Slideshare - All Slideshows

Arbor Networks technical and industry presentations - follow us on SlidesShare for more: http://Slideshare.com/Arbor_Networks

  • ATLAS Q2 2015 Global DDoS Attack Trends

    ATLAS Q2 2015 Global DDoS Attack Trends

    This presentation provides details into DDoS attack data for Q2 2015. It was gathered from Arbor Networks' ATLAS portal which is a truly innovative, one-of-a-kind Internet monitoring system. ATLAS is

    View Presentation
  • Attack of the Shuriken: Many Hands, Many Weapons

    Attack of the Shuriken: Many Hands, Many Weapons

    The expected evolution of DDoS attacks continues. Attack sizes increase over time, tools become easier to use, more threat actors are launching attacks, older attack techniques have become commoditize

    View Presentation
  • Best Practices: Using Your Network and the Cisco ASR 9000 for DDoS Protection

    Best Practices: Using Your Network and the Cisco ASR 9000 for DDoS Protection

    DDoS attacks are rising in size, frequency and complexity; recent research from Arbor Networks discovered a 334 Gbps DDoS attack! What makes this concerning is that there isn’t a single DDoS protectio

    View Presentation
  • The Cost of​ ​Time to Identify and Contain Advanced Threats in Financial Services & Retail A Study of North America & EMEA

    The Cost of​ ​Time to Identify and Contain Advanced Threats in Financial Services & Retail A Study of North America & EMEA

    In the wake of high profile mega breaches, the Ponemon Institute, surveyed Financial Services and Retail firms in North America and Europe, Middle East and Africa (EMEA) to better understand how they

    View Presentation
  • SDN and NFV: How Arbor Integrates with and Protects the Next Wave of Intelligent Infrastructure

    SDN and NFV: How Arbor Integrates with and Protects the Next Wave of Intelligent Infrastructure

    As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictab

    View Presentation
  • Using BGP Flowspec to mitigate DDoS attacks: How to Deploy Flowspec in a Service Provider Environment

    Using BGP Flowspec to mitigate DDoS attacks: How to Deploy Flowspec in a Service Provider Environment

    Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for manag

    View Presentation
  • Best Practices for DDoS Mitigation

    Best Practices for DDoS Mitigation

    DoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconcepti

    View Presentation
  • ATLAS Q1 2015 Global DDoS Attack Trends

    ATLAS Q1 2015 Global DDoS Attack Trends

    This presentation provides details into DDoS attack data for Q1 2015. It was gathered from Arbor Networks' ATLAS portal which is a truly innovative, one-of-a-kind Internet monitoring system. ATLAS is

    View Presentation
  • Caught between a Tsunami and a Knife Fight: Incident Response in the New Era of Targeted Attacks

    Caught between a Tsunami and a Knife Fight: Incident Response in the New Era of Targeted Attacks

    This presentation depicts the 'knife fight' going on in network security today; this is the evolution of the DDoS threat over time. The 'tsunami' represents the emergence of advanced threats and targe

    View Presentation
  • Security Beyond the SIEM

    Security Beyond the SIEM

    Security Information and Event Management (SIEM) tools are widely used in enterprise security organizations as a means to comply with industry regulations for data correlation. These tools are instrum

    View Presentation
  • 5 Misconceptions About the Modern DDoS Attack

    5 Misconceptions About the Modern DDoS Attack

    Distributed Denial of Service attacks, once dismissed as simple flood-based threats, are now regularly in the headlines for taking down the networks of one Fortune 500 corporation after another. For t

    View Presentation
  • The Russian DDoS One: Booters to Botnets

    The Russian DDoS One: Booters to Botnets

    This presentation was originally given by Dennis Schwarz, ASERT senior security analyst, at BotConf 2014. It explores Russian DDoS One, or RD1, which is an informal grouping of threat actors that prov

    View Presentation
  • The Modern DDoS Attack: Learn How Companies are Responding

    The Modern DDoS Attack: Learn How Companies are Responding

    Given the increase in the size, frequency and complexity of DDoS attacks today, how are organizations preparing for them? What kinds of detection and response processes and technologies are organizati

    View Presentation
  • How to Calculate the Financial Impact of an Attack on Your Network

    How to Calculate the Financial Impact of an Attack on Your Network

    Security incidents can have broad ranging impacts on a service provider, its customers and its peers. Damage can be hard to calculate after an incident and even harder to predict the number, size, typ

    View Presentation
  • Leveraging the Uniqueness of the Arbor Networks Threat Intelligence Feeds

    Leveraging the Uniqueness of the Arbor Networks Threat Intelligence Feeds

    Staying abreast of the latest cyber threats is a daunting task for even the best of security teams. Timely and high-fidelity threat intelligence can be the difference between business continuity and b

    View Presentation
  • Delivering a comprehensive DDoS Service

    Delivering a comprehensive DDoS Service

    Due to changes in motivation and the abundance of do-it-yourself DDoS attack tools/services, DDoS attacks are rising in size, frequency and complexity. In turn, enterprises of all sorts are turning to

    View Presentation
  • Storms on the Horizon: Why are Cloud Services the Targets of Availability Attacks?

    Storms on the Horizon: Why are Cloud Services the Targets of Availability Attacks?

    As more services move to the cloud, the accessibility of these services becomes absolutely critical. This movement has also attracted the attention of malicious attackers, as the multi-tenant nature o

    View Presentation
  • Shedding Light on Threats That Lurk in Your Network Blind Spots

    Shedding Light on Threats That Lurk in Your Network Blind Spots

    Network visibility is a fundamental requirement for proper network and threat management. You can’t protect yourself (or your customers) from what you can’t see. In this presentation, you’ll learn a

    View Presentation
  • How to Stop a DDoS Attack in Less Than 1 Minute

    How to Stop a DDoS Attack in Less Than 1 Minute

    When you are under attack, every seconds counts. In this presentation, you will learn about the new features in Arbor Networks' Peakflow version 7.0 that are designed to significantly reduce the time

    View Presentation
  • DDoS and Malware Trends: Incident Response in the New Era of Targeted Attacks

    DDoS and Malware Trends: Incident Response in the New Era of Targeted Attacks

    This presentation shares insights from Arbor Networks’ Worldwide Infrastructure Security Report and Arbor's ATLAS real-time threat monitoring system. You will learn about the largest DDoS attacks on r

    View Presentation
  • loading
    Loading More...