610 likes | 808 Views
DDos Attacks and Web Threats: How to Protect Your Site & Information. Tina Shaw Account Executive 650-832-6087 tina.shaw@imperva.com. Hacking Tools. Low-Orbit Ion Canon (LOIC) Purpose - DDoS Windows desktop application, coded in C# UDP/TCP/HTTP flooding.
E N D
DDos Attacks and Web Threats: How to Protect Your Site & Information Tina Shaw Account Executive 650-832-6087 tina.shaw@imperva.com
Hacking Tools Low-Orbit Ion Canon (LOIC) Purpose - DDoS Windows desktop application, coded in C# UDP/TCP/HTTP flooding
DoS is Another Tool in the Hacker Toolbox Source: Imperva. Covers July 2010 -July 2011 across 600,000 discussions Hacker Forum Discussion Topics
A 100GB attack (Sept 24th) • Featured in eWeek on October 1, 2013 • The attack's load was distributed across our +350Gbps network. (each color represents a different data center)
Imperva Incapsula Overview Incapsula helps Website owners… Confidential
Versatility Imperva’s ^ “The idea of recognizing your strengths and using them in as versatile a way as you can is cool to me.” - Frank Ocean Tina
Imperva Incapsula Versatility Load Balancing Content Delivery Network (CDN) Load Balancing Web Application Firewall (WAF) Distributed Denial of Service (DDOS) Distributed Denial of Service (DDOS) By routing Website traffic through Incapsula, bad traffic is removed and good traffic is accelerated Confidential
Imperva Incapsula is Deployed as a Reverse Proxy Network 360° Global Threat Detection & Analysis:Enables early detection of threats and attack vectors and instant application of protection rules across the entire proxy network
Incapsula’s Global Content Delivery Network Confidential • Datacenters • Currently 15 Datacenters • USA (Ashville NC, Ashburn VA, Los Angles CA, San Jose CA, Chicago IL, Miami FL, Dallas TX, New York NY), London, Singapore, Israel, Amsterdam, Tokyo, Frankfurt, Sydney • Plans for another 4 Datacenters • Toronto, Hong Kong, Sao Paulo, and Milan • Data Across Borders • Customer data can be locked into (or out of) specific countries
Simplicity Tina Shaw! Security “Life is really simple, but we insist on making it complicated.” - Confusius
The Activation Email Elapsed time 20 sec
Creating a User Account Elapsed time 40 sec
Logging into Incapsula and adding a website Elapsed time 60 sec Confidential
Incapsula Automatically Gathers Site Data Elapsed time 1 min 5 sec Confidential
Changing DNS Settings Elapsed time 1 min 15 sec
Getting Lost in Go Daddy’s HorribleUI Elapsed time 6 min 15 sec
Updating DNS Records Elapsed time 8 min 15 sec
Completing Incapsula’s Setup Elapsed time 8 min 45 sec
The Website is Protected Elapsed time • 9 Minutes • 5 Minutes • 4~5 Minutes Confidential
Dashboard - Traffic Confidential
Dashboard - Traffic Confidential
Dashboard - Security Confidential
Dashboard - Performance Confidential
Dashboard – Datacenter Response Time Confidential
Dashboard – Recent Updates Confidential
Visits - CONFIDENTIAL -
Visits - More Confidential
Visits – Add to Whitelist Confidential
Settings - General Confidential
Settings – Login Protect Confidential
Settings - Performance Confidential
Settings - Performance Confidential
Settings - Notifications Confidential