The Rise of Hybrid — The New DDoS Protection Model [WEBINAR]


What is something nearly everyone needs, something nearly everyone asks for, something everyone provides, but also something nearly no one takes?

Answer:  Advice.

If you have spent considerable time wondering what to do about the evolving DDoS threat, you are not alone.  The threat has become a bona fide menace and protecting a business, its information, and its network is no longer just the responsibility of an IT technician.  These threats and the damage they can inflict are real and I’m offering my experience and advice in a new DDoS Webinar hosted by Infonetics.

Join us on April 7th, 2015 from 11am – 12pm EST for a discussion of these topics:

  • The current threat landscape
  • The options in DDoS mitigation (50 shades)
  • The pros and cons of each option
  • Brief introductions to offerings from contributing vendors
  • A summary of best options for various issues

The webinar will provide commentary from key analysts at Infonetics who have been following DDoS trends and vendors for years.  They will share thoughts on the various approaches, recap follies in old architectures, review promising new trends in technical security advances, and suggest action plans for staying ahead of the threats.

Radware Insights

I will be part of a vendor group that will present our individual vantage points on the threat landscape and opine with both stories and data harvested from our 2015 Global Application & Network Security Report. 

Some of the key data points I discuss are:

Key point #1

This year, more than a third (36%) of security industry survey respondents indicated that they use a hybrid solution with both customer premise equipment (CPE) and cloud solutions – another 6% plan to implement.  Responses also suggest that by 2015, nearly half (48%) of those surveyed will employ hybrid protection.

Key point #2

Not only has it increased as a point of failure, but the Internet pipe now has the “honor” of being the number-one failure point.  Meanwhile, hackers seem to be making their way through every protocol to determine how to use it for the next big reflective attack.  The result?  Reflective attacks represent the single largest DDoS “headache” of the last year.

Key Point #3

Attackers are now combining multiple techniques in a single attack—enabling them to bypass defense lines, exploit server-side vulnerabilities, and strain server-side resources.  Such attacks include Anonymization and Masquerading, Fragmentation, Encryption, Dynamic Parameters, Evasion and Encoding, Parameter Pollution and Extensive Functionality Abuse.  

Highly Qualified Hybrid Scrubbing is the Go-Forward Option

The session will demonstrate how advancements are continually being made to defend organizations from cyber-attacks.  There will also be some powerful reminders offered on why a diligent approach is needed.

Organizations that used to rely on their service provider’s DDoS protection service (in-the-cloud) found that the attacks that hit their business could and would bypass the provider’s protection layer.  This is because DDoS is a tactic, not the overall problem.  Attacks borne from the Internet are the problem and solutions designed to handle a simple tactic, wind up falling short.

What was realized by many organizations was that they needed to deploy premise-based technologies for comprehensive attack detection and mitigation.  In fact, our security researchers have seen that businesses which deploy on premise protection, in conjunction with DDoS protection from their service provider, are better able to survive and maintain their business operations, in spite of large scale, large volume, multi-vulnerability attack campaigns.  When deployed on both sides (on premise and through the service provider), businesses achieve the best protection when properly managed and maintained.

Sign up now for the webinar, Next-Generation DDoS Mitigation:  Leveraging Hybrid On-Premise and Cloud Solutions taking place tomorrow April 7th from 11am – 12pm EST.


Please enter your comment!
Please enter your name here