SlideShare a Scribd company logo
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS Engine: 
Strengthen the DNS Foundation
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Agenda 
Page 2 
Market Driver : BIND DNS Strengths and Weaknesses 
Hybrid DNS Engine : Next Generation DNS Appliance 
Hybrid DNS concept 
Using the Smart Architectures to deal with HDE 
Hybrid DNS Benefits 
Demo
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
DNS Security Risks Context 
Page 3 
DNS Attacks Are in Constant Growth: +200% 
Source: Quaterly Global DDoS Attack Reports, 1st Quarter 2013
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Bind is the Most Popular & Deployed DNS Engine 
Very flexible with the most comprehensive integration of RFCs 
De facto a “standard” 
Security Risks 
Most popular means main DNS server target for hackers 
Numerous security vulnerabilities (OS & DNS Service) 
Authoritative and recursive are not separated 
Performance Limitation 
BIND performances are not enough to efficiently mitigate DoS attacks 
Market Driver :BIND DNS Strengths & Weaknesses 
Page 4 
When compared with Q2 2012 (1.76 percent), Q1 2013 (6.97 percent), and Q2 2013 (7.25 percent), statistics indicate that DNS attacks are on the rise, both in the form of standard floods and Distributed Reflected Denial of Service (DrDoS) attacks. From Q2 2012 to Q2 2013, DNS attacks increased 5.49 percent. DNS attacks are usually directed at organizations with large infrastructures where oversight or misconfiguration of DNS services can cause severe impact to selected targets. Source: Prolexic Quaterly Global DDoS Attack Report
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS Technology: 3 DNS Engines in One Appliance 
DNS BIND (ISC), NSD and UNBOUND Cache (NLnetLAB) 
One Active DNS Engine at a Time 
The Hybrid DNS Engine is managed as a single entity: Automated synchronization 
Hybrid DNS Engine: Next Generation DNS Appliance 
Page 5 
NSD
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS takes advantage of SmartArchitectures 
Integrated Best Practices 
Configuration generated and pushed automatically 
No need to be a DNS expert 
Switching from one engine to another 
Is controlled by the Administrator 
Is done only if the underlying configuration is correct 
Is done without any DNS service interruption 
Dealing with Hybrid DNS : SmartArchitectures 
Page 6
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
3.Manage 
2.Deploy 
1.Design 
Master-Slave 
Template 
Service 
Master 
Slave 
Slave 
Architecture setup 
Slave 
Slave 
Master 
Master-Slave Template 
Master-Slave 
Template 
Management Appliance 
Available servers 
RR Zone Options … 
Management of the SmartArchitecture as one “Virtual server” 
Page 7 
SmartArchitecture™ Deployment & Management Automation
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Hybrid DNS Engine for Hybrid DNS Architectures 
Simplify DNS Architecture Design, Deployment and Management with SmartArchitecture Templates 
The Hybrid DNS architecture is managed as a single entity 
HDE For Next Generation DNS Architecture 
Page 8 
Master 
Slave 
Slave 
Slave 
NSD 
NSD
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Block Zero-Day Vulnerabilities 
Eliminate single point of failure (SPoF) following security alerts 
Immediate remediation of security threats: Switch from a technology to another 
Strengthen DNS Architecture Security Foundation 
Baffle hackers with higher complexity of security footprint 
Enhance Agility & Risk Management to Security Threats 
No immediate need to update: Switch from a technology to another 
Test and plan before updating 
Improve Performances to Mitigate DoS Attacks 
Up to 300,000 qps 
Hybrid Technology Benefits 
Page 9
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
EfficientIP Company Overview 
Americas Headquarters- West Chester, Pennsylvania 
European Headquarters- Paris, France 
Since 2004 – Innovative DDI Software Company 
Smart DDI - SmartArchitecture, Hybrid DNS, Data Reconciliation, Compliancy Management, Unified Repository, VLAN & Device Management Integration 
Coverage in 60 Plus Countries 
Doubled Number of Employees in 2012 and Again in 2013 
Solid Financial Foundation – Organic Growth& Private Funding 
Full Value Add Services: Hardware Replacement & TAC access 24x7 
Strong Technological Alliances 
Page 10
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Customers 
Telecommunication 
Vodafone 
Colt 
T Mobile 
SFR 
Easynet 
KPN 
Telecom of Thailand 
Qatar Telecom 
Maskatel 
Virgin Mobile 
ONO 
Energy Repsol EDF GDF Suez Air Liquide Education Leeds University Hamburg University Paris University Utrecht University Pais Vasco University 
Banks & Insurances Allianz Zurich Financial Services Swiss Re Axa Wealth Standard Life Bank of France BRED Electronics-Defense Philips NXP Nokia Siemens Network Cassidian EADS Astrium 
Page 11 
Transportation 
Norbert Dentressangle 
SANEF 
APRR 
Metro of Madrid 
Metro of Paris 
Services 
Cap Gemini 
STERIA 
Adecco 
Sopra Group
Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 
Page 12 
Demo

More Related Content

What's hot

The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Cloudflare
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
Alexander Velikiy
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
Netpluz Asia Pte Ltd
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
Cloudflare
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
Imperva Incapsula
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
Jisc
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
Belsoft
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
Imperva Incapsula
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
Cloudflare
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
Cloudflare
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Cisco do Brasil
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
Deploy360 Programme (Internet Society)
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
Nexusguard
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
MarketingArrowECS_CZ
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
Fidelis Cybersecurity
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
Fidelis Cybersecurity
 

What's hot (20)

The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
Exhibitor session: Efficient IP
Exhibitor session: Efficient IPExhibitor session: Efficient IP
Exhibitor session: Efficient IP
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
ION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSECION Malta - Introduction to DNSSEC
ION Malta - Introduction to DNSSEC
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 

Similar to EfficientIP webinar mitigate dns zero day vulnerability

Storage e Protezione dei Dati
Storage e Protezione dei DatiStorage e Protezione dei Dati
Storage e Protezione dei Dati
Jürgen Ambrosi
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
DevOps.com
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PROIDEA
 
FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer Inc.
 
IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017
Andreas Taudte
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
F5 Networks
 
Hybrid Cloud – Live Demo
Hybrid Cloud – Live DemoHybrid Cloud – Live Demo
Hybrid Cloud – Live DemoAmit Gatenyo
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
BAKOTECH
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
Peter Silva
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
Dell EMC World
 
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerPresentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
IBM Switzerland
 
Dyna cloud algemeen
Dyna cloud   algemeenDyna cloud   algemeen
Dyna cloud algemeenOostNV
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
F5 Networks
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
F5 Networks
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely Scalable
Pallavi Vyas
 
Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015
VMUG IT
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
Cloudflare
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Aruj Thirawat
 
Data Center Portfolio
Data Center PortfolioData Center Portfolio
Data Center PortfolioRobbie Rikard
 

Similar to EfficientIP webinar mitigate dns zero day vulnerability (20)

Storage e Protezione dei Dati
Storage e Protezione dei DatiStorage e Protezione dei Dati
Storage e Protezione dei Dati
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...FusionLayer - Network provisioning, automation, and control for private datac...
FusionLayer - Network provisioning, automation, and control for private datac...
 
IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017IT-as-a-Service - BlueCat @ NUBIT 2017
IT-as-a-Service - BlueCat @ NUBIT 2017
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
Hybrid Cloud – Live Demo
Hybrid Cloud – Live DemoHybrid Cloud – Live Demo
Hybrid Cloud – Live Demo
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerPresentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
 
Dyna cloud algemeen
Dyna cloud   algemeenDyna cloud   algemeen
Dyna cloud algemeen
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely Scalable
 
Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015Presentazione SimpliVity @ VMUGIT UserCon 2015
Presentazione SimpliVity @ VMUGIT UserCon 2015
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Data Center Portfolio
Data Center PortfolioData Center Portfolio
Data Center Portfolio
 

Recently uploaded

Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 

Recently uploaded (20)

Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 

EfficientIP webinar mitigate dns zero day vulnerability

  • 1. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS Engine: Strengthen the DNS Foundation
  • 2. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Agenda Page 2 Market Driver : BIND DNS Strengths and Weaknesses Hybrid DNS Engine : Next Generation DNS Appliance Hybrid DNS concept Using the Smart Architectures to deal with HDE Hybrid DNS Benefits Demo
  • 3. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 DNS Security Risks Context Page 3 DNS Attacks Are in Constant Growth: +200% Source: Quaterly Global DDoS Attack Reports, 1st Quarter 2013
  • 4. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Bind is the Most Popular & Deployed DNS Engine Very flexible with the most comprehensive integration of RFCs De facto a “standard” Security Risks Most popular means main DNS server target for hackers Numerous security vulnerabilities (OS & DNS Service) Authoritative and recursive are not separated Performance Limitation BIND performances are not enough to efficiently mitigate DoS attacks Market Driver :BIND DNS Strengths & Weaknesses Page 4 When compared with Q2 2012 (1.76 percent), Q1 2013 (6.97 percent), and Q2 2013 (7.25 percent), statistics indicate that DNS attacks are on the rise, both in the form of standard floods and Distributed Reflected Denial of Service (DrDoS) attacks. From Q2 2012 to Q2 2013, DNS attacks increased 5.49 percent. DNS attacks are usually directed at organizations with large infrastructures where oversight or misconfiguration of DNS services can cause severe impact to selected targets. Source: Prolexic Quaterly Global DDoS Attack Report
  • 5. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS Technology: 3 DNS Engines in One Appliance DNS BIND (ISC), NSD and UNBOUND Cache (NLnetLAB) One Active DNS Engine at a Time The Hybrid DNS Engine is managed as a single entity: Automated synchronization Hybrid DNS Engine: Next Generation DNS Appliance Page 5 NSD
  • 6. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS takes advantage of SmartArchitectures Integrated Best Practices Configuration generated and pushed automatically No need to be a DNS expert Switching from one engine to another Is controlled by the Administrator Is done only if the underlying configuration is correct Is done without any DNS service interruption Dealing with Hybrid DNS : SmartArchitectures Page 6
  • 7. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 3.Manage 2.Deploy 1.Design Master-Slave Template Service Master Slave Slave Architecture setup Slave Slave Master Master-Slave Template Master-Slave Template Management Appliance Available servers RR Zone Options … Management of the SmartArchitecture as one “Virtual server” Page 7 SmartArchitecture™ Deployment & Management Automation
  • 8. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Hybrid DNS Engine for Hybrid DNS Architectures Simplify DNS Architecture Design, Deployment and Management with SmartArchitecture Templates The Hybrid DNS architecture is managed as a single entity HDE For Next Generation DNS Architecture Page 8 Master Slave Slave Slave NSD NSD
  • 9. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Block Zero-Day Vulnerabilities Eliminate single point of failure (SPoF) following security alerts Immediate remediation of security threats: Switch from a technology to another Strengthen DNS Architecture Security Foundation Baffle hackers with higher complexity of security footprint Enhance Agility & Risk Management to Security Threats No immediate need to update: Switch from a technology to another Test and plan before updating Improve Performances to Mitigate DoS Attacks Up to 300,000 qps Hybrid Technology Benefits Page 9
  • 10. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 EfficientIP Company Overview Americas Headquarters- West Chester, Pennsylvania European Headquarters- Paris, France Since 2004 – Innovative DDI Software Company Smart DDI - SmartArchitecture, Hybrid DNS, Data Reconciliation, Compliancy Management, Unified Repository, VLAN & Device Management Integration Coverage in 60 Plus Countries Doubled Number of Employees in 2012 and Again in 2013 Solid Financial Foundation – Organic Growth& Private Funding Full Value Add Services: Hardware Replacement & TAC access 24x7 Strong Technological Alliances Page 10
  • 11. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Customers Telecommunication Vodafone Colt T Mobile SFR Easynet KPN Telecom of Thailand Qatar Telecom Maskatel Virgin Mobile ONO Energy Repsol EDF GDF Suez Air Liquide Education Leeds University Hamburg University Paris University Utrecht University Pais Vasco University Banks & Insurances Allianz Zurich Financial Services Swiss Re Axa Wealth Standard Life Bank of France BRED Electronics-Defense Philips NXP Nokia Siemens Network Cassidian EADS Astrium Page 11 Transportation Norbert Dentressangle SANEF APRR Metro of Madrid Metro of Paris Services Cap Gemini STERIA Adecco Sopra Group
  • 12. Confidential-Property of EfficientIP- All rights reserved-Copyright © 2014 Page 12 Demo