© 2013 Imperva, Inc. All rights reserved. DDos Attacks and Web Threats: How to Protect Your Site & Information Tina Shaw Account Executive 650-832-6087.

Slides:



Advertisements
Similar presentations
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Advertisements

Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
Citrix Partner Update The Citrix Delivery Centre.
Customer needs EnterpriseGrade HyperScale Hybrid.
Designing Networking and Hybrid Connectivity in Azure
© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Confidential1 Doug Smith, Region Sales Mgr
Barracuda Networks Steve Scheidegger Commercial Account Manager
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
New Era of Live Streaming Live Smooth Streaming CDNetworks Bongseok Kim I Team Leader Marketing Div. Marketing Team.
WELCOME TO CONSTELLIX DNS 101 A Revolutionary Traffic Management Suite of Services.
Barracuda Load Balancer Server Availability and Scalability.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
STRENTHENING YOUR EXTERNAL DNS External DNS Overview DNS Background Strengthening External DNS with Anycast Example of an Anycast DNS Service.
Performance and Security of Internet Applications John Buten Manager, Enterprise Industries
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
© 2008 Eyeblaster. All rights reservedConfidential for APAC teams Presented by: Gal Trifon● CEO ● Feb. 2 nd 2009 Strategic Overview EB Orange 246/137/51.
Adra Match BALANCER: Balance Sheet Reconciliation Software Powered by the Microsoft Azure Cloud MICROSOFT AZURE ISV PROFILE: ADRA MATCH Adra Match develops.
Next-Generation Formotus Forms Replace Paper and InfoPath with Mobile Business Applications Created and Deployed Using Microsoft Azure MICROSOFT AZURE.
Managing World Cities World Cities: Asian Perspectives Dr. Takashi Tsukamoto University of North Carolina at Greensboro Hong Kong October 23-25, 2008.
Managing World Cities World Cities: Asian Perspectives Dr. Takashi Tsukamoto University of North Carolina at Greensboro Hong Kong October 23-25, 2008.
CSI Software Offers Fully Integrated, Single-Source Enterprise Software for Membership-Based Facilities COMPANY PROFILE: CSI SOFTWARE CSI Software was.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Built on the Powerful Microsoft Azure Platform, Phyzit Helps Doctors Reduce Readmissions Through a Transitional Care Management App MICROSOFT AZURE ISV.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Supported by the Microsoft Azure Platform, Management Controls’ Software Suite Tracks Costs of Projects, Delivers Control, Savings MICROSOFT AZURE ISV.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Small Businesses Can Reach New Customers while Retaining Existing Ones with Ferret Card COMPANY PROFILE: FERRET CARD Founded in 2011, Ferret Card is a.
Corent’s SurPaaS Transforms Your Software into Scalable SaaS on Windows Azure – in Days! COMPANY PROFILE: CORENT TECHNOLOGY INC. Corent’s SurPaaS is a.
Datalayer Notebook Allows Data Scientists to Play with Big Data, Build Innovative Models, and Share Results Easily on Microsoft Azure MICROSOFT AZURE ISV.
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
Microsoft Azure Integrated with C21 Live Cloud Mosaic Helps Control Your Live Streaming from Anywhere by Deploying in Global Azure Regions MICROSOFT AZURE.
Kona Security Solutions - Overview
Power LogOn® Adds Card-Based, Multi- Factor Authentication to Microsoft Azure Logon, Plus Password Management for All Other Logons MICROSOFT AZURE ISV.
Powered by Microsoft Azure, Auctori Is the Next Generation in Multilingual, Global, Search Engine Optimized Web Content Management Systems MICROSOFT AZURE.
+ Logentries Is a Real-Time Log Analytics Service for Aggregating, Analyzing, and Alerting on Log Data from Microsoft Azure Apps and Systems MICROSOFT.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Microsoft Azure Powers Optimized Features of ESET File Security and Its Superior Protection, High Detection Speed, and Smooth Operation MICROSOFT AZURE.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Smart Syncing: Travelers Get News, Information, and Entertainment along with Free Internet via WiFi COMPANY PROFILE: SIENN With a team across Europe, SIENN.
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
Gain High Availability Performance and Scale of Applications Running on Windows Azure with KEMP Technologies’ Virtual LoadMaster COMPANY PROFILE: KEMP.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Built on the Microsoft Azure Platform, UberCloud Helps Engineers and Software Providers to Offer and Deploy Powerful Cloud Services On Demand MICROSOFT.
Trajectory’s Game-Powered Apps Extend the Value of Business Training and Testing Materials with Help from the Microsoft Azure Cloud MICROSOFT AZURE ISV.
Ariett’s Cloud Purchase and Expense Software: Save Money, Gain Insight, Spark Productivity COMPANY PROFILE: ARIETT Ariett is a leading provider of purchase.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
To the cloud… Brian Hitney Developer Evangelist, Microsoft
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Built on the Powerful Microsoft Azure Platform, HarmonyPSA Is a Cloud-Based Customer Service and Billing System for IT Solution Providers MICROSOFT AZURE.
© 2016 Catalyze, Inc. Go-To-Market Services HIPAA Compliance in the Cloud: Catalyze Provides Microsoft Azure Customers with a HITRUST Certified Platform-as-a-Service.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Mastering Azure Connectivity to the Microsoft Cloud Session 3.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
CloudFront: Living on the Edge
Hosted on Azure, LoginRadius’ Customer Identity
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Welcome and thank you for choosing SharkGate
Route web traffic using Azure CLI
10 REASONS TO USE JETPACK FOR WORDPRESS IN 2019
Presentation transcript:

© 2013 Imperva, Inc. All rights reserved. DDos Attacks and Web Threats: How to Protect Your Site & Information Tina Shaw Account Executive

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -2

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -3

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -4

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -5

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -6

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -7

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -8

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -9

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -10

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -11

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -12

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -13

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -14

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -15

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -16

© 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -17

© 2013 Imperva, Inc. All rights reserved.  Low-Orbit Ion Canon (LOIC)  Purpose - DDoS  Windows desktop application, coded in C#  UDP/TCP/HTTP flooding Hacking Tools

© 2013 Imperva, Inc. All rights reserved. Hacker Forum Discussion Topics DoS is Another Tool in the Hacker Toolbox Source: Imperva. Covers July July 2011 across 600,000 discussions

© 2013 Imperva, Inc. All rights reserved. A 100GB attack (Sept 24 th ) Featured in eWeek on October 1, 2013 The attack's load was distributed across our +350Gbps network. (each color represents a different data center)

© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Overview Confidential21 Incapsula helps Website owners…

© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula SimplicityFlexibilityVersatility Imperva Incapsula Overview

© 2013 Imperva, Inc. All rights reserved. Versatility “The idea of recognizing your strengths and using them in as versatile a way as you can is cool to me.” - Frank Ocean Imperva’s Tina ^

© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Versatility Confidential24 By routing Website traffic through Incapsula, bad traffic is removed and good traffic is accelerated Web Application Firewall (WAF)Distributed Denial of Service (DDOS) Load Balancing Content Delivery Network (CDN)

© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula is Deployed as a Reverse Proxy Network 360° Global Threat Detection & Analysis: Enables early detection of threats and attack vectors and instant application of protection rules across the entire proxy network

© 2013 Imperva, Inc. All rights reserved. Incapsula’s Global Content Delivery Network Confidential26  Datacenters Currently 15 Datacenters  USA (Ashville NC, Ashburn VA, Los Angles CA, San Jose CA, Chicago IL, Miami FL, Dallas TX, New York NY), London, Singapore, Israel, Amsterdam, Tokyo, Frankfurt, Sydney Plans for another 4 Datacenters  Toronto, Hong Kong, Sao Paulo, and Milan  Data Across Borders Customer data can be locked into (or out of) specific countries

© 2013 Imperva, Inc. All rights reserved. Simplicity “Life is really simple, but we insist on making it complicated.” - Confusius Security Tina Shaw!

© 2013 Imperva, Inc. All rights reserved. The Activation

© 2013 Imperva, Inc. All rights reserved. Creating a User Account

© 2013 Imperva, Inc. All rights reserved. Logging into Incapsula and adding a website Confidential30

© 2013 Imperva, Inc. All rights reserved. Incapsula Automatically Gathers Site Data Confidential31

© 2013 Imperva, Inc. All rights reserved. Changing DNS Settings

© 2013 Imperva, Inc. All rights reserved. Getting Lost in Go Daddy’s Horrible UI

© 2013 Imperva, Inc. All rights reserved. Updating DNS Records

© 2013 Imperva, Inc. All rights reserved. Completing Incapsula’s Setup

© 2013 Imperva, Inc. All rights reserved. The Website is Protected Confidential36

© 2013 Imperva, Inc. All rights reserved. Dashboard - Traffic Confidential 37

© 2013 Imperva, Inc. All rights reserved. Dashboard - Traffic Confidential38

© 2013 Imperva, Inc. All rights reserved. Dashboard - Security Confidential39

© 2013 Imperva, Inc. All rights reserved. Dashboard - Performance Confidential40

© 2013 Imperva, Inc. All rights reserved. Dashboard – Datacenter Response Time Confidential41

© 2013 Imperva, Inc. All rights reserved. Dashboard – Recent Updates Confidential42

© 2013 Imperva, Inc. All rights reserved. Visits - CONFIDENTIAL -43

© 2013 Imperva, Inc. All rights reserved. Visits - More Confidential44

© 2013 Imperva, Inc. All rights reserved. Visits – Add to Whitelist Confidential45

© 2013 Imperva, Inc. All rights reserved. Settings - General Confidential46

© 2013 Imperva, Inc. All rights reserved. Settings – Login Protect Confidential47

© 2013 Imperva, Inc. All rights reserved. Settings - Performance Confidential48

© 2013 Imperva, Inc. All rights reserved. Settings - Performance Confidential49

© 2013 Imperva, Inc. All rights reserved. Settings - Notifications Confidential50

© 2013 Imperva, Inc. All rights reserved. Settings - Security Confidential51

© 2013 Imperva, Inc. All rights reserved. Settings - Security Confidential52

© 2013 Imperva, Inc. All rights reserved. Settings - WAF Confidential53

© 2013 Imperva, Inc. All rights reserved. Settings - WAF Confidential54

© 2013 Imperva, Inc. All rights reserved. Settings – WAF Whitelist Confidential55

© 2013 Imperva, Inc. All rights reserved. Settings – WAF Whitelist Confidential56

© 2013 Imperva, Inc. All rights reserved. Settings - Permissions Confidential57

© 2013 Imperva, Inc. All rights reserved. Flexible “I like forms that are flexible, that can let you feel creative.” -John Scofield Security Products Tina Shaw! ^

© 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Customer Sample Confidential59

© 2013 Imperva, Inc. All rights reserved. Incapsula Makes Security Simple Imperva Incapsula SimplicityFlexibilityVersatility

© 2013 Imperva, Inc. All rights reserved. Questions?