Top Banner
BACKUP DDOS DISASTER RECOVERY COMPLIANCE NETWORKS Over 25 Connected Locations 3 Continents 1 Global Network Safeguard your internet presence, with sophisticated and scalable DDoS attack protection In a recent report, it was acknowledged that almost 300 large-scale DDoS attacks take place every hour against major companies around the world. The Continent 8 Technologies DDoS Protection Service detects, protects and defends your infrastructure and services by way of a multi-layered Internet and application-aware architecture. Whether hosted by Continent 8 or not there are options to protect your infrastructure as it’s a matter of when, rather than if you will be attacked. How DDoS infects Innocent internet connected hosts
3

Safeguard your internet presence, with sophisticated and ... · Safeguard your internet presence, with sophisticated and scalable DDoS attack protection In a recent report, it was

Mar 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Safeguard your internet presence, with sophisticated and ... · Safeguard your internet presence, with sophisticated and scalable DDoS attack protection In a recent report, it was

BACKUP

DDOS

DISASTER RECOVERY

COMPLIANCE

NETWORKS

Over 25 Connected Locations • 3 Continents • 1 Global Network

Safeguard your internet presence, with sophisticated and scalable DDoS attack protection In a recent report, it was acknowledged that almost 300 large-scale DDoS attacks take place every hour against major companies around the world.

The Continent 8 Technologies DDoS Protection Service detects, protects and defends your infrastructure and services by way of a multi-layered Internet and application-aware architecture.

Whether hosted by Continent 8 or not there are options to protect your infrastructure as it’s a matter of when, rather than if you will be attacked.

How DDoS infects Innocent internet connected hosts

Page 2: Safeguard your internet presence, with sophisticated and ... · Safeguard your internet presence, with sophisticated and scalable DDoS attack protection In a recent report, it was

Do I really need DDoS Protection?Today’s business critical and online environments demand a secure and high-availability DDoS prevention platform. Attack sizes and complexity are increasing and nowadays no business vertical is immune to attack, and so nothing should be left to chance.

With high-capacity scrubbing centres located in London, New York, Los Angeles and Hong Kong Continent 8’s proven platform is one you can rely on with a capacity only matched by the largest DDoS providers on the planet.

Whether you’re a service provider with a highly regulated product subject to frequent attacks, or an organisation with co-located services, maintaining the availability of your infrastructure is critical to you and ultimately, your customers’ success.

Our DDoS prevention service is a transparent service. Your financial commitment is known and budgetable, not a “blank cheque” service where your organization is exposed to potentially unlimited costs during or after an attack.

But what if I’m not hosted by Continent 8?No problem! Provided some basic criteria can be met DDoS mitigation can be provided regardless of location.

In the event of an attack your traffic is absorbed by Continent, cleaned and legitimate traffic is delivered to you via a secure tunnel over the internet or private circuit.

Benefits to your business• Maintain business reputation for any critical online services• Ensure business continuity rather than just Disaster Recovery• High resiliency – multiple distributed traffic cleaning nodes across 3 continents• Global scale with ‘scrubbing’ capacities measured in Terabits• Intelligent traffic engineering – only removes “attack” traffic• Application layer protection• Comprehensive threat management – backed by dedicated DDoS engineering resources

Why use Continent 8?Continent 8 provides a tier one, carrier class level 24x7 monitoring and mitigation service with full help desk support and escalation, backed by a comprehensive online portal access for analysis and reporting.

In times of crisis you need a provider and solution you can count on, has been proven across a range of industries and has the capacity to deal with the largest, globally distributed attacks.

• Every Continent 8 Internet connection is provided with resilient dual carrier connections to multiple peering providers

• Attack traffic, when it cannot be identified and removed at the network edge, is processed through the geographically dispersed redundant Mitigation centres

• Attack traffic that needs to be mitigated is returned as clean traffic to the initial Target Host at one or several of the Continent 8 locations

• Global private network with carrier level mitigation, DDoS solution entirely owned and managed in house

Continent 8 has a fully in-house managed and monitored platform utilising hardware and software from the world’s leading vendors. Key partners include:-

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency.

Arbor Networks provides proven, on-premise DDoS protection for the world’s most critical enterprise and Government networks. Enhanced by integrated DDoS detection and DDoS mitigation capabilities, together with au-tomatic security updates delivered by Arbor’s Security Engineering and Response Team.Pa

rtner

s

DDoS protection with global capabilityHow it works...

Page 3: Safeguard your internet presence, with sophisticated and ... · Safeguard your internet presence, with sophisticated and scalable DDoS attack protection In a recent report, it was

Contacting Continent 8

SalesEurope+44 1624 694625 North America+1 514 461 [email protected]

TechnicalEurope+44 1624 694611North America+1 514 461 [email protected]

HeadquartersContinent 8 HousePulrose RoadDouglas, IM2 1ALIsle of ManTel. +44 1624 [email protected]

Copyright ©2017 Continent 8 Technologies PLC. All rights reserved. ds-ddos-009

Mon

itor Baseline &

Threshold

Continent 8’s DDoS architecture accurately builds customer network models, each with relative baselines, thresholds, and traffic pattern reporting. Through the collection of BGP, SNMP and NetFlow data from the Continent 8 peering locations, this data is critical to developing a surgical response to threats and attacks when they occur.

Detection

Live monitoring retrieved data is correlated to the baseline and threshold data held in the DDoS Protection system for each customer’s network. The system identifies threshold violations and provides actionable information to the Continent8 operations team. The Continent 8 operations team then has options to enable auto-mitigation, manual mitigation, or the use of layered mitigation techniques.

Prev

ent

Diversion

When an attack is identified and prevention authorised, diversion of both legitimate and attack traffic to the Mitigation (scrubbing) centres is activated and controlled by Continent 8 in conjunction and with approval through real-time customer engagement. Diversion surgically redirects traffic into scrubbing locations using BGP control plane announcements.

Mitigation

Mitigation involves identification of malicious and legitimate traffic through DPI Packet analysis, heuristics, and validation methods called countermeasures. Each countermeasure enabled by Continent 8 provides additional granular identification of traffic. Malicious traffic is removed from the traffic stream through multi-layered filters at multiple levels across the OSI stack.

Re-injection

Legitimate (cleaned) traffic is then routed directly to the target host, the ultimate destination of the original legitimate traffic flow. As with diversion, architectures exist to optimize injection paths and traffic delivery to victims of attacks. These methods take advantage of network capabilities enabled by the Continent 8 MPLS backbone,

Repo

rt

Alert

The Baseline and Threshold collected data along with the live monitoring enables SMS and email alerting to our dedicated DDoS team. Alert levels of LOW / MEDIUM and HIGH categories are predefined, enabling us to optionally include customer technical engineering teams on alert notifications.

Mitigation Analysis

Ongoing and historic mitigations can be reviewed and analysed, and full data graphing enables customers to view the individual counter-attack tools and settings applied.Mitigation reports can be printed or exported for further analysis and investigation.

Network Utilisation

Providing significant insight and value-add to the standard DDoS prevention service, the Network utilisation reporting is considered by many as a valuable product and service of its own. Customers can view, report and export details of the customers and partner bandwidth utilisation peaks and flows from source to target.

Web Portal

Customers can view all reporting and mitigation data on an online web portal available exclusively for customers providing dashboard updates and overviews, and further drill-down reporting functionality for export and print. This enables your network support teams and management to view live and past statistics for your network 24 x 7.

DDoS Protection - Our process for success