SlideShare a Scribd company logo
© 2015 Neustar, Inc. All Rights Reserved.
A RESPONDER’S GUIDE TO
SEEING CLEARLY THROUGH THE SMOKE
DDoS ATTACKS
MOST BUSINESSES ARE AWARE
THAT THE DDOS THREAT IS REAL.
of responders view DDoS attacks as
A GROWING THREAT TO THEIR ORGANIZATION.
report that their organization is
INVESTING MORE OF ITS ANNUAL BUDGET
TO DEFEND AGAINST DDOS ATTACKS.
RECOGNIZING RISK
40%
51%
© 2015 Neustar, Inc. All Rights Reserved.
SECURITY AWARENESS
DDoS attacks are occurring more frequently
and defense spending is growing.
OVER 40% are investing more in
DDoS protection versus last year.
NEARLY 51%
say their investment
should be larger.
© 2015 Neustar, Inc. All Rights Reserved.
“The use of website stressor services, which
lets anyone take down a website for as little
as six dollars an hour—has become a major
source of irritant attacks, with the sizes
jumping during 2014. Increasing mitigation
capacity alone simply isn’t enough, and in
fact will only encourage larger attacks.
We have to become more strategic.”
Rodney Joffe
Senior Vice President, Neustar
© 2015 Neustar, Inc. All Rights Reserved.
FREQUENCY AND COST
FREQUENCY OF ATTACKS:
88% of companies are hit multiple
times, with 39% attacked over
10 times annually.
Attack frequency:
• Once 12%
• 2-5 times 36%
• 6-10 times 13%
• About every month 18%
• About every week 9%
• Lost count 12%
COST OF ATTACKS:
1 in 3 companies (32%) would
lose over $100k-$250k of revenue
per hour.
• Less than $25K 18%
• $29K-$49K 5%
• $50K-$99K 6%
• $100K-$249K 8%
• $250K-$499K 6%
• $500K-$1M 7%
• $1M+ 11%
• Don’t know 39%
© 2015 Neustar, Inc. All Rights Reserved.
40% of those who were attacked in 2014
REPORT THAT MORE THAN 10 STAFF WOULD
BE INVOLVED IN MITIGATION.
DIVERSE ATTACKS, LABOR INTENSE MITIGATION
DDoS attacks come in a wide variety of bandwidth sizes,
FROM 500 MBPS TO MORE THAN 100 GBPS.
© 2015 Neustar, Inc. All Rights Reserved.
“The reputation of the business is at risk. Having the
availability or performance of a highly visible service or
resource impacted by a DDoS attack suggests that the
company is not prepared from a security perspective
and that the lack of preparation may extend into other
security-related areas such as their customers’
personally identifiable information (PII) or their own
intellectual property (IP).”
Bryant Rump
Senior Sales Engineer, Neustar
© 2015 Neustar, Inc. All Rights Reserved.
ATTACK SIZE IN BANDWIDTH
• 500-999 Mbps 22%
• 1-4.9 Gbps 20%
• 5-9.9 Gbps 16%
• 10-19.9 Gbps 11%
• 20-49.9 Gbps 8%
• 50-100 Gbps 5%
• 100+ Gbps 1%
• Don’t know 11%
IS YOUR COMPANY PREPARED TO
FEND OFF ATTACKS OF ALL SIZES?
© 2015 Neustar, Inc. All Rights Reserved.
THE REAL IMPACT
of those who experienced a
DDoS attack in 2014 report
they suffered a loss of
customer trust and damage
to their brand.
say the most common area
of business affected by an
outage from a DDoS attack is
customer support.
say attacks caused
brand damage and eroded
customer trust
31%
51%
40%
Other impacted areas include:
• Online marketing 18%
• Revenue 18%
• Data theft 12%
• Other 28%
© 2015 Neustar, Inc. All Rights Reserved.
Amit Yoran
RSA president
“No matter how high or smart the walls, focused adversaries
will find ways over, under, around, and through.You must
understand what matters to your business and what is
mission critical [and] defend it with everything you have.”
© 2015 Neustar, Inc. All Rights Reserved.
CURRENT PROTECTION IS NOT ENOUGH
SECURITY METHOD:
61% use a traditional firewall, 51%
use switches and routers, and 49%
use a DDoS mitigation service.
• Traditional firewall
ISP-based 61%
• WAF, switches and routers 51%
• DDoS mitigation service 49%
• Hybrid protection 31%
• DDoS mitigation appliance 26%
• WAF 20%
• CDN 14%
• No protection 3%
RESPONSE TIME:
41% took more than an hour to
detect it; 45% took more than an
hour to respond once they
detected the attack.
Response time after detection:
• Less than an hour 59%
• 1-2 hours 24%
• 3-5 hours 8%
• 6-12 hours 4%
• 12-24 hours 3%
• More than a day 2%
© 2015 Neustar, Inc. All Rights Reserved.
3 KEYS TO
PREVENTING
AND MITIGATING
DDoS ATTACKS
© 2015 Neustar, Inc. All Rights Reserved.
RECOGNIZE DDoS AS A THREAT
Of the directors and managers who are buyers,
65% BELIEVE DDoS IS A SERIOUS ISSUE.
Ensure buy-in on increasing security measures
from the CMO and other C-suite executives.
More organizations are demanding DDoS
mitigation solutions.
1
© 2015 Neustar, Inc. All Rights Reserved.
INCREASE YOUR SECURITY INVESTMENTS
Over 50% are INVESTING MORE IN PROTECTION
than a year ago.
Review your current investment and gauge how much
you need to increase in order to be better protected.
2
© 2015 Neustar, Inc. All Rights Reserved.
ADOPT A HYBRID STRATEGY
Over 30% of companies have
ADOPTED A HYBRID DEFENSE.
With always on, on-premises
hardware blocking attacks
instantly, plus cloud-based
traffic-scrubbing to handle
larger strikes, hybrid solutions
offer the best of both worlds.
3
“As DDoS attack characteristics
become more complex,
organizations are finding value
in ‘hybrid’ DDoS mitigation
strategies, driving new alliances
and acquisitions among
complementary DDoS
mitigation solution providers.”
– Gartner Research, Competitive
Landscape: DDoS Mitigation Solutions,
October 20 14
© 2015 Neustar, Inc. All Rights Reserved.
THE BOTTOM LINE
Even if you don’t see super-sized attacks, your business
is still impacted across its operations—respond by
investing in layered DDoS defenses.
In a sector where large attacks derail online
promotions, technology companies need to spend more
to protect their marketing investments.
Faced with recurring attacks and substantial revenue
to protect, retailers must adopt hybrid solutions at a
brisk clip.
1.
2.
3.
© 2015 Neustar, Inc. All Rights Reserved.
To mitigate DDoS attacks, Neustar blends expertise, proven
responses, and diverse technologies.
Neustar SiteProtect, our DDoS mitigation service, offers
options to meet your level of risk, budget, and technical
environment: cloud-based protection; on-premise, always-on
hardware; or a hybrid of both, fully managed by us.
SiteProtect is backed by the Neustar Security Operations
Center, whose experts bring years of experience to blocking
every attack.
*All data contained in this report is from US companies in 2014
Learn more about DDoS protection at
http://www.neustar.biz.
© 2015 Neustar, Inc. All Rights Reserved.
ABOUT NEUSTAR
Neustar, Inc. (NYSE:NSR) is the first real-time provider of
cloud-based information services and data analytics,
enabling marketing and IT security professionals to promote
and protect their businesses. With a commitment to privacy
and neutrality, Neustar operates complex data registries and
uses its expertise to deliver actionable, data-driven insights
that help clients make high-value business decisions in real
time, one customer interaction at a time.
© 2015 Neustar, Inc. All Rights Reserved.

More Related Content

What's hot

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
Veriato
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
marketingunitrends
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
Stanton Viaduc
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
African Cyber Security Summit
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
Fortis
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Rahul Neel Mani
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
Haltdos
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
African Cyber Security Summit
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
OpenDNS
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
marketingunitrends
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
OK2OK
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
Cloudflare
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
Haltdos
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
Haltdos
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
Armor
 
DDoS Hurts Everyone
DDoS Hurts EveryoneDDoS Hurts Everyone
DDoS Hurts Everyone
DNS Made Easy
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
NETSCOUT
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
Get up to Speed
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
NetworkCollaborators
 

What's hot (20)

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
 
How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
DDoS Hurts Everyone
DDoS Hurts EveryoneDDoS Hurts Everyone
DDoS Hurts Everyone
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 

Similar to A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke

Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Cloudflare
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS ProvidersNeil Hinton
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz Asia Pte Ltd
 
Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Hope Frank
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
Corero Network Security
 
The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFDominik Suter
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
Ideba
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
Tushar Mathur
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
ControlCase
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDos
GCC Computers
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
Aggregage
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
Radware
 
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report Highlights
APNIC
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
MazeBolt Technologies
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
Pedro Espinosa
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationR. Blake Martin
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docx
TheWalkerGroup1
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
Fujitsu Middle East
 

Similar to A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke (20)

Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS Providers
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016
 
Service Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS MitigationService Provider Deployment of DDoS Mitigation
Service Provider Deployment of DDoS Mitigation
 
The_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDFThe_Forrester_Wave_DDoS_S 2015Q3.PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDos
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report Highlights
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 
Navigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docxNavigating The Benefits of Firewall Managed Services.docx
Navigating The Benefits of Firewall Managed Services.docx
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 

More from Neustar, Inc.

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
Neustar, Inc.
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experience
Neustar, Inc.
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
Neustar, Inc.
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
Neustar, Inc.
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Neustar, Inc.
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra ExperienceNeustar, Inc.
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..
Neustar, Inc.
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
Neustar, Inc.
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
Neustar, Inc.
 
The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research Topics
Neustar, Inc.
 

More from Neustar, Inc. (11)

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experience
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
 
Adweek and Neustar
Adweek and NeustarAdweek and Neustar
Adweek and Neustar
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research Topics
 

Recently uploaded

Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 

Recently uploaded (20)

Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 

A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke

  • 1. © 2015 Neustar, Inc. All Rights Reserved. A RESPONDER’S GUIDE TO SEEING CLEARLY THROUGH THE SMOKE DDoS ATTACKS
  • 2. MOST BUSINESSES ARE AWARE THAT THE DDOS THREAT IS REAL. of responders view DDoS attacks as A GROWING THREAT TO THEIR ORGANIZATION. report that their organization is INVESTING MORE OF ITS ANNUAL BUDGET TO DEFEND AGAINST DDOS ATTACKS. RECOGNIZING RISK 40% 51% © 2015 Neustar, Inc. All Rights Reserved.
  • 3. SECURITY AWARENESS DDoS attacks are occurring more frequently and defense spending is growing. OVER 40% are investing more in DDoS protection versus last year. NEARLY 51% say their investment should be larger. © 2015 Neustar, Inc. All Rights Reserved.
  • 4. “The use of website stressor services, which lets anyone take down a website for as little as six dollars an hour—has become a major source of irritant attacks, with the sizes jumping during 2014. Increasing mitigation capacity alone simply isn’t enough, and in fact will only encourage larger attacks. We have to become more strategic.” Rodney Joffe Senior Vice President, Neustar © 2015 Neustar, Inc. All Rights Reserved.
  • 5. FREQUENCY AND COST FREQUENCY OF ATTACKS: 88% of companies are hit multiple times, with 39% attacked over 10 times annually. Attack frequency: • Once 12% • 2-5 times 36% • 6-10 times 13% • About every month 18% • About every week 9% • Lost count 12% COST OF ATTACKS: 1 in 3 companies (32%) would lose over $100k-$250k of revenue per hour. • Less than $25K 18% • $29K-$49K 5% • $50K-$99K 6% • $100K-$249K 8% • $250K-$499K 6% • $500K-$1M 7% • $1M+ 11% • Don’t know 39% © 2015 Neustar, Inc. All Rights Reserved.
  • 6. 40% of those who were attacked in 2014 REPORT THAT MORE THAN 10 STAFF WOULD BE INVOLVED IN MITIGATION. DIVERSE ATTACKS, LABOR INTENSE MITIGATION DDoS attacks come in a wide variety of bandwidth sizes, FROM 500 MBPS TO MORE THAN 100 GBPS. © 2015 Neustar, Inc. All Rights Reserved.
  • 7. “The reputation of the business is at risk. Having the availability or performance of a highly visible service or resource impacted by a DDoS attack suggests that the company is not prepared from a security perspective and that the lack of preparation may extend into other security-related areas such as their customers’ personally identifiable information (PII) or their own intellectual property (IP).” Bryant Rump Senior Sales Engineer, Neustar © 2015 Neustar, Inc. All Rights Reserved.
  • 8. ATTACK SIZE IN BANDWIDTH • 500-999 Mbps 22% • 1-4.9 Gbps 20% • 5-9.9 Gbps 16% • 10-19.9 Gbps 11% • 20-49.9 Gbps 8% • 50-100 Gbps 5% • 100+ Gbps 1% • Don’t know 11% IS YOUR COMPANY PREPARED TO FEND OFF ATTACKS OF ALL SIZES? © 2015 Neustar, Inc. All Rights Reserved.
  • 9. THE REAL IMPACT of those who experienced a DDoS attack in 2014 report they suffered a loss of customer trust and damage to their brand. say the most common area of business affected by an outage from a DDoS attack is customer support. say attacks caused brand damage and eroded customer trust 31% 51% 40% Other impacted areas include: • Online marketing 18% • Revenue 18% • Data theft 12% • Other 28% © 2015 Neustar, Inc. All Rights Reserved.
  • 10. Amit Yoran RSA president “No matter how high or smart the walls, focused adversaries will find ways over, under, around, and through.You must understand what matters to your business and what is mission critical [and] defend it with everything you have.” © 2015 Neustar, Inc. All Rights Reserved.
  • 11. CURRENT PROTECTION IS NOT ENOUGH SECURITY METHOD: 61% use a traditional firewall, 51% use switches and routers, and 49% use a DDoS mitigation service. • Traditional firewall ISP-based 61% • WAF, switches and routers 51% • DDoS mitigation service 49% • Hybrid protection 31% • DDoS mitigation appliance 26% • WAF 20% • CDN 14% • No protection 3% RESPONSE TIME: 41% took more than an hour to detect it; 45% took more than an hour to respond once they detected the attack. Response time after detection: • Less than an hour 59% • 1-2 hours 24% • 3-5 hours 8% • 6-12 hours 4% • 12-24 hours 3% • More than a day 2% © 2015 Neustar, Inc. All Rights Reserved.
  • 12. 3 KEYS TO PREVENTING AND MITIGATING DDoS ATTACKS © 2015 Neustar, Inc. All Rights Reserved.
  • 13. RECOGNIZE DDoS AS A THREAT Of the directors and managers who are buyers, 65% BELIEVE DDoS IS A SERIOUS ISSUE. Ensure buy-in on increasing security measures from the CMO and other C-suite executives. More organizations are demanding DDoS mitigation solutions. 1 © 2015 Neustar, Inc. All Rights Reserved.
  • 14. INCREASE YOUR SECURITY INVESTMENTS Over 50% are INVESTING MORE IN PROTECTION than a year ago. Review your current investment and gauge how much you need to increase in order to be better protected. 2 © 2015 Neustar, Inc. All Rights Reserved.
  • 15. ADOPT A HYBRID STRATEGY Over 30% of companies have ADOPTED A HYBRID DEFENSE. With always on, on-premises hardware blocking attacks instantly, plus cloud-based traffic-scrubbing to handle larger strikes, hybrid solutions offer the best of both worlds. 3 “As DDoS attack characteristics become more complex, organizations are finding value in ‘hybrid’ DDoS mitigation strategies, driving new alliances and acquisitions among complementary DDoS mitigation solution providers.” – Gartner Research, Competitive Landscape: DDoS Mitigation Solutions, October 20 14 © 2015 Neustar, Inc. All Rights Reserved.
  • 16. THE BOTTOM LINE Even if you don’t see super-sized attacks, your business is still impacted across its operations—respond by investing in layered DDoS defenses. In a sector where large attacks derail online promotions, technology companies need to spend more to protect their marketing investments. Faced with recurring attacks and substantial revenue to protect, retailers must adopt hybrid solutions at a brisk clip. 1. 2. 3. © 2015 Neustar, Inc. All Rights Reserved.
  • 17. To mitigate DDoS attacks, Neustar blends expertise, proven responses, and diverse technologies. Neustar SiteProtect, our DDoS mitigation service, offers options to meet your level of risk, budget, and technical environment: cloud-based protection; on-premise, always-on hardware; or a hybrid of both, fully managed by us. SiteProtect is backed by the Neustar Security Operations Center, whose experts bring years of experience to blocking every attack. *All data contained in this report is from US companies in 2014 Learn more about DDoS protection at http://www.neustar.biz. © 2015 Neustar, Inc. All Rights Reserved.
  • 18. ABOUT NEUSTAR Neustar, Inc. (NYSE:NSR) is the first real-time provider of cloud-based information services and data analytics, enabling marketing and IT security professionals to promote and protect their businesses. With a commitment to privacy and neutrality, Neustar operates complex data registries and uses its expertise to deliver actionable, data-driven insights that help clients make high-value business decisions in real time, one customer interaction at a time. © 2015 Neustar, Inc. All Rights Reserved.