DDos Attacks and Web Threats: How to Protect Your Site & Information

1,095
-1

Published on

Hacking and data theft use to belong to expert hackers. Today, anybody can go online, download free hacking tools, and launch sophisticated Web attacks within minutes. Join InterDev as we host this webinar presented by Imperva to see these tools in action and learn how to protect your Website from these attacks.

Imperva's Web application cloud based security solution, specifically designed for small and mid-sized organizations, can secure your Website against attacks from free hacking tools such as Havij.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,095
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
39
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • The Imperva Incapsula solution does four key things: Improve website security, protect against DDoS attacks, Optimize website performance, and help fulfill PCI 6.6 Compliance.
  • There are two points to this slide. 1. The system is setup as a giant reverse proxy network. 2. All customers who are on the network are contributing to the safety of the entire network. As attacks happen throughout the network (the red alert symbol) we are able to analyze the security event data and globally apply rules to better protect all users on the network (the green checks).
  • DDos Attacks and Web Threats: How to Protect Your Site & Information

    1. 1. © 2013 Imperva, Inc. All rights reserved. DDos Attacks and Web Threats: How to Protect Your Site & Information Tina Shaw Account Executive 650-832-6087 tina.shaw@imperva.com
    2. 2. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -2
    3. 3. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -3
    4. 4. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -4
    5. 5. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -5
    6. 6. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -6
    7. 7. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -7
    8. 8. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -8
    9. 9. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -9
    10. 10. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -10
    11. 11. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -11
    12. 12. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -12
    13. 13. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -13
    14. 14. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -14
    15. 15. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -15
    16. 16. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -16
    17. 17. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -17
    18. 18. © 2013 Imperva, Inc. All rights reserved.  Low-Orbit Ion Canon (LOIC)  Purpose - DDoS  Windows desktop application, coded in C#  UDP/TCP/HTTP flooding Hacking Tools
    19. 19. © 2013 Imperva, Inc. All rights reserved. Hacker Forum Discussion Topics DoS is Another Tool in the Hacker Toolbox 16% 22% 19% 10% 12% 12% 9% spam dos/ddos SQL Injection zero-day shell code brute-force HTML Injection Source: Imperva. Covers July 2010 -July 2011 across 600,000 discussions
    20. 20. © 2013 Imperva, Inc. All rights reserved. A 100GB attack (Sept 24th) • Featured in eWeek on October 1, 2013 • The attack's load was distributed across our +350Gbps network. (each color represents a different data center)
    21. 21. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Overview Confidential21 Incapsula helps Website owners…
    22. 22. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Simplicity FlexibilityVersatility Imperva Incapsula Overview
    23. 23. © 2013 Imperva, Inc. All rights reserved. Versatility “The idea of recognizing your strengths and using them in as versatile a way as you can is cool to me.” - Frank Ocean ^
    24. 24. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Versatility Confidential24 By routing Website traffic through Incapsula, bad traffic is removed and good traffic is accelerated Web Application Firewall (WAF)Distributed Denial of Service (DDOS)Distributed Denial of Service (DDOS)Load BalancingLoad BalancingContent Delivery Network (CDN)
    25. 25. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula is Deployed as a Reverse Proxy Network 360 Global Threat Detection & Analysis: Enables early detection of threats and attack vectors and instant application of protection rules across the entire proxy network
    26. 26. © 2013 Imperva, Inc. All rights reserved. Incapsula’s Global Content Delivery Network Confidential26  Datacenters • Currently 15 Datacenters  USA (Ashville NC, Ashburn VA, Los Angles CA, San Jose CA, Chicago IL, Miami FL, Dallas TX, New York NY), London, Singapore, Israel, Amsterdam, Tokyo, Frankfurt, Sydney • Plans for another 4 Datacenters  Toronto, Hong Kong, Sao Paulo, and Milan  Data Across Borders • Customer data can be locked into (or out of) specific countries
    27. 27. © 2013 Imperva, Inc. All rights reserved. Simplicity “Life is really simple, but we insist on making it complicated.” - Confusius
    28. 28. © 2013 Imperva, Inc. All rights reserved. The Activation Email
    29. 29. © 2013 Imperva, Inc. All rights reserved. Creating a User Account
    30. 30. © 2013 Imperva, Inc. All rights reserved. Logging into Incapsula and adding a website Confidential30
    31. 31. © 2013 Imperva, Inc. All rights reserved. Incapsula Automatically Gathers Site Data Confidential31
    32. 32. © 2013 Imperva, Inc. All rights reserved. Changing DNS Settings
    33. 33. © 2013 Imperva, Inc. All rights reserved. Getting Lost in Go Daddy’s Horrible UI
    34. 34. © 2013 Imperva, Inc. All rights reserved. Updating DNS Records
    35. 35. © 2013 Imperva, Inc. All rights reserved. Completing Incapsula’s Setup
    36. 36. © 2013 Imperva, Inc. All rights reserved. The Website is Protected Confidential36
    37. 37. © 2013 Imperva, Inc. All rights reserved. Dashboard - Traffic Confidential37
    38. 38. © 2013 Imperva, Inc. All rights reserved. Dashboard - Traffic Confidential38
    39. 39. © 2013 Imperva, Inc. All rights reserved. Dashboard - Security Confidential39
    40. 40. © 2013 Imperva, Inc. All rights reserved. Dashboard - Performance Confidential40
    41. 41. © 2013 Imperva, Inc. All rights reserved. Dashboard – Datacenter Response Time Confidential41
    42. 42. © 2013 Imperva, Inc. All rights reserved. Dashboard – Recent Updates Confidential42
    43. 43. © 2013 Imperva, Inc. All rights reserved. Visits - CONFIDENTIAL -43
    44. 44. © 2013 Imperva, Inc. All rights reserved. Visits - More Confidential44
    45. 45. © 2013 Imperva, Inc. All rights reserved. Visits – Add to Whitelist Confidential45
    46. 46. © 2013 Imperva, Inc. All rights reserved. Settings - General Confidential46
    47. 47. © 2013 Imperva, Inc. All rights reserved. Settings – Login Protect Confidential47
    48. 48. © 2013 Imperva, Inc. All rights reserved. Settings - Performance Confidential48
    49. 49. © 2013 Imperva, Inc. All rights reserved. Settings - Performance Confidential49
    50. 50. © 2013 Imperva, Inc. All rights reserved. Settings - Notifications Confidential50
    51. 51. © 2013 Imperva, Inc. All rights reserved. Settings - Security Confidential51
    52. 52. © 2013 Imperva, Inc. All rights reserved. Settings - Security Confidential52
    53. 53. © 2013 Imperva, Inc. All rights reserved. Settings - WAF Confidential53
    54. 54. © 2013 Imperva, Inc. All rights reserved. Settings - WAF Confidential54
    55. 55. © 2013 Imperva, Inc. All rights reserved. Settings – WAF Whitelist Confidential55
    56. 56. © 2013 Imperva, Inc. All rights reserved. Settings – WAF Whitelist Confidential56
    57. 57. © 2013 Imperva, Inc. All rights reserved. Settings - Permissions Confidential57
    58. 58. © 2013 Imperva, Inc. All rights reserved. Flexible “I like forms that are flexible, that can let you feel creative.” -John Scofield ^
    59. 59. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Customer Sample Confidential59
    60. 60. © 2013 Imperva, Inc. All rights reserved. Incapsula Makes Security Simple Imperva Incapsula Simplicity FlexibilityVersatility
    61. 61. © 2013 Imperva, Inc. All rights reserved. Questions?

    ×