© F5 Networks, Inc 1
INTRINSIC SECURITY–
THE KEY TO EFFECTIVE
HYBRID DDOS PROTECTION
© F5 Networks, Inc 2
Q. Which application security services does your company currently have in place?
Deployed today
No plans to deploy
Will deploy in 12 months10%
70%
20%
70%
20%
10%
DDOS PROTECTION SERVICES IN PLACE
© F5 Networks, Inc 3
Q. What is your preferred deployment model?
58%
28%
14%
On premises
As a service
(SaaS)
Cloud (IaaS)
DDOS PROTECTION PREFERRED
DEPLOYMENT MODEL
© F5 Networks, Inc 4
Size and
Complexity
Targeting
Applications
Increasing
Frequency
DDOS THREATS ARE EVOLVING
© F5 Networks, Inc 5
APPLICATION
PRESENTATION
SESSION
TRANSPORT
NETWORK
DATA LINK
PHYSICAL
HTTP, FTP, IRC, SSH, DNS
SSL, FTP, IMAP, SSH
VARIOUS APIs, SOCKETS
TCP, UDP, ECN, SCTP, DCCP
IP, IPSEC, ICMPO, IGMP
Ethernet, SLIP, PPP, FDDI
Coax, Fiber, Wireless
ATTACKS INCREASINGLY
TARGETING APPLICATIONS
© F5 Networks, Inc 6
Intrinsic
Security
Balance the known good with the known bad
INTRINSIC SECURITY
© F5 Networks, Inc 7
Proxy
Applications
Client-side full
transport layer
connection
Application-side
full transport
layer connection
FULL PROXY ARCHITECTURE

Intrinsic Security—The Key to Effective Hybrid DDoS Protection

  • 1.
    © F5 Networks,Inc 1 INTRINSIC SECURITY– THE KEY TO EFFECTIVE HYBRID DDOS PROTECTION
  • 2.
    © F5 Networks,Inc 2 Q. Which application security services does your company currently have in place? Deployed today No plans to deploy Will deploy in 12 months10% 70% 20% 70% 20% 10% DDOS PROTECTION SERVICES IN PLACE
  • 3.
    © F5 Networks,Inc 3 Q. What is your preferred deployment model? 58% 28% 14% On premises As a service (SaaS) Cloud (IaaS) DDOS PROTECTION PREFERRED DEPLOYMENT MODEL
  • 4.
    © F5 Networks,Inc 4 Size and Complexity Targeting Applications Increasing Frequency DDOS THREATS ARE EVOLVING
  • 5.
    © F5 Networks,Inc 5 APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL HTTP, FTP, IRC, SSH, DNS SSL, FTP, IMAP, SSH VARIOUS APIs, SOCKETS TCP, UDP, ECN, SCTP, DCCP IP, IPSEC, ICMPO, IGMP Ethernet, SLIP, PPP, FDDI Coax, Fiber, Wireless ATTACKS INCREASINGLY TARGETING APPLICATIONS
  • 6.
    © F5 Networks,Inc 6 Intrinsic Security Balance the known good with the known bad INTRINSIC SECURITY
  • 7.
    © F5 Networks,Inc 7 Proxy Applications Client-side full transport layer connection Application-side full transport layer connection FULL PROXY ARCHITECTURE

Editor's Notes

  • #3 App/data protection “always on (client | request | response)” based on percentage of apps moved to the cloud
  • #4 App/data protection “always on (client | request | response)” based on percentage of apps moved to the cloud
  • #5 App/data protection “always on (client | request | response)” based on percentage of apps moved to the cloud
  • #6 App/data protection “always on (client | request | response)” based on percentage of apps moved to the cloud
  • #7 App/data protection “always on (client | request | response)” based on percentage of apps moved to the cloud
  • #8 App/data protection “always on (client | request | response)” based on percentage of apps moved to the cloud