SlideShare a Scribd company logo
DDoS Protection Services
1 DDoS Protection
2 About us & global reach
3 Services & Solutions
4 Traffic Diversion
5 Response Time
6 Control Center
7 Capacity Backup
8 Partners
CONTENT
overview
9 Summary
1
DDoS Protection Strategies – General
Traditional Approaches
On Premises
Dedicated appliances
Pros
• Good for layer 7 attacks
• Enterprise control
Cons
• Vol. attacks (upstream)
• Requires in-house skills
Clean Pipe
ISP detects and mitigates.
Pros
• Cost effective
• Mature offering
Cons
• Low capacity ISP
• ISP agnostic
2
DDoS Protection Strategies – Providers
Traditional Approaches
CDN Provider
Web content is distributed,
mitigation done at the edge.
Web only.
Pros
• Always On
• New services (e.g.WAF)
Cons
• No DMZ protection
• Limited to Web
Scrubbing Center
Traffic redirection to closest
cleaning facility. Forward
good traffic.
Pros
• Effects ALL traffic
• Interact with CPE
Cons
• No auto-diversion*
• Require testing
3
SecurityDAM
overview
SecurityDAM offers
Managed Security Service
Providers (MSSPs) a quick
and easy way of adding
comprehensive Distributed
Denial of Service (DDoS)
protection service to their
security portfolio.
ABOUT US
SecurityDAM
Worldwide Resources
Radware Partner
SecurityDAM
Control Center
Monitoring & Alerting
MSSP Solutions
RAD Group
DDoS Protection
NOC/ERT Services
Hybrid Approach
Comprehensive evolving managed
DDoS Protection Services
5
OUR GLOBAL REACH
Global Network of Scrubbing Centers
US
>100 Gbps
Hong Kong
>20Gbps
Frankfurt
>100 Gbps
Current: >200 Gbps
200G
OUR NETWORK IS EXPANDING
Russia
<partner>
UK
<partner>
Hong Kong
<partner>
US
>50Gbps
Singapore
>20Gbps
Partners: >50 Gbps
250G
2014 Plans: >+100 Gbps
350G
SERVICES & SOLUTIONS
SecurityDAM Offering
SecurityDAM offers a complete DDoS Protection Services suit, with a flexible deployment
and responsibility offering, matching your current and future needs.
 White Label Service
Brand on SecurityDAM system
 Turnkey Service
Independent local system
 Backup Service
Mitigation capacity backup
SecurityDAM suite of services enables flexible provisioning of DDoS Protection Services
 Full Operational Services
SecurityDAM NOC and ERT
 Partial Operational Services
NOC / ERT / Support
 On Demand Service
for registered end-customers
7
OUR SERVICES
System and Team
Analysis
Real-time analysis and
adjustment of protection settings
Accounting
Flexible protection plans definitions
to match customer and market needs
Flexible Environment
Cloud-based environment
Best of bread flexible integration
Development
Evolving proprietary
mitigation tools
24x7 Support
NOC – monitoring, mitigation
and past mortem analysis
Research
DDoS tools and mitigation
techniques research
8
Traffic Diversion
Automated from the Control Center
Traffic diversion to Scrubbing Centers
BGP
AS / (/24)
network diversion
Route Change
direct route
changes
9
DNS
website diversion
(reverse-proxy)
RESPONSE TIME #1
Shortest Time-to-Mitigate
24x7 Monitoring
Real-time / Inline
Detection time measured in
seconds.
Alert
NOC / Customer
Analysis of attack
and mitigation measures.
CPE Only
Monitor on
premises
actions
Divert
Decide on
diversion
and engage
10
TIME TO MITIGATE
< 15 minutes, when diversion is needed
Time to mitigate
RESPONSE TIME
Short response time to new threats
SOFTWARE
Cloud Deployment
Quick deployment
of new measures
IDEA
New threats
Real-time analysis of
mitigation efficiency
DEVELOPING
New protections
COTS and custom mitigation
tools integration
12
13
Figure 1 Customer Dashboard
Real-time monitoring
 Traffic
 Setting
 Security & Operational
Signaling based Alerting
Diversion requests
Control Center
Managing DDoS Protection Service
14
Figure 2 Operator Dashboard
Global real-time views
 Traffic
 Setting
 Security & Operational
Signaling based Alerting
Control Center
Managing DDoS Protection Service
15
Figure 3 Reports
Summary Report
Account report aggregating
CPE and Scrubbing Center data
Detailed Report
Attack report per incident (with
aggregation)
Enhanced Reports (future)
External source integration to
produced reports.
Control Center
Managing DDoS Protection Service
CAPACITY BACKUP SERVICE
High rate attack mitigation via SecurityDAM
SD Net
Capacity backup
services for supporting
local scrubbing center
resource limitation.
Unified
Unified reporting cross
levels, with
aggregated date from
multiple mitigation
points.
IncreaseValue
ReduceCapEx
DDoS attack rate can be overwhelming
80/20 still apply  rely on cloud backup 16
Partners – JT Global
Operating SecurityDAM Independent System
Image
Placeholder 1
 UK Channel Island operator
 Customer DDoS Protection
 Banking
 Online businesses
 Stand-alone Control Center
 Stand-alone Scrubbing Center
Mark Stuchfield, (Head of Innovation
and Strategy, JT):
“SecurityDAM allows us to provide
these cloud security services to
multiple customers and at the same
time give them a visual indication of
what is going on”
17
Partners – Defense Center LLC
Operating SecurityDAM Independent System
 Russian MSSP
 Customer DDoS Protection
 Small businesses
 Enterprise networks
 Domestic Control Center
 Mitigation capacity backup
Valery Kirillov, (CEO):
“Business continuity is a prime
concern to our customers. Our multi-
layered DDoS protection will allow us
to provide the highest level of
mitigation capacity, backup by
SecurityDAM Emergency Response
Team service.”
18
SUMMARY
Basic flow
Clean
Reinjection
CC
51
Monitor
CPE
Mitigate / Alert
CPECC
2
Divert
To CC
3
Cloud
Mitigation
CC
4
Attack
End
CPE
6
19
SUMMARY
Attack Management Flow
20
On-premise CPE
mitigates the attack
Protected Organization
Signaling Messaging
Volumetric DDoS attack
blocks the Internet pipe
Clean traffic
Sharing essential
information for
attack mitigation
MSSP Scrubbing Center & NOC
SecurityDAM Global
Scrubbing Centers
MSSP/customer decide to
divert the traffic
MSSP local capacity exhausted;
initiate Capacity Backup
SUMMARY
SecurityDAM DDoS Protection Platform and Services
Customer
Portal
Operator
provisioning
and
management
Audit and
Accounting
Monitoring
End-to-End
Protection
Integrated Layered
DDoS protection
Smooth operation
Experts assistance
21
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

More Related Content

PPTX
Filling the Gaps in Your DDoS Mitigation Strategy
PPT
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
PPTX
F5 and Infoblox deliver complete secured DNS infrastructure
PPTX
Radware Solutions for MSSPs
PDF
Radware Hybrid Cloud WAF Service
PDF
DDoS Threat Landscape - Ron Winward CHINOG16
PDF
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
PPTX
What You're Missing With Your Current WAF Provider
Filling the Gaps in Your DDoS Mitigation Strategy
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
F5 and Infoblox deliver complete secured DNS infrastructure
Radware Solutions for MSSPs
Radware Hybrid Cloud WAF Service
DDoS Threat Landscape - Ron Winward CHINOG16
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
What You're Missing With Your Current WAF Provider

What's hot (20)

PPTX
DDoS Mitigation - DefensePro - RADWARE
PDF
DDoS Protection System DPS
PPTX
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
PPTX
Protection and Visibitlity of Encrypted Traffic by F5
PDF
A Different Approach to Securing Your Cloud Journey
PPTX
Latest Trends in Web Application Security
PPTX
Radware Cloud Security Services
PPTX
Attack Prevention Solution for RADWARE
PPTX
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
PDF
momentum dns security case study
PDF
Symantec Endpoint Suite
PDF
Big Ip Global Traffic Manager Ds
PDF
How to Plan for Performance and Scale for Multiplayer Games
PPTX
How to Reduce Latency with Cloudflare Argo Smart Routing
PDF
Secure Cloud Hosting: Real Requirements to Protect your Data
PPTX
Ransomware-Recovery-as-a-Service
PDF
Preparing for the Imminent Terabit DDoS Attack
PDF
Presentation network design and security for your v mware view deployment w...
PPTX
What’s New at Cloudflare: New Product Launches
PDF
What You Should Know Before The Next DDoS Attack
DDoS Mitigation - DefensePro - RADWARE
DDoS Protection System DPS
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
Protection and Visibitlity of Encrypted Traffic by F5
A Different Approach to Securing Your Cloud Journey
Latest Trends in Web Application Security
Radware Cloud Security Services
Attack Prevention Solution for RADWARE
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
momentum dns security case study
Symantec Endpoint Suite
Big Ip Global Traffic Manager Ds
How to Plan for Performance and Scale for Multiplayer Games
How to Reduce Latency with Cloudflare Argo Smart Routing
Secure Cloud Hosting: Real Requirements to Protect your Data
Ransomware-Recovery-as-a-Service
Preparing for the Imminent Terabit DDoS Attack
Presentation network design and security for your v mware view deployment w...
What’s New at Cloudflare: New Product Launches
What You Should Know Before The Next DDoS Attack
Ad

Similar to SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK) (20)

PDF
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
PPTX
Service Provider Deployment of DDoS Mitigation
PDF
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
PPTX
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
PDF
The_Forrester_Wave_DDoS_S 2015Q3.PDF
PPTX
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
A10 issa d do s 5-2014
PDF
Cloudshield_DNS Tips_032014
PDF
ddos-protector-customer-presentation.pdf
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PDF
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
PPTX
Check Point Ddos protector
PPTX
Dns security overview
PDF
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
PPTX
Rewriting the Rules for DDoS Protection in 2015
PDF
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
PDF
Denial of Service - Service Provider Overview
PDF
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
Service Provider Deployment of DDoS Mitigation
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The_Forrester_Wave_DDoS_S 2015Q3.PDF
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
A10 issa d do s 5-2014
Cloudshield_DNS Tips_032014
ddos-protector-customer-presentation.pdf
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PLNOG16: DDOS SOLUTIONS – CUSTOMER POINT OF VIEW, Piotr Wojciechowski
Check Point Ddos protector
Dns security overview
DDoS Defenses | DDoS Protection and Mitigation | MazeBolt
Rewriting the Rules for DDoS Protection in 2015
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
Denial of Service - Service Provider Overview
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
Ad

Recently uploaded (20)

PPTX
CroxyProxy Instagram Access id login.pptx
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
PDF
creating-agentic-ai-solutions-leveraging-aws.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PPTX
How Much Does It Cost to Build a Train Ticket App like Trenitalia in Italy.pptx
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
Software Development Methodologies in 2025
PPTX
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
PDF
Chapter 2 Digital Image Fundamentals.pdf
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
PDF
Google’s NotebookLM Unveils Video Overviews
PDF
REPORT: Heating appliances market in Poland 2024
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
CroxyProxy Instagram Access id login.pptx
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
creating-agentic-ai-solutions-leveraging-aws.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
NewMind AI Weekly Chronicles - July'25 - Week IV
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
A Day in the Life of Location Data - Turning Where into How.pdf
How Much Does It Cost to Build a Train Ticket App like Trenitalia in Italy.pptx
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
Software Development Methodologies in 2025
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
Chapter 2 Digital Image Fundamentals.pdf
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Google’s NotebookLM Unveils Video Overviews
REPORT: Heating appliances market in Poland 2024
NewMind AI Monthly Chronicles - July 2025
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
agentic-ai-and-the-future-of-autonomous-systems.pdf

SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity 2014 - London, UK)

  • 2. 1 DDoS Protection 2 About us & global reach 3 Services & Solutions 4 Traffic Diversion 5 Response Time 6 Control Center 7 Capacity Backup 8 Partners CONTENT overview 9 Summary 1
  • 3. DDoS Protection Strategies – General Traditional Approaches On Premises Dedicated appliances Pros • Good for layer 7 attacks • Enterprise control Cons • Vol. attacks (upstream) • Requires in-house skills Clean Pipe ISP detects and mitigates. Pros • Cost effective • Mature offering Cons • Low capacity ISP • ISP agnostic 2
  • 4. DDoS Protection Strategies – Providers Traditional Approaches CDN Provider Web content is distributed, mitigation done at the edge. Web only. Pros • Always On • New services (e.g.WAF) Cons • No DMZ protection • Limited to Web Scrubbing Center Traffic redirection to closest cleaning facility. Forward good traffic. Pros • Effects ALL traffic • Interact with CPE Cons • No auto-diversion* • Require testing 3
  • 5. SecurityDAM overview SecurityDAM offers Managed Security Service Providers (MSSPs) a quick and easy way of adding comprehensive Distributed Denial of Service (DDoS) protection service to their security portfolio.
  • 6. ABOUT US SecurityDAM Worldwide Resources Radware Partner SecurityDAM Control Center Monitoring & Alerting MSSP Solutions RAD Group DDoS Protection NOC/ERT Services Hybrid Approach Comprehensive evolving managed DDoS Protection Services 5
  • 7. OUR GLOBAL REACH Global Network of Scrubbing Centers US >100 Gbps Hong Kong >20Gbps Frankfurt >100 Gbps Current: >200 Gbps 200G OUR NETWORK IS EXPANDING Russia <partner> UK <partner> Hong Kong <partner> US >50Gbps Singapore >20Gbps Partners: >50 Gbps 250G 2014 Plans: >+100 Gbps 350G
  • 8. SERVICES & SOLUTIONS SecurityDAM Offering SecurityDAM offers a complete DDoS Protection Services suit, with a flexible deployment and responsibility offering, matching your current and future needs.  White Label Service Brand on SecurityDAM system  Turnkey Service Independent local system  Backup Service Mitigation capacity backup SecurityDAM suite of services enables flexible provisioning of DDoS Protection Services  Full Operational Services SecurityDAM NOC and ERT  Partial Operational Services NOC / ERT / Support  On Demand Service for registered end-customers 7
  • 9. OUR SERVICES System and Team Analysis Real-time analysis and adjustment of protection settings Accounting Flexible protection plans definitions to match customer and market needs Flexible Environment Cloud-based environment Best of bread flexible integration Development Evolving proprietary mitigation tools 24x7 Support NOC – monitoring, mitigation and past mortem analysis Research DDoS tools and mitigation techniques research 8
  • 10. Traffic Diversion Automated from the Control Center Traffic diversion to Scrubbing Centers BGP AS / (/24) network diversion Route Change direct route changes 9 DNS website diversion (reverse-proxy)
  • 11. RESPONSE TIME #1 Shortest Time-to-Mitigate 24x7 Monitoring Real-time / Inline Detection time measured in seconds. Alert NOC / Customer Analysis of attack and mitigation measures. CPE Only Monitor on premises actions Divert Decide on diversion and engage 10
  • 12. TIME TO MITIGATE < 15 minutes, when diversion is needed Time to mitigate
  • 13. RESPONSE TIME Short response time to new threats SOFTWARE Cloud Deployment Quick deployment of new measures IDEA New threats Real-time analysis of mitigation efficiency DEVELOPING New protections COTS and custom mitigation tools integration 12
  • 14. 13 Figure 1 Customer Dashboard Real-time monitoring  Traffic  Setting  Security & Operational Signaling based Alerting Diversion requests Control Center Managing DDoS Protection Service
  • 15. 14 Figure 2 Operator Dashboard Global real-time views  Traffic  Setting  Security & Operational Signaling based Alerting Control Center Managing DDoS Protection Service
  • 16. 15 Figure 3 Reports Summary Report Account report aggregating CPE and Scrubbing Center data Detailed Report Attack report per incident (with aggregation) Enhanced Reports (future) External source integration to produced reports. Control Center Managing DDoS Protection Service
  • 17. CAPACITY BACKUP SERVICE High rate attack mitigation via SecurityDAM SD Net Capacity backup services for supporting local scrubbing center resource limitation. Unified Unified reporting cross levels, with aggregated date from multiple mitigation points. IncreaseValue ReduceCapEx DDoS attack rate can be overwhelming 80/20 still apply  rely on cloud backup 16
  • 18. Partners – JT Global Operating SecurityDAM Independent System Image Placeholder 1  UK Channel Island operator  Customer DDoS Protection  Banking  Online businesses  Stand-alone Control Center  Stand-alone Scrubbing Center Mark Stuchfield, (Head of Innovation and Strategy, JT): “SecurityDAM allows us to provide these cloud security services to multiple customers and at the same time give them a visual indication of what is going on” 17
  • 19. Partners – Defense Center LLC Operating SecurityDAM Independent System  Russian MSSP  Customer DDoS Protection  Small businesses  Enterprise networks  Domestic Control Center  Mitigation capacity backup Valery Kirillov, (CEO): “Business continuity is a prime concern to our customers. Our multi- layered DDoS protection will allow us to provide the highest level of mitigation capacity, backup by SecurityDAM Emergency Response Team service.” 18
  • 20. SUMMARY Basic flow Clean Reinjection CC 51 Monitor CPE Mitigate / Alert CPECC 2 Divert To CC 3 Cloud Mitigation CC 4 Attack End CPE 6 19
  • 21. SUMMARY Attack Management Flow 20 On-premise CPE mitigates the attack Protected Organization Signaling Messaging Volumetric DDoS attack blocks the Internet pipe Clean traffic Sharing essential information for attack mitigation MSSP Scrubbing Center & NOC SecurityDAM Global Scrubbing Centers MSSP/customer decide to divert the traffic MSSP local capacity exhausted; initiate Capacity Backup
  • 22. SUMMARY SecurityDAM DDoS Protection Platform and Services Customer Portal Operator provisioning and management Audit and Accounting Monitoring End-to-End Protection Integrated Layered DDoS protection Smooth operation Experts assistance 21