Check point ddos protector
This presentation is the property of its rightful owner.
Sponsored Links
1 / 19

Check Point DDoS Protector PowerPoint PPT Presentation


  • 116 Views
  • Uploaded on
  • Presentation posted in: General

Check Point DDoS Protector. June 2012. Cybercrime Trends for 2012. 32%. 44%. 35%. 33%. 32%. DDoS. SQL Injections. Botnet. APTs. DDoS. 65% Businesses Experienced Attacks. Average $214,000 of Damage Per Attack. Ponemon Institute, May 2012. Victims of Recent DDoS Attacks.

Download Presentation

Check Point DDoS Protector

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Check point ddos protector

Check Point DDoS Protector

June 2012


Cybercrime trends for 2012

Cybercrime Trends for 2012

32%

44%

35%

33%

32%

DDoS

SQL

Injections

Botnet

APTs

DDoS

65%Businesses Experienced Attacks

Average$214,000 of Damage Per Attack

Ponemon Institute, May 2012


Victims of recent ddos attacks

Victims of Recent DDoS Attacks

“While Yahoo was down, it suffered a loss of e-commerce and advertising revenue of about $500,000…” According to analysts

Sony “didn’t notice the security breaches that compromised 101 million user accounts because it was distracted by distributed denial of service attacks…” Sony in a letter to US Congress 2011

“Amazon.com claims its widely publicized DDoS attack resulted in a loss of $600,000 during the 10 hours it was down…” Amazon.com


Today s attacks are more sophisticated

Today’s Attacks Are More Sophisticated

More DDoS attacks today than ever before

  • More damage with application attacks

  • No need to flood network bandwidth


Check point ddos protector

DDoS Attacks by Type

TCP SYN

Flood

DNS

Web

Application Layer

Attacks

Network Layer Attacks

Other

Network

Other Application

  • More attacks are targeted at the Application Layer

Radware 2011


Application layer ddos attacks

Application Layer DDoS Attacks

  • New Application Attacks Are Stealthier…

  • Exploit application weakness with Low&Slow attacks

  • Utilize relatively low volume and fewer connections

  • Used in conjunction with volume-based attacks

  • Undetectable by threshold- or volume-based solutions


Ddos protection

DDoS Protection

The Right DDoS Solution Should Have…

Network

Layer Protection

Adaptable Application Layer Protections

Fast Response Time


Check point ddos protector

IntroducingCheck Point DDoS Protector™

Block Denial of Service Attacks Within Seconds!


Check point ddos protector1

Check Point DDoS Protector™

Customized multi-layeredDDoS protection

Protects against attacks within seconds

Integratedsecurity management and expert support


Multi vectored ddos attacks

Multi-Vectored DDoS Attacks

  • Network Flood

  • Application

  • Low & Slow Attacks

  • Server Flood

  • High volume of packets

  • Web / DNS connection-based attacks

  • High rate of new sessions

  • Advanced attack techniques


Multi layered protections

Multi-Layered Protections

  • Network Flood

  • Application

  • Low & Slow Attacks

  • Server Flood

Behavioral network analysis

  • High volume of packets

  • Automatic and pre-defined signatures

  • BehavioralHTTP and DNS

Granular custom filters

  • Web / DNS connection-based attacks

  • High rate of new sessions

  • Advanced attack techniques

  • Stateless and behavioral engines

  • Protections against misuse of resources

Challenge / response mitigation methods

Create filters that block attacks and allow users


Ddos protector product line

DDoS Protector Product Line

  • Enterprise Grade

  • Up to 3 Gbps throughput

  • 2M concurrent sessions

  • 1 Mpps max. DDoS flood attack rate

  • 7 models to choose from

  • 1GbE copper and 10GbE fiber connections

  • Low latency

  • Datacenter Grade

  • Up to 12 Gbps throughput

  • 4M concurrent sessions

  • 10 Mpps max. DDoS flood attack rate


Where to protect a gainst ddos

Where to Protect Against DDoS

Scenarios:

1

2

3

On-Premise Deployment

DDoS Protector Appliance

+

Off-Site Deployment

DDoS Protector Appliance


Appliance specifications

Appliance Specifications


Check point ddos protector

Integrated Security Management

Unified Logs and Monitoring

…and Unified Reporting

Leverage SmartView Tracker, SmartLog and SmartEvent for historic and real-time security status


Flexible deployment options

Flexible Deployment Options

Ready to Protect in Minutes

Fits to Existing Network Topology

Optional Learning Mode Deployment

Low Maintenance and Support


Check point ddos protector

Emergency Response and Support

Emergency Response Team

  • Help from security experts when under DoS attacks

  • Leverage experience gathered from real-life attacks

Check Point customer support

  • World-class support infrastructure

  • Always-on support 7x24

  • Flexible service options


Check point ddos protector

Summary

Blocks DDoS Attacks Within Seconds

  • Customized multi-layered DDoS protection

  • Ready to protect in minutes

Integrated with Check Point Security Management


Thank you

Thank You


  • Login