What is going on in the world of DDoS protection that has high volume network and security operations scrambling to find a solution that actually works? Today’s threat landscape is intensifying, and it’s not going away anytime soon. The number of infected Internet of Things (IoT) devices continues to surge with the release of the Mirai source code and appearance of the Leet Botnet. Multi-vector sophisticated attacks are targeting popular domains and new Android malware is swallowing the mobile world.
The problem can be summarized quite easily: Inspection and detection have kept pace with the threat space, but the scope of the attacks has made mitigation the limiting factor.
Corsa is tackling this with our new DDoS mitigation product launched today: the “Red Armor” NSE7000 Network Security Enforcement engine delivers scalable 100G DDoS protection at a considerable cost savings. This high-performance enforcement engine installs into existing DDoS architectures in 10 minutes and interoperates with existing DDOS detection technology providing the necessary 100G line rate enforcement as a bump in the wire.
Service providers, including Content Distribution Networks (CDN) and Internet Service Providers (ISP) are rapidly building 100G connections to meet customer and business needs. Protecting the network has become even more critical but finding the right mitigation solution is difficult. Enter Red Armor…
For large-scale networks where multiple 10G and 100G ports are at play, Red Armor NSE7000 DDoS enforcement shuts down escalating DDoS attacks that include high-rate volumetric and network protocol attacks. The NSE7000 is a 1RU 450W enforcement engine that performs fine-grained in-line traffic classification and filtering on L3/L4 frames at 150Mpps per 100Gbps of throughput. The NSE7000 uses BGP Flowspec (RFC5575) rules or REST calls to deny or rate-limit traffic destined for the gateway router. It enforces IP src/dst, TCP/UDP src/dst, TCP flags, fragmentation bits and packet length. In addition, it can rate-limit every rule to help when there is uncertainty whether an attack is legitimate or a false positive.