Hi [[ session.user.profile.firstName ]]

Best Practices for DDoS Protection

DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

Join us for a session that will cover:
• An overview of the current attack landscape and implications
• Best practice defense against modern DDoS attacks
• Lessons learned by global enterprises struck by attacks
Recorded Apr 29 2015 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Julio Arruda, Sales Engineering Manager, Arbor Networks
Presentation preview: Best Practices for DDoS Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Case Study: Transform Threat Investigation With a Stretched Security Team Oct 12 2017 3:00 pm UTC 60 mins
    Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • Quantifying DDoS Cyber Risk with the FAIR Methodology Oct 5 2017 3:00 pm UTC 60 mins
    Tom Bienkowski Dir. DDoS Product Marketing Arbor Networks + Jim Hietala VP Business Development and Security The Open Group
    Here’s a question for you…Is the DDoS attack protection you (may) have put in place years ago, still adequate to protect you from the modern-day DDoS attack? If not (or you’re not sure), then you are at risk. More importantly, how do you explain the risk and build the business case for protection to Executive Management / Board? Join Arbor Networks, the world leader in DDoS attack protection and Jim Hietala from The Open Group to learn:

    - The latest trends in DDoS attacks and best practices in defense.
    - How to use FAIR (Factor Analysis of Information Risk), to take a quantitative, financial approach to analyze the risk of DDoS attacks.
    - How, using different Arbor Networks DDoS attack protection solutions, you can reduce your risk and loss exposure.
    - Tips on how to present your risk analysis and business case for DDoS attack protection - in terms your Executive Management/Board will understand.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Sep 28 2017 4:00 pm UTC 60 mins
    Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc.
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • Intelligent Automation is Your Greatest Weapon Against DDoS Attacks Recorded: Aug 30 2017 40 mins
    Tom Bienkowski, Director of DDoS Product Marketing and Nimin Patel, Corporate Systems Engineer, Arbor Networks
    According to data from Arbor Networks’ Active Threat Level Analysis System (ATLAS), a DDoS attack occurs every 6 seconds in the world. When you’re under attack; time is of the essence. The organization that you protect doesn’t care about attacks details such as size, vectors etc. All they care about is how fast you can stop the attack to minimize impact. Your best defense against the modern-day DDoS attack is an automated, intelligently layered approach to DDoS attack detection and mitigation. Join Arbor Networks, the industry leader in DDoS attack protection solutions, to learn about the latest trends in DDoS attacks and best practices in defense – including a demonstration of Arbor’s fully automated, intelligently integrated, combination of on premise and in-cloud DDoS attack protection solution.
  • Time for Banks to Reassess Their Risk of DDoS Attacks Recorded: Jul 27 2017 33 mins
    Tom Bienkowski, Director of DDoS Product Marketing, Arbor Networks
    A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.

    Join this webcast to learn:
    •The latest trends in DDoS attacks.
    •Commonly overlooked costs due to DDoS attacks.
    •And best practices in DDoS attack defense.
  • The Need for Cloud DDoS Mitigation Recorded: Jun 14 2017 55 mins
    Rik Turner Principal Analyst OVUM & Tom Bienkowski, Directror Product Mkt, Arbor Networks
    You've read the headlines. DDoS attacks as large as 800Gbps impacting major banking, entertainment and communications companies. But the stories that don't get media coverage are the much more frequent, smaller DDoS attacks under 1 Gbps that are large enough to overwhelm the internet access capacity of most organizations.

    So what can your network team do to ensure uninterrupted availability? The answer is to rely upon a cloud-based, managed DDoS attack protection service.

    Attend this webcast to learn:
    • That the vast majority of DDoS attacks, which are less than 2 Gbps in size, are large enough to overwhelm most organizations’ internet bandwidth.
    • How enterprises and service providers can augment their on-premise DDoS attack protection solutions with in-cloud mitigation.
    • What to expect from a cloud-based DDoS Mitigation Service Provider and why an always on, in-cloud solution may not be the best option for protection.
    • How Arbor’s fully integrated cloud-based and on-premise DDoS attack protection solution offers the industry’s most comprehensive form of protection.
  • Don't just check the box - real DDoS protection Recorded: Apr 14 2017 2 mins
    Arbor Networks
    While some enterprises may think that have secured their key services against DDoS attacks simply by deploying intrusion prevention systems (IPS) or firewalls in front of their servers, they are actually exposing their organizations to service outages.

    Do you have the right protection tools for your network?
  • Tech Industry Doppelgangers: Campaign Innovation in the World of Cybercrime Recorded: Apr 11 2017 56 mins
    Scott Crawford Research Director, Information Security 451 Research+ Arabella Hallawell Sr. Director Advanced Threat Product
    451 Research went underground to talk to black and white hats in the industry to get the details on the latest attack tools and approaches.

    Register for this webinar to learn:

    • We now have an adversary more likely to solve a problem like an IT administrator, than Hollywood’s depiction of a hacker.

    • What do you need against an adversary with a high degree of technical skills and familiarity with the tools IT administrators use?

    • The cloak of payment systems such as Bitcoin now simplify the attacker’s payroll while reducing risk of exposure considerably. New style of Denial-of-Service attacks and fully automated attack platforms now capitalize on trends such as ransomware for today’s get-quick-rich schemes.

    • What do you need to protect your organization with attacks built to deliver the fastest Mean Time To Pay?
  • IoT Risk Becomes Real Recorded: Feb 23 2017 64 mins
    Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?
  • 12th Annual WISR Review: Era of Escalated Risk Recorded: Jan 26 2017 47 mins
    Gary Sockrider, Principal Security Technologist, Arbor Networks + John Paul Blaho, Sr. Manager, Arbor Networks
    Arbor Networks' 12th Annual Worldwide Infrastructure Security Report (WISR) offers a rare view into the most critical security challenges facing today’s network operators.This session will review the highlights from the report to help network operators understand the breadth of the threats that they face, gain insight into what their peers are doing to address these threats, and comprehend both new and continuing trends.
  • How To Use Your Network To Fend Off The Latest Cyber Threats Recorded: Jan 12 2017 57 mins
    John Pescatore,director of emerging security trends,SANS+Paul Bowen,security practitioner, Arbor Networks, Arabella Hallawell
    A discussion on the latest cyber-attack methods and approaches, including ransomware, facing security teams. Quickly identifying malicious or suspicious network traffic communications can be the key to faster detection and effective response. We demonstrate how to quickly identify the signs and shut down malicious activity in the network and access data where and where you need it from your security infrastructure.
  • The Role of Internal Network Traffic Analysis in Cybersecurity Recorded: Dec 8 2016 61 mins
    Rob Westervelt, Research Manager, IDC Security + Arabella Hallawell, Sr. Director ADVT Product Marketing, Arbor Networks
    This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.

    IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.

    Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.
  • DDoS Attacks: The Stakes Have Changed, Have You? Recorded: Nov 17 2016 58 mins
    Sean Pike – Program Vice President, Security Products, IDC & Tom Bienkowski – Director DDoS Product Marketing, Arbor Networks
    Despite years of headlines, many businesses today are under-invested and ill-prepared to handle modern DDoS attacks. Many wrongly believe they are not being targeted by DDoS attacks, and are in fact experiencing outages due to DDoS attacks that are being attributed to equipment failures or operational error because the companies lack DDoS visibility and defense. Still more rely on existing, more traditional, security devices such as firewalls and intrusion prevention systems (IPS), or a single layer of protection from their ISP or content delivery network (CDN). In each case, these businesses are exposed and only partially protected. Firewalls and IPS are stateful devices that are often targets of DDoS attacks, while cloud-only or CDN protection does not provide adequate protection for critical business applications.

    Join this webinar with Arbor Networks and IDC to understand exactly how the stakes have changed, and what it means for the assumptions organizations have been making with regard to protecting the availability of their business-critical websites, services and applications. In light of the recent attacks, we will expose the multiple attack vectors of the Mirai IoT botnet and provide best practices for mitigation.


    • About the evolution of DDoS attacks
    • The implications for DDoS defense
    • Current best practices in DDoS defense
  • DDoS Fossils to Future: A Brief History and What to Expect Recorded: Sep 13 2016 48 mins
    Gary Sockrider, Chief Security Technologist, Arbor Networks
    The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.

    Join this session to find out:
    -Learnings from past DDoS threat and attack trends
    -How today’s DDoS poses threat to any organization’s availability
    -What prevention and mitigation approaches are proving most effective
  • Why the Human Factor Matters in the Age of Machines Recorded: Aug 25 2016 49 mins
    Paul Bowen, Principal Security Technologist, Arbor Networks
    With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race.

    But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more and more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness.

    As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption

    Join Arbor’s Paul Bowen for a discussion on how using humans to combat humans is the new normal...
  • The Human Factor in the Age of Cyber Conflict Recorded: Aug 24 2016 44 mins
    Chandler Howell, CISSP, Nexum, Inc. and Paul Bowen, Principal Security Technologist, Arbor Networks
    With new technologies appearing daily, attackers have a constant stream of potential new tools, tactics and practices to use as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race.
    But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness.
    As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption.
  • Defending Oil & Gas Industrial Control System (ICS) Networks Recorded: Jun 16 2016 44 mins
    Jim Linn, Managing Director, IT, American Gas Association + Tom Bienkowski, Director Product Marketing, Arbor Networks
    A 2015 McKinsey study suggests oil and gas companies could realize $1B in cost savings or production increases by better leveraging existing data and IT technologies. Convergence of Industrial Control System (ICS) networks with corporate IT and partner networks is one such way to increase productivity; the downside it that this also increases risk.

    Join this webinar where we'll discuss the growing threats targeting Oil & Gas ICS networks from Distributed Denial of Service (DDoS) attacks, ICS specific malware and advanced attacks – and more importantly best practices in threat defense.
  • Ready Before the Smoke Clears: understanding the correlation between DDoS attack Recorded: Jun 8 2016 44 mins
    Chris Rodriguez, Senior Industry Analyst, Frost and Sullivan and Tom Bienkowski, Director- product Marketing Arbor Networks
    A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.

    Learn to listen to your network activity:

    -Clues from DDoS attacks that will help you investigate threats
    -Why organizations like FFIEC warn banks about the use of DDoS
    -Best practices for DDoS protection
  • Will the Real Advanced Threat Stand Up? Attack Campaigns in 2016 and Beyond Recorded: Feb 18 2016 59 mins
    Richard Stiennon, Research and Industry Executive, Security Current + Arabella Hallawell,Sr. Director of Product Marketing
    For years the security industry has concluded that advanced persistent threats involve some sort of malware in order to be successful. While malware can be used to exploit a target, a sea-change in the threat landscape has taken place, which extends beyond the need for more sophisticated malware detection alone; attack campaigns.

    Attack campaigns are not just a one-and-done attack hoping to compromise an endpoint, but rather an objective focusing on a specific motive and mission with the intention and design to persevere and proliferate, until the campaign is deemed successful.

    In this webinar you'll hear from Richard Stiennon of Security Current on:

    -Attack Campaigns- what they are and how to protect yourself

    -Case studies in how organizations protect themselves

    -Arbor Networks' approach to Threat Intelligence campaign tracking and see Arbor Spectrum, a brand new platform designed with the security user in mind to investigate and prove attack campaigns 10x more efficiently than existing solutions today.
  • Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Recorded: Feb 11 2016 43 mins
    Paul Bowen, Principal Security Technologist + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks
    A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

    This session will cover:

    • The primary challenges facing security teams with emphasis on the balance between technology, people and process.

    • Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

    • How businesses are adapting and changing their threat detection and incident response to reduce risk posture
Arbor Networks
Arbor Networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for DDoS Protection
  • Live at: Apr 29 2015 1:00 pm
  • Presented by: Julio Arruda, Sales Engineering Manager, Arbor Networks
  • From:
Your email has been sent.
or close