Skip to Content.
Sympa Menu

netsec-sig - [Security-WG] Security-WG DDoS Deepfield Presentation Tuesday Dec 15 3pm-4pm ET

Subject: Internet2 Network Security SIG

List archive

[Security-WG] Security-WG DDoS Deepfield Presentation Tuesday Dec 15 3pm-4pm ET


Chronological Thread 
  • From: Paul Howell <>
  • To: "" <>
  • Cc: Chris Whalen <>, Craig Labovitz <>
  • Subject: [Security-WG] Security-WG DDoS Deepfield Presentation Tuesday Dec 15 3pm-4pm ET
  • Date: Mon, 7 Dec 2015 13:24:58 +0000
  • Accept-language: en-US
  • Authentication-results: internet2.edu; dkim=none (message not signed) header.d=none;internet2.edu; dmarc=none action=none header.from=internet2.edu;



Hello Colleagues,

Deepfield will be presenting their DDoS detection & mitigation capabilities
to our group on Tuesday, Dec 16 from 3pm - 4pm ET.

Adobe connect will be used for the presentation, which will also be recorded
for any working group members unable to attend.

To join the meeting:
http://internet2.acrobat.com/venus/

If you have never attended a Connect Pro meeting before, you may test your
connection:
http://internet2.acrobat.com/common/help/en/support/meeting_test.htm

Get a quick overview:
http://www.adobe.com/products/adobeconnect.html


Presenting for Deepfield will be:

Craig Labovitz
Founder and CEO
Deepfield


Chris Whalen
Vice President of Sales
Deepfield
Mobile: +1.978.835.5780
Email:



Potential topics to be covered including but not limited to are:

Describe how your service addresses the following attacks against a
university or regional network:
* DDoS attacks that result in a high volume of inbound traffic (greater than
10Gb/s) and disrupt both the targeted services as well as the operation of
the network itself.
* Persistent DDoS attacks against key services or infrastructure (DNS, key
web server, VPN, etc.)

Capabilities we¹re interested in, but will welcome a more expansive response:
* host a service remotely always and/or during an attack
* detect and alert of an attack
* scrub traffic
* work with major ISPs to coordinate mitigation
* DNS services
* layer 7-aware firewall/scrubbing

Please plan to include details such as:
* mechanisms supported for announcing prefixes for a scrubbing service (e.g.,
BGP signaling)
* attack/service dashboard
* on-boarding process
* capacity
* how are SSL sessions proxied (who supplies keys, etc.)


Regards.

Paul Howell
Chief Cyberinfrastructure Security Officer
Internet2
100 Phoenix Drive
Suite 111
Ann Arbor, MI 48108
(o) 734-352-4212






Archive powered by MHonArc 2.6.16.

Top of Page