Hi [[ session.user.profile.firstName ]]

Best Practices for DDoS Protection

DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

Join us for a session that will cover:
• An overview of the current attack landscape and implications
• Best practice defense against modern DDoS attacks
• Lessons learned by global enterprises struck by attacks
Recorded Apr 29 2015 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Julio Arruda, Sales Engineering Manager, Arbor Networks
Presentation preview: Best Practices for DDoS Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Role of Internal Network Traffic Analysis in Cybersecurity Dec 8 2016 5:00 pm UTC 60 mins
    Rob Westervelt, Research Manager, IDC Security + Arabella Hallawell, Sr. Director ADVT Product Marketing, Arbor Networks
    This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.

    IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.

    Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.
  • DDoS Attacks: The Stakes Have Changed, Have You? Recorded: Nov 17 2016 58 mins
    Sean Pike – Program Vice President, Security Products, IDC & Tom Bienkowski – Director DDoS Product Marketing, Arbor Networks
    Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not being targeted by DDoS attacks, and are in fact experiencing outages due to DDoS attacks that are being attributed to equipment failures or operational error because the companies lack DDoS visibility and defense. Still more rely on existing, more traditional, security devices such as firewalls and intrusion prevention systems (IPS), or a single layer of protection from their ISP or content delivery network (CDN). In each case, these businesses are exposed and only partially protected. Firewalls and IPS are stateful devices that are often targets of DDoS attacks, while cloud-only or CDN protection does not provide adequate protection for critical business applications.

    Join this webinar with Arbor Networks and IDC to understand exactly how the stakes have changed, and what it means for the assumptions organizations have been making with regard to protecting the availability of their business-critical websites, services and applications. In light of the recent attacks, we will expose the multiple attack vectors of the Mirai IoT botnet and provide best practices for mitigation.


    • About the evolution of DDoS attacks
    • The implications for DDoS defense
    • Current best practices in DDoS defense
  • DDoS Fossils to Future: A Brief History and What to Expect Recorded: Sep 13 2016 48 mins
    Gary Sockrider, Chief Security Technologist, Arbor Networks
    The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.

    Join this session to find out:
    -Learnings from past DDoS threat and attack trends
    -How today’s DDoS poses threat to any organization’s availability
    -What prevention and mitigation approaches are proving most effective
  • Why the Human Factor Matters in the Age of Machines Recorded: Aug 25 2016 49 mins
    Paul Bowen, Principal Security Technologist, Arbor Networks
    With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race.

    But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more and more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness.

    As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption

    Join Arbor’s Paul Bowen for a discussion on how using humans to combat humans is the new normal...
  • The Human Factor in the Age of Cyber Conflict Recorded: Aug 24 2016 44 mins
    Chandler Howell, CISSP, Nexum, Inc. and Paul Bowen, Principal Security Technologist, Arbor Networks
    With new technologies appearing daily, attackers have a constant stream of potential new tools, tactics and practices to use as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race.
    But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness.
    As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption.
  • Defending Oil & Gas Industrial Control System (ICS) Networks Recorded: Jun 16 2016 44 mins
    Jim Linn, Managing Director, IT, American Gas Association + Tom Bienkowski, Director Product Marketing, Arbor Networks
    A 2015 McKinsey study suggests oil and gas companies could realize $1B in cost savings or production increases by better leveraging existing data and IT technologies. Convergence of Industrial Control System (ICS) networks with corporate IT and partner networks is one such way to increase productivity; the downside it that this also increases risk.

    Join this webinar where we'll discuss the growing threats targeting Oil & Gas ICS networks from Distributed Denial of Service (DDoS) attacks, ICS specific malware and advanced attacks – and more importantly best practices in threat defense.
  • Ready Before the Smoke Clears: understanding the correlation between DDoS attack Recorded: Jun 8 2016 44 mins
    Chris Rodriguez, Senior Industry Analyst, Frost and Sullivan and Tom Bienkowski, Director- product Marketing Arbor Networks
    A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.

    Learn to listen to your network activity:

    -Clues from DDoS attacks that will help you investigate threats
    -Why organizations like FFIEC warn banks about the use of DDoS
    -Best practices for DDoS protection
  • Will the Real Advanced Threat Stand Up? Attack Campaigns in 2016 and Beyond Recorded: Feb 18 2016 59 mins
    Richard Stiennon, Research and Industry Executive, Security Current + Arabella Hallawell,Sr. Director of Product Marketing
    For years the security industry has concluded that advanced persistent threats involve some sort of malware in order to be successful. While malware can be used to exploit a target, a sea-change in the threat landscape has taken place, which extends beyond the need for more sophisticated malware detection alone; attack campaigns.

    Attack campaigns are not just a one-and-done attack hoping to compromise an endpoint, but rather an objective focusing on a specific motive and mission with the intention and design to persevere and proliferate, until the campaign is deemed successful.

    In this webinar you'll hear from Richard Stiennon of Security Current on:

    -Attack Campaigns- what they are and how to protect yourself

    -Case studies in how organizations protect themselves

    -Arbor Networks' approach to Threat Intelligence campaign tracking and see Arbor Spectrum, a brand new platform designed with the security user in mind to investigate and prove attack campaigns 10x more efficiently than existing solutions today.
  • Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Recorded: Feb 11 2016 43 mins
    Paul Bowen, Principal Security Technologist + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks
    A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

    This session will cover:

    • The primary challenges facing security teams with emphasis on the balance between technology, people and process.

    • Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

    • How businesses are adapting and changing their threat detection and incident response to reduce risk posture
  • 2016 Annual Worldwide Infrastructure Security Update Recorded: Feb 4 2016 53 mins
    Gary Sockrider, Principal Security Technologist, Arbor Networks
    Arbor Networks' 11th Annual Worldwide Infrastructure Security Report (WISR) offers a rare view into the most critical security challenges facing today’s network operators. This session will review the highlights from the report to help network operators understand the breadth of the threats that they face, gain insight into what their peers are doing to address these threats, and comprehend both new and continuing trends.

    This year reveal a 60x increase in DDoS attack size, a marked increase in cyber extortion attempts and an influx of advanced threats, all of which is driving an increased focus on DDoS mitigation best practices and rapid adoption of incident response plans.

    Join this presentation to:

    · Hear about the mounting challenges ahead for those involved in day-to-day security operations

    · Understand how your network infrastructure may be affected by the rapidly changing threat landscape
  • Which DDoS Soltuion is Right for me? Recorded: Jan 27 2016 4 mins
    Arbor Networks
    Arbor Cloud is a layered DDoS protection solution that combines the comprehensive network threat detection of Arbor’s Peakflow technology and Arbor’s Pravail, an always-on application layer attack solution. Arbor Cloud signaling offers additional mitigation capacity and expertise that allows you to fully control your network, applications, and services in the event of a DDoS attack.

    While Peakflow and Pravail services can be implemented separately, the Arbor Cloud DDoS Protection Service unites both platforms to ensure utmost network security against application-layer and volumetric attacks. Using a combination of on-premise hardware and cloud-based protection, Arbor Cloud quickly detects and mitigates malicious traffic.

    Arbor Cloud is an ideal service to deliver comprehensive DDoS protection to your customers as well as your own organization, and is supported by Arbor’s Security Engineering and Response Team (ASERT) and Atlas.
  • How do you REALLY Know if Your DDoS Protection Solution will stop a DDoS Attack? Recorded: Dec 9 2015 45 mins
    Tom Bienkowski, Director of Product Marketing, Arbor Networks and Sahba Kazerooni, Managing Director at Security Compass
    So you’ve purchased a DDoS protection solution. You’ve installed it according to the vendor’s recommendations. Sigh of relief…you’re feeling more secure already. But there’s a nagging thought in the back of your mind …“How do I REALLY know if my DDoS protection solution will stop a complex DDoS attack?”

    The answer is certainly NOT "wait and see." The best practice is to simulate the attack vectors of a real DDoS attack as accurately as you possibly can, to put your technology and process to the test - before a real attack occurs.

    Join Arbor Networks, the leader in DDoS attack protection products and services and Security Compass, a leading DDoS attack simulation and security consulting company – to see how you can use DDoS attack simulation to test the various layers of your DDoS protection solution.

    This webcast will cover:

    - A variety of DDoS attack types simulated to show you how they impact a network
    - What patterns and information you should expect from a mitigation device in action
    - How to convert your learnings into actionable guidance for your DDoS attack response plan
  • Arbor Solutions for the Next Decade of DDoS Defense Recorded: Oct 14 2015 46 mins
    Scott Iekel-Johnson, Product Manager, Arbor Networks
    Recognizing the growing complexity of stopping DDoS attacks and the diversity of customer requirements, Arbor is announcing an expanded portfolio of DDoS protection products and services that will meet the deployment, scale and cost requirements of any organization- from the largest Service Provider to smallest Enterprise. In this session, join Arbor’s Scott Iekel-Johnson, Senior DDoS Solutions Product Manager, for a detailed review of Arbor's new portfolio of DDoS protection products and services which include: new 2U appliances providing up to 160 Gbps of mitigation capacity, new virtual DDoS mitigation solutions, and new in-cloud and on-premises managed DDoS protection services.
  • Best Practices in DDoS Defense: Real World Customer Perspectives Recorded: Oct 14 2015 46 mins
    Carlos Morales,VP – Sales Engineering and Arbor Cloud,Arbor Networks
    There’s little doubt that DDoS attacks continue to rise in size, frequency and complexity. It’s also true that DDoS attacks impact organizations of all types – from service providers to cloud/hosting providers to enterprises in all verticals and regions of the world. In this session, Arbor’s Carlos Morales, VP of Sales Engineering, along with a panel of Arbor Service Provider and Enterprise customers, will discuss their experiences with DDoS attacks and best practices for DDoS attack defense.
    The panel will discuss:
    -Their DDoS attacks trends and top challenges.
    -Their recommended best practices in DDoS defense.
    -The importance of threat intelligence.
    -The future of DDoS and role of Arbor products and services.

    Steve Bendall
    Head of Network Security DDoS
    BT Security

    Roman Lara
    Network Engineer II

    Alexander Miranda
    Director of Security

    J. Marc Hopkins
    Network Services Manager
    SouthWest Ohio Computer Association
  • Latest DDoS Attack Trends – Excerpts from Arbor ATLAS Global Statistics Recorded: Oct 14 2015 46 mins
    Darren Anstee, Chief Security Technologist, Arbor Networks
    Hear it from the experts: a realistic depiction of the DDoS attack landscape today. In this session Arbor’s Darren Anstee, Chief Security Technologist, will review current ATLAS statistics showing the frequency of attacks, the volume of attack traffic clogging the pipes of the world's largest enterprises and service providers networks and theorize as to why the upward trend in DDoS attacks is happening – and more importantly what you can do to protect your organizations from these attacks.
  • What happened next? Detecting an attack in real-time Recorded: Sep 30 2015 39 mins
    Scott Crane Director, Product Management + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks
    You get an alert on an attack. You check it out and you find a real breach. You are able to stop it. Job done.

    Or is it? Do you know how the attacker got in? Do you know if this is the only system they compromised? Do you know what they did next, before you found them?

    In this session, Arbor will show you the importance of understanding lateral movement and the ability to understand the entire extent and impact of a breach. Know if your compromised system was used to attack further hosts and if so what was done. Build an evidence trail that can be used to identify every facet of the attack and the methods used, quickly and simply.
  • 110 Bitcoin or Else! Recorded: Sep 24 2015 53 mins
    Curt Wilson, Senior Threat Intelligence Analyst
    It's your turn! Your site is going under attack unless you pay 110 Bitcoin.

    The threat came from one of the many extortion attempts launched at large corporations this year. Despite efforts to track the perpetrators down, these emails -- and the distributed denial of service (DDoS) attacks that follow-- are continuing to cause headaches for large retailers, financial services companies, online gamers, higher education and casinos.

    In this web seminar, hear from Curt Wilson, senior threat analyst at Arbor, who has been following these attacks throughout the year. Find out what more common methods were used and how they have evolved to combine "application layer," more advanced attacks.

    - Learn about the DDoS attack strategies being used.
    - Find out how Arbor customers are helping provide greater intelligence to stop these attacks for the Arbor community
  • Secure Networks Mean Secure Revenue Recorded: Sep 16 2015 46 mins
    Mike Noto, Senior Product Manager, Cisco Systems + Gary Sockrider, Principal Security Technologist, Arbor Networks
    According to Arbor’s 2014 Worldwide Infrastructure Security Report, 70% of service providers are seeing an increasing demand from customers for DDoS detection and mitigation services. The customers with the greatest demand are cloud/hosting providers, financial services, government, and e-commerce sectors.
    The goal of this presentation is to discuss the various approaches to defending your network against the threat of DDoS attacks and how to leverage this capability to generate revenue via a managed DDoS protection service offering.
  • DDoS Readiness, Response, and Impact in the Financial Services Industry Recorded: Aug 26 2015 48 mins
    Mike Saurbaugh, IANS Faculty Member and Rakesh Shah Senior Director of Product Marketing and Strategy, Arbor Networks
    Availability is one of the core principles in the security CIA triad and one which business leaders tend to grasp more so than other technical risks associated with security. Customers want and expect access to their finances anytime and from anywhere. How is the financial industry grappling with distributed denial of service (DDoS)? What is the financial impact to an institution under DDoS attack? Are financial services firms witnessing an increase in DDoS attacks and duration? If so, what countermeasures are in place to ensure availability does not suffer?

    Lastly, what is the financial services industry relying on as sources of intelligence?

    Join us to hear answers to these questions and more as IANS Research and Arbor Networks present poll results from financial services’ security executive management surveyed.
  • Neverquest – A Case Study Recorded: Jul 22 2015 55 mins
    Sam Curry CTO& CSO, Arbor Networks and Kirk Soluk, ASERT Threat Intelligence and Response Team
    Let's talk about Neverquest - the global malware campaign targeting businesses around the world!

    Join Sam Curry, Arbor's Chief Technology & Security Officer, and Kirk Soluk of Arbor’s Security Engineering & Response Team, for an insightful discussion on the economics of cybercrime, a detailed analysis of the Neverquest malware family, as well as insight into Arbor’s reversing techniques that unravel and monitor this stealthy and rapidly evolving malware.

    Join this webcast to learn:

    -What motivates the attackers?
    - Why Neverquest is such a potent and persistent malware family
    -How ASERT'S research continues serves as a leading source of information on emerging threats, malware families and global cyber attacks
Arbor Networks
Arbor Networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for DDoS Protection
  • Live at: Apr 29 2015 1:00 pm
  • Presented by: Julio Arruda, Sales Engineering Manager, Arbor Networks
  • From:
Your email has been sent.
or close