Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke

2,250 views

Published on

Most businesses are aware that the DDoS threat is real, but are they aware of the business impacts of cyber security compromises? Companies must be prepared to face not only the $100,000+ costs associated with DDoS attacks, but also the loss of customer trust and damage to their brand as a result of leaked personal information.

Is your company adequately protected against the growing number of DDoS security threats?

For more information, please visit neustar.biz.

Published in: Internet
  • D0WNL0AD FULL ▶ ▶ ▶ ▶ http://1lite.top/f922s ◀ ◀ ◀ ◀
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke

  1. 1. © 2015 Neustar, Inc. All Rights Reserved. A RESPONDER’S GUIDE TO SEEING CLEARLY THROUGH THE SMOKE DDoS ATTACKS
  2. 2. MOST BUSINESSES ARE AWARE THAT THE DDOS THREAT IS REAL. of responders view DDoS attacks as A GROWING THREAT TO THEIR ORGANIZATION. report that their organization is INVESTING MORE OF ITS ANNUAL BUDGET TO DEFEND AGAINST DDOS ATTACKS. RECOGNIZING RISK 40% 51% © 2015 Neustar, Inc. All Rights Reserved.
  3. 3. SECURITY AWARENESS DDoS attacks are occurring more frequently and defense spending is growing. OVER 40% are investing more in DDoS protection versus last year. NEARLY 51% say their investment should be larger. © 2015 Neustar, Inc. All Rights Reserved.
  4. 4. “The use of website stressor services, which lets anyone take down a website for as little as six dollars an hour—has become a major source of irritant attacks, with the sizes jumping during 2014. Increasing mitigation capacity alone simply isn’t enough, and in fact will only encourage larger attacks. We have to become more strategic.” Rodney Joffe Senior Vice President, Neustar © 2015 Neustar, Inc. All Rights Reserved.
  5. 5. FREQUENCY AND COST FREQUENCY OF ATTACKS: 88% of companies are hit multiple times, with 39% attacked over 10 times annually. Attack frequency: • Once 12% • 2-5 times 36% • 6-10 times 13% • About every month 18% • About every week 9% • Lost count 12% COST OF ATTACKS: 1 in 3 companies (32%) would lose over $100k-$250k of revenue per hour. • Less than $25K 18% • $29K-$49K 5% • $50K-$99K 6% • $100K-$249K 8% • $250K-$499K 6% • $500K-$1M 7% • $1M+ 11% • Don’t know 39% © 2015 Neustar, Inc. All Rights Reserved.
  6. 6. 40% of those who were attacked in 2014 REPORT THAT MORE THAN 10 STAFF WOULD BE INVOLVED IN MITIGATION. DIVERSE ATTACKS, LABOR INTENSE MITIGATION DDoS attacks come in a wide variety of bandwidth sizes, FROM 500 MBPS TO MORE THAN 100 GBPS. © 2015 Neustar, Inc. All Rights Reserved.
  7. 7. “The reputation of the business is at risk. Having the availability or performance of a highly visible service or resource impacted by a DDoS attack suggests that the company is not prepared from a security perspective and that the lack of preparation may extend into other security-related areas such as their customers’ personally identifiable information (PII) or their own intellectual property (IP).” Bryant Rump Senior Sales Engineer, Neustar © 2015 Neustar, Inc. All Rights Reserved.
  8. 8. ATTACK SIZE IN BANDWIDTH • 500-999 Mbps 22% • 1-4.9 Gbps 20% • 5-9.9 Gbps 16% • 10-19.9 Gbps 11% • 20-49.9 Gbps 8% • 50-100 Gbps 5% • 100+ Gbps 1% • Don’t know 11% IS YOUR COMPANY PREPARED TO FEND OFF ATTACKS OF ALL SIZES? © 2015 Neustar, Inc. All Rights Reserved.
  9. 9. THE REAL IMPACT of those who experienced a DDoS attack in 2014 report they suffered a loss of customer trust and damage to their brand. say the most common area of business affected by an outage from a DDoS attack is customer support. say attacks caused brand damage and eroded customer trust 31% 51% 40% Other impacted areas include: • Online marketing 18% • Revenue 18% • Data theft 12% • Other 28% © 2015 Neustar, Inc. All Rights Reserved.
  10. 10. Amit Yoran RSA president “No matter how high or smart the walls, focused adversaries will find ways over, under, around, and through.You must understand what matters to your business and what is mission critical [and] defend it with everything you have.” © 2015 Neustar, Inc. All Rights Reserved.
  11. 11. CURRENT PROTECTION IS NOT ENOUGH SECURITY METHOD: 61% use a traditional firewall, 51% use switches and routers, and 49% use a DDoS mitigation service. • Traditional firewall ISP-based 61% • WAF, switches and routers 51% • DDoS mitigation service 49% • Hybrid protection 31% • DDoS mitigation appliance 26% • WAF 20% • CDN 14% • No protection 3% RESPONSE TIME: 41% took more than an hour to detect it; 45% took more than an hour to respond once they detected the attack. Response time after detection: • Less than an hour 59% • 1-2 hours 24% • 3-5 hours 8% • 6-12 hours 4% • 12-24 hours 3% • More than a day 2% © 2015 Neustar, Inc. All Rights Reserved.
  12. 12. 3 KEYS TO PREVENTING AND MITIGATING DDoS ATTACKS © 2015 Neustar, Inc. All Rights Reserved.
  13. 13. RECOGNIZE DDoS AS A THREAT Of the directors and managers who are buyers, 65% BELIEVE DDoS IS A SERIOUS ISSUE. Ensure buy-in on increasing security measures from the CMO and other C-suite executives. More organizations are demanding DDoS mitigation solutions. 1 © 2015 Neustar, Inc. All Rights Reserved.
  14. 14. INCREASE YOUR SECURITY INVESTMENTS Over 50% are INVESTING MORE IN PROTECTION than a year ago. Review your current investment and gauge how much you need to increase in order to be better protected. 2 © 2015 Neustar, Inc. All Rights Reserved.
  15. 15. ADOPT A HYBRID STRATEGY Over 30% of companies have ADOPTED A HYBRID DEFENSE. With always on, on-premises hardware blocking attacks instantly, plus cloud-based traffic-scrubbing to handle larger strikes, hybrid solutions offer the best of both worlds. 3 “As DDoS attack characteristics become more complex, organizations are finding value in ‘hybrid’ DDoS mitigation strategies, driving new alliances and acquisitions among complementary DDoS mitigation solution providers.” – Gartner Research, Competitive Landscape: DDoS Mitigation Solutions, October 20 14 © 2015 Neustar, Inc. All Rights Reserved.
  16. 16. THE BOTTOM LINE Even if you don’t see super-sized attacks, your business is still impacted across its operations—respond by investing in layered DDoS defenses. In a sector where large attacks derail online promotions, technology companies need to spend more to protect their marketing investments. Faced with recurring attacks and substantial revenue to protect, retailers must adopt hybrid solutions at a brisk clip. 1. 2. 3. © 2015 Neustar, Inc. All Rights Reserved.
  17. 17. To mitigate DDoS attacks, Neustar blends expertise, proven responses, and diverse technologies. Neustar SiteProtect, our DDoS mitigation service, offers options to meet your level of risk, budget, and technical environment: cloud-based protection; on-premise, always-on hardware; or a hybrid of both, fully managed by us. SiteProtect is backed by the Neustar Security Operations Center, whose experts bring years of experience to blocking every attack. *All data contained in this report is from US companies in 2014 Learn more about DDoS protection at http://www.neustar.biz. © 2015 Neustar, Inc. All Rights Reserved.
  18. 18. ABOUT NEUSTAR Neustar, Inc. (NYSE:NSR) is the first real-time provider of cloud-based information services and data analytics, enabling marketing and IT security professionals to promote and protect their businesses. With a commitment to privacy and neutrality, Neustar operates complex data registries and uses its expertise to deliver actionable, data-driven insights that help clients make high-value business decisions in real time, one customer interaction at a time. © 2015 Neustar, Inc. All Rights Reserved.

×