This page contains a Flash digital edition of a book.
WHAT’S HOT wor ld news

Subscribe to our weekly email newsletter at:

Data centres are prime targets for DDoS attacks

ARBOR NETWORKS, INC. has released its 10th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s network operators. Now in its tenth year, the WISR survey includes detailed information on the threats and concerns of both service providers and enterprises. This annual report is intended to highlight the key trends in the threats and concerns facing organisations, and the strategies they adopt to address and mitigate them.

The threat landscape then and now: £ Mostly a nuisance and nothing more than an independent event a decade ago, distributed denial-of-service (DDoS) is now a very serious threat to business continuity and the bottom-line. DDoS attacks today are now components of complex, often long-standing advanced threat campaigns. The largest DDoS attack reported in 2014 was 400Gbps; ten years ago the largest reported attack was a mere 8Gbps.

£ Application-layer attacks were experienced by 90 percent of respondents in 2014. Ten years ago, 90 percent of respondents cited simple “brute force” flood attacks as the most common attack vector.

£ The human element continues to be a factor in defensive capabilities – not just today, but throughout the last ten years of WISR reporting. Just in the past year alone, 59 percent of respondents reported difficulty hiring and retaining skilled personnel within their security organisations.

“Arbor has been conducting the Worldwide Infrastructure Security Report survey for the last 10 years and we have had the privilege of tracking the evolution of the Internet and its uses from the early adoption of online content to today’s hyper connected society,” said Arbor Networks Director of Solutions Architects Darren Anstee. “In 2004, the corporate world was on watch for self- propagating worms like Slammer and Blaster that devastated networks the year before; and, data breaches were most likely carried out by employees who had direct access to data files.

Today, organisations have a much wider and more sophisticated range of threats to worry about, and a much broader attack surface to

8 I February 2015

defend. The business impact of a successful attack or breach can be devastating – the stakes are much higher now. “

Enterprises are under assault £ DDoS and advanced threats are increasingly common: Nearly half of respondents saw DDoS attacks during the survey period, with almost 40 percent of those seeing their Internet connectivity saturated. £ Firewalls and IPS devices continue to be targets for attackers: Over one third of organisations had Firewall or IPS devices experience a failure or contribute to an outage during a DDoS attack. £ Cloud services are a bull’s-eye for attackers: Over one quarter of respondents indicated that they had seen attacks targeting cloud services. £ Security incidents are up but enterprises are not fully prepared to respond: Just over one third of respondents indicated an increase in security incidents this year, with about half indicating similar levels to last year. Just under a half of respondents felt reasonably or well prepared for a security incident, with 15 percent indicating that they having no plans or resources in place.

Data centers are a high-volume, high-impact target £ Over one third of data center operators saw DDoS attacks which exhausted their Internet bandwidth. This underscores just how critical of an issue this continues to be for data center operators: downtime means not just lost business for the data center operator, but the collateral damage extended to their customers operating business critical infrastructure in the cloud.

£ Operational expense is the top cost attributed by data center operators to DDoS events. This shows the increasingly high costs of defending against growing attacks and the priority data center operators place on DDoS mitigation.

£ Revenue loss due to DDoS is up sharply: 44 percent of data center respondents experienced revenue losses due to DDoS.

£ Just under half of respondents indicated they had their firewalls experience or contribute towards an outage due to DDoS. This is up from 42 percent last year. Load balancers also saw issues, with over one third of respondents seeing these fail due to DDoS, in the last year.

2015 Tech M&A on a path to continue record- setting spending

TECHNOLOGY MERGERS and acquisition spending in 2015 is likely to continue at the record pace set last year, according to a new report from 451 Research.

Bullish sentiment from corporate acquirers and bankers, combined with a good macro-economic environment and a re-energised private equity market, is a key factor behind the healthy M&A outlook, according to 451 Research’s Technology M&A Outlook Report, released today.

According to 451 Research, more than half of corporate acquirers (58%) indicated that they expected their own company to pick up the pace of deal making in 2015. That was the highest forecast by strategic buyers in the tech M&A marketplace in a half-decade.

Likewise, tech investment bankers are bullish for this year, with M&A pipelines fuller than they’ve been in years. More than three-quarters (77%) of investment banking survey respondents indicated that the aggregate value of tech transactions they are currently working on is higher than it was a year ago. That stood as the second-highest assessment in the past half-dozen years of the 451 Research M&A Report.

The 2015 M&A Outlook Report provides analysis of the M&A drivers in key enterprise technology segments. Sectors likely to see significant action in 2015 include: £ Information Security: Consolidation is inevitable as vendors expand their existing portfolios to meet intensifying customer demands.

£ Mobility: The need for end-to-end enterprise mobility solutions that can provide bottom-line results and add analytics will drive healthy M&A activity.

£ Cloud computing: Cloud infrastructure acquirers will look in part to acquisitions to

add new high-value offerings on top of their raw compute offerings.

Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52