The Rise of Hybrid — The New DDoS Protection Model [WEBINAR]

What is something nearly everyone needs, something nearly everyone asks for, something everyone provides, but also something nearly no one takes?

Answer:  Advice.

If you have spent considerable time wondering what to do about the evolving DDoS threat, you are not alone.  The threat has become a bona fide menace and protecting a business, its information, and its network is no longer just the responsibility of an IT technician.  These threats and the damage they can inflict are real and I’m offering my experience and advice in a new DDoS Webinar hosted by Infonetics.

Join us on April 7th, 2015 from 11am – 12pm EST for a discussion of these topics:

  • The current threat landscape
  • The options in DDoS mitigation (50 shades)
  • The pros and cons of each option
  • Brief introductions to offerings from contributing vendors
  • A summary of best options for various issues

The webinar will provide commentary from key analysts at Infonetics who have been following DDoS trends and vendors for years.  They will share thoughts on the various approaches, recap follies in old architectures, review promising new trends in technical security advances, and suggest action plans for staying ahead of the threats.

Radware Insights

I will be part of a vendor group that will present our individual vantage points on the threat landscape and opine with both stories and data harvested from our 2015 Global Application & Network Security Report. 

Some of the key data points I discuss are:

Key point #1

This year, more than a third (36%) of security industry survey respondents indicated that they use a hybrid solution with both customer premise equipment (CPE) and cloud solutions – another 6% plan to implement.  Responses also suggest that by 2015, nearly half (48%) of those surveyed will employ hybrid protection.

Key point #2

Not only has it increased as a point of failure, but the Internet pipe now has the “honor” of being the number-one failure point.  Meanwhile, hackers seem to be making their way through every protocol to determine how to use it for the next big reflective attack.  The result?  Reflective attacks represent the single largest DDoS “headache” of the last year.

Key Point #3

Attackers are now combining multiple techniques in a single attack—enabling them to bypass defense lines, exploit server-side vulnerabilities, and strain server-side resources.  Such attacks include Anonymization and Masquerading, Fragmentation, Encryption, Dynamic Parameters, Evasion and Encoding, Parameter Pollution and Extensive Functionality Abuse.  

Highly Qualified Hybrid Scrubbing is the Go-Forward Option

The session will demonstrate how advancements are continually being made to defend organizations from cyber-attacks.  There will also be some powerful reminders offered on why a diligent approach is needed.

Organizations that used to rely on their service provider’s DDoS protection service (in-the-cloud) found that the attacks that hit their business could and would bypass the provider’s protection layer.  This is because DDoS is a tactic, not the overall problem.  Attacks borne from the Internet are the problem and solutions designed to handle a simple tactic, wind up falling short.

What was realized by many organizations was that they needed to deploy premise-based technologies for comprehensive attack detection and mitigation.  In fact, our security researchers have seen that businesses which deploy on premise protection, in conjunction with DDoS protection from their service provider, are better able to survive and maintain their business operations, in spite of large scale, large volume, multi-vulnerability attack campaigns.  When deployed on both sides (on premise and through the service provider), businesses achieve the best protection when properly managed and maintained.

Sign up now for the webinar, Next-Generation DDoS Mitigation:  Leveraging Hybrid On-Premise and Cloud Solutions taking place tomorrow April 7th from 11am – 12pm EST.

Carl Herberger

Carl is an IT security expert and responsible for Radware’s global security practice. With over a decade of experience, he began his career working at the Pentagon evaluating computer security events affecting daily Air Force operations. Carl also managed critical operational intelligence for computer network attack programs to aid the National Security Council and Secretary of the Air Force with policy and budgetary defense. Carl writes about network security strategy, trends, and implementation.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program


An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center