customer Hosted Hosted Hosted Hosted Hosted Customer … Customer D Customer C Customer B Customer A
  • 11. Protecting Your Applications In The Cloud
  • 12. Network and Data Security Attacks: From the NewsCost of Breach:of Attack:Cost of Attack: Cost • Reputation loss$80M to recover the theft • Reputation loss • Customer churn • Penalties to trading firms • Authority investigation Slide 13
  • 13. Multi-Vulnerability Attack Campaigns Large volume network flood attacks Large volume SYN floodRadware security incidents report 2011: Connection DoS attacks• More Business of Radware reported cases in 2011 than 70% involved at least 3 attack vectors• Attackers use multi-vulnerability attack campaigns attack: Slowloris Directed Application DoS making mitigation nearly impossible HTTP & HTTPS flood attacks Slide 14
  • 14. Attackers Seek for Blind SpotsDoS ProtectionIPS Large-volume network flood attacks Large-volume SYN flood Connection DoS attacks Business Why are multi-vulnerability attacks so successful? • Current security practices fail to mitigate attacks Directed DoS attack: Slowloris • Organizations deploy point security solutions HTTP & HTTPS flood attacks • Lack of expertise to analyze emerging threats Slide 15
  • 15. Mapping Security Protection ToolsDoS ProtectionBehavioral Analysis Large volume network flood attacksIPSIP Rep. Network scanWAF Intrusion Port scan SYN flood attack “Low & Slow” DoS attacks (e.g.Sockstress) Application vulnerability, malware High and slow Application DoS attacks Web attacks: XSS, Brute force Web attacks: SQL Injection Slide 16
  • 16. Common Security StrategyDOS NBAWAF IPS • Many point security tools • Need to be in sync • Need to be tuned in real time Slide 17
  • 17. Holistic Security Strategy• “Behavior-based security capabilities are well-suited to emerging threats and illustrate Radwares commitment to integrated security capabilities.” Gartner ADC Magic Quadrant 2010• “Radware focus on behavioral assessment is unique… this puts Radware in a strong position to address emerging threats.” Gartner IPS Magic Quadrant 2009• NSS Labs’ Rating: Recommended “Only the top technical products earn a recommend rating from NSS Labs” Slide 18
  • 18. Summary
  • 19. SummaryEnsure continuous cloud service availabilityEven when under multi-vector attacksEnsure SLA per customer and per applicationImprove customer experience at all timesCut deployment and maintenance cost by 20-50% Slide 20
  • 20. Thank Youwww.radware.com