SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1
Juniper Networks
Intrusion Detection & Prevention
June 2006
3Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Agenda
 Security Market Climate
• IPS & Security Market
• Market Drivers
 Juniper Networks IDP Product Overview
• Complete Solution – Security Team
• Product Features
• Product Offering
 Management with Juniper Networks NSM
 Summary
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4
IPS and Security Market
5Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Security Market
 IPS technology is a mainstream part of network
security for companies of all sizes
 Keeping up with new security threats and finding
integrated management systems remain key
concerns for security admins
 Assuring business critical applications have
predictable quality of service over nonessential
apps like P2P and IM
 Need Visibility, Control and Ease of Use
6Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Worldwide IPS Market
 Market focus on IPS technology exemplified by market forecast
 Worldwide IDS/IPS revenue expected to top $800 Million by year 2009
 Network-based products continue to account for more than 2/3 of total
revenue
277
384
427
544
603
667
752
790 819
0
100
200
300
400
500
600
700
800
900
Revenue
($ Million)
CY01 CY02 CY03 CY04 CY05 CY06 CY07 CY08 CY09
Year
World Wide IDS/IPS Product Revenue
Network-based
Host-based
Source: Network Security Appliance and Software
Quarterly Worldwide Market Share and Forecast for 1Q06
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7
Customer Drivers
8Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Fear of external network attack and internal
noncompliance
 External attacks remain the top reason for
purchasing security appliances
• Failure to block viruses, attacks or malware directly
impact end-users
 A growing concern meanwhile is ensuring users
on the network are doing what they’re supposed
to be doing
Direct impact to end-users
•Quantifiable loss of productivity
•Impact to revenue
•Headaches to administrators
•Unauthorized access to critical data
9Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Firewall alone is not enough
 Every organization is connected to the Internet
and deploys some form of firewall
 Most enterprise realize firewall alone is not
sufficient to block sophisticated attacks
Vulnerability
Discovered
Advisory
Issued
Exploits
Released
W
orm
Released
Getting Shorter
Lifecycle of Vulnerabilities and Threats
10Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Business compliance
 Need to enforce business practices including
types and version of applications
 Need to ensure non-business applications does
not hinder critical business applications
practices
11Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
New Technology Adoption
 Adoptions of new technologies continue to
increase
 Enterprises are not satisfied to wait until
security “catches up”
 Convergence of networks open up the
infrastructure to new attacks
New Technologies = New Risks
12Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Not Only for Enterprise
 Service Providers
face similar security
concerns as
enterprise
 Keeping ahead of new
security threats
considered highest
technical challenge by
SP
Source: Service Provider Plans for VPNs and
Security North America, Europe, and Asia Pacific 2006
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13
IDP Product Overview
Security Team
14Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
The Juniper Approach
Complete Solution
Service Provider
Security Teams
Worldwide
Juniper
Security
Team
Juniper Customers
Juniper Products
Technology Vendor
Relationships
Technology Vendor
Relationships
Internal ResearchInternal Research
3rd
Party
Security Teams
3rd
Party
Security Teams
Customer
Security Team
Customer
Security Team
Cooperative
Security Research
Partner MSSP
Intelligence
Daily
Updates
15Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
The Basic Security Threat Landscape
Unknown Threats &
Vulnerabilities
Known Threats but no known
ways to protect
Known Threats with
available protection
16Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
The Juniper Advantage
 Superior protocol decoding and anomaly
detection – the majority of the unknown
 Dedicated teams researching
protocols and standards
 Provide breadth &
depth of coverage
 Give Security Experts better
tools to deal with the unknown
Unknown Threats &
Vulnerabilities
Protocol Anomalies
17Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Dedicated Security Team
 Dedicated team to research vulnerabilities and emerging threats
• Protocol decode expertise
• Multiple research and vendor partnerships
• Reverse engineering experts
• Global honey pot network
 Industry-leading response time
• Daily and Emergency signature
updates
• Customer Accuracy Program
• Team distributed globally
• Emergency update within an hour
 www.juniper.net/security
18Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Real-world Example Security Team’s Response
10:17 AM
5/9/2006
Microsoft announces security bulletins; MS06-018, MS06-
019, MS06-20 and posts patches for the vulnerabilities
10:21 AM
+4 min
Juniper Networks announces coverage for vulnerabilities
on all IDP platforms
11:50 AM
+1hr 33min
TippingPoint provides mixed messages on coverage
11:58 AM
+1hr 41min
ISS announces coverage only for MS06-019
End of Day
No announcements from Cisco or McAfee
Symantec announces coverage only for MS06-019
 Typical chain of events on recent Microsoft “Super Tuesday”
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 19
IDP Product Overview
Product Features
20Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Thwart Attacks at Every Turn
Multiple Methods of Detection
•Traffic Anomaly Detection
•Network Honeypot
Malicious Activities/Attacks
•Protocol Anomaly Detection
•Stateful Signatures
•Synflood Protector
•Backdoor Detection
•IP Spoof Detection
•Layer-2 Attack Detection
Recon
Multiple Method of Detection
Attack Proliferation
• Profiler • Security Explorer
21Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Traffic Anomaly Detection
 Method of identifying abnormal traffic usage
 No protocol anomalies or specific attack
patterns but unusual traffic usage/volume
 Example: Ping Sweep
• Scan the network to identify resources for possible
attack in the future - reconnaissance
• Ping sweep from external/suspicious source should alert
administrator
22Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Protocol Anomaly Detection
 Protocols are well defined allowing accurate
description of “normal” usage
 “Abuse” or abnormal use of the protocol are
detected by the IDP appliances
 Example: FTP Bounce Attack
x.x.x.A
x.x.x.B
Please connect to x.x.x.B
(so unauthorized client can receive data)
Please open FTP connection
x.x.x.B is not the authorized client machine
Possible abuse of FTP protocol
Request denied!!!
FTP Server
FTP Client
23Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Stateful Signatures
 Look for attacks in context
 Avoid blindly scanning all traffic for particular
pattern
• Improve efficiency
• Reduce false-positives
 Example: Code Red Worm
• Utilizes HTTP GET request for attack
• IDP appliance only scan for the specific request and
not any other HTTP traffic
24Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Backdoor Detection/Trojan
 Well-known “Trojan horse” concept
 Challenge is to identify the attack when the
first line of defense has been overcome
 Heuristic method of analyzing interactive
traffic
 Example: Traffic originating from web server
• Web servers typically respond to requests for
information, not initiate one
• A sign of infected server/node
25Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Features Addressing Customer Challenges
 How can I uncover new
network activities?
 How can easily I find out
what’s really running on my
network?
 I don’t want to block
non-business apps but
how else can I control
it?
 How can I make sure new
technologies doesn’t translate
to new threats?
 Wireless is great but
how can I secure it?
26Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Security Explorer
 Interactive and dynamic
touchgraph providing
comprehensive network and
application layer views
• Integrated with Log Viewer and
Profiler
 Identifies what’s running on a
network host
• Uncovers attacks, peer IP addresses,
open ports, available applications
and operating systems
NEW - IDP 4.0
27Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Enhanced Profiler
 Uncovers new activities and traffic
information across network and
application levels
 Identifies new protocols,
applications and operating systems
• Alerts on rogue hosts, servers or IP
addresses
• Detect unwanted applications like P2P
and IM
 Records information on active
hosts, devices, protocols and
services in various contexts
• Instant Messaging alias, FTP username,
e-mail address, subject heading, etc…
NEW - NSM 2006.1
28Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Diffserv (DSCP) Marking
 Controls bandwidth allocation based on specific
types of application
 Marks on a packet that match an IDP signature
 Allows upstream router to enforce on markings
(value 1-63) to assure quality of service on
critical applications or appropriate response to
nonessential apps
 Available as an action per IDP rule for full
granular control
NEW - IDP 4.0
29Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Securing VoIP Applications
 New Protocol Decode – H.225
 Assures that the VoIP signaling and control
protocol cannot be used as a source of network
attacks or abuse
 Protocol decode capability protects underlying
vulnerability of protocol
 Allows creation of custom attack objects with
contexts
 VoIP protection on top of existing SIP protocol
support
 Proactively prevent future exploits
NEW - IDP 4.0
30Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Securing Database Applications
 New Protocol Decode – Oracle TNS
 Protects database applications from an
increasing number of exploits and buffer
overflows in the internal network
 Blocks unauthorized users to Oracle servers
 Protects the underlying vulnerability of Oracle
TNS protocol
 Prevents future threats at day zero
NEW - IDP 4.0
31Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Securing Mobile Data Networks
 New Inspection Capability – GTP Encapsulated
Traffic
• Protects an inherently unsecured traffic
• Supports UDP tunnel packets per GTPv0 and GTPv1
 Ensures users on cellular network aren’t
exposing the entire network to possible attacks
 Carrier protection on top of existing inspection
for GRE encapsulated traffic
NEW - IDP 4.0
32Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Coordinated Threat Control
 Identify specific attacks originating from remote user via SSL VPN
and quarantine the user (and only the offending user)
Only from Juniper Networks !
Available IDP 3.2r2
Infected
Attack
1. User logs in using SSL VPN & deliberate or inadvertent attacks are launched
2. IDP detect the attack and block requests to the internal resources
3. IDP sends identifying data to SA SSL VPN gateway
4. Based on data from IDP, SA quarantine and notifies the user
Attack
Identifying Data
Quarantine
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 33
IDP Product Overview
Product Offering
34Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
IDP Product Overview -Timeline
2002
2004
2005
2006
•IDP platform introduced
•Integrated Stateful Signature
creation and updates
•Protocol decodes
•Secure response notices
•First and only IPS integrating
Profiler for best-in-class
network awareness
•Introduction of fully integrated
multi-gigabit FW/VPN/IDP
system (ISG 1000 and 2000)
•First to introduce daily signature
updates
•Next generation of
network visibility and
control
•Consolidated
security management
solution
•First to introduce
Integrated Threat
Control for SSL
and IDP appliances
35Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Typical IPS Deployment
Regional Head
Office
Satellite Office
Main Office
NSM
36Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
IDP Product Line
• Med Bus
• Large BO
• Enterprise
Perimeter
• Enterprise
Perimeter
• Enterprise Perimeter
• Internal LAN
IDP 50 @ 50Mbps
IDP 200 @ 200Mbps
IDP 600 @ 500Mbps
IDP 1100@ 1 Gbps
• SMB
• Branch
Office
• Service Provider
• Large Enterprise Perimeter
• Internal LAN
ISG 1000/2000
37Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
IDP Standalone – 1100 C/F
 1100C
1100F
IDP 1100 C/FIDP 1100 C/F
Optimal for largeOptimal for large
enterprise / Gigenterprise / Gig
environmentsenvironments
Up to 1 Gbps
throughput
500,000 max
sessions
10 CG or 8 Fiber SX
+ 2 CG traffic, 1 CG
mgmt & 1 CG HA
ports
HA clustering option
Integrated bypass
for CG traffic ports
38Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
High Availability Options
Standalone HA
state-sync
Third-party HA
state-sync
Bypass
Bypass Unit for
Fiber Gig networks
- IDP 600F
- IDP 1100F
- ISG
39Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Solutions for Every Need
Juniper IDP Standalone Appliances
• 50 Mbps – 1 Gbps
• HA Clustering
• Centralized policy management
•Complement existing FW/VPN
•Protect network segments
•DMZ
•LAN
•Departmental servers
Juniper ISG Series
•Next-Gen Security ASIC
(GigaScreen)
•Multi-Gigabit FW/VPN/IDP
•Centralized policy management
•High performance for demanding
networks
•Virtualization features
•Granular rule-by-rule management
40Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
ISG – Under the hood
 Integrated Best-of-breed Security &
Networking gear
 Multi-Gig 2-way Layer 7 IDP Security Modules
 Module “blades” available for ISG-1000 and
ISG-2000
41Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
ISG Series Architecture
I/O I/O I/O I/O
GigaScreen3 ASIC
1GB RAM
Programmable Processors
Security
modules
Dual 1Ghz PowerPC CPU
1GB RAM
Management Processing
• Dedicated processing helps ensure linear
performance
• High performance interconnect & flow setup
Security Module Processing
• Dedicated processing for other security
applications
Network Level Security Processing
• ASIC-accelerated security
•Stateful FW, NAT, VPN, DoS/DDoS
•Intelligent Intrusion Prevention session
load balancing
•Embedded programmable processor
facilitate new feature acceleration
Unmatched processing power!
42Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
ISG Series Summary:
ISG 1000 and ISG 2000
ISG 1000 ISG 2000
Max Throughput: Firewall 1 Gbps 2 Gbps
Max Throughput: IPSec VPN (3DES/AES) 1 Gbps 1 Gbps
Packets per second: FW/VPN 1.5/1.5 Million 3/1.5 Million
Max sessions 500,000 1,000,000
VPN tunnels 2000 10000
Max Throughput: Deep Inspection 200 Mbps 300 Mbps
Max Throughput: IDP Up to 1 Gbps Up to 2 Gbps
Number of supported security modules (IDP) Up to 2 Up to 3
Number of fixed I/O interfaces 4 – 10/100/1000 0
Max interfaces Up to 20 Up to 28
Number of I/O modules 2 4
43Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Product Details
Juniper Firewall/VPN, with
Screen OS Deep Inspection
Juniper Stand-alone
IDP
Juniper ISG Series
with IDP
Hardware •NS-5XT
•NS-5GT
•NS-25
•NS-50
•NS-204
•NS-208
•NS-500
•ISG 1000
•ISG 2000
•NS-5200
•NS-5400
•IDP 50
•IDP 200
•IDP 600C
•IDP 600F
•IDP 1100C
•IDP 1100F
•ISG 2000 with IDP
•ISG 1000 with IDP
Software ScreenOS 5.0, 5.1, 5.2 IDP 4.0 ScreenOS 5.0-IDP
Management NSM NSM 2006.1 NSM 2004 FP3-IDP1
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 44
Management
45Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
3-Tier Management – Secure and Scalable
Distributed IDP Sensors
Distributed ISG with IDP
Centralized
NSM Server
Common User
Interface
NSM
Standalone IDP appliances requires IDP 4.0 for NSM support
46Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Customers with a Hybrid Network
Regional Head
Office
Satellite Office
Main Office FW Mgmt
IPS Mgmt
FW
Mgmt
IPS
Mgmt
FW Mgmt
IPS
Mgmt
 Business Challenges
• What is on my network?
• Who is on my network?
 Product Challenges
• Complex network
environments
• Multi-vendor FW and
IPS systems
• Multiple Management
Systems
47Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Juniper Networks Customers
Regional Head
Office
Satellite Office
Main Office
NSM
 Juniper Offering
• Juniper Networks IDPs &
Firewalls
• Single Management System
• Single User Interface
 Business Benefits
• Enhanced Network Visibility
• Granular Control
• Ease of Use
48Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
NSM Management Features
Scheduled Security Updates Automatically update devices with new attack objects.
Domains Service providers and distributed enterprises may use this
mechanism to logically separate devices, policies, reports,
objects, etc…
Role-based Administration granular approach in which all 100+ activities in the system
may be assigned as separate permissions.
Object Locking Multiple administrators can safely and concurrently modify
different objects in the system at the same time.
Audit Logs Sortable and filterable record of who made which changes
to which objects in the system.
Device Templates Manage shared configuration such as sensor settings in one
place.
Job Manager View pending and completed directives (such as device
updates) and their status.
High Availability Active/passive high availability of the management server.
Scheduled Database Backups Copies of the NSM database may be saved on a daily basis.
NEW - NSM 2006.1
49Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Granular IDP Control w/NSM
Firewall and IDP management from same user interface
Configure attack detectionConfigure desired response
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 50
Summary
51Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Why Juniper Networks IDP products?
 Security Coverage
 Product Innovation
 Trusted Company
 Market Recognition
52Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Security Coverage
 Multiple prevention methods for protection against entire
'Vulnerability & Attack Lifecycle’
 Complete packet capture and protocol decode @ Layer 7, including
VoIP protocols
 2-way Layer 7 inspection: blocks attacks from client-to-server and
server-to-client
 100% prevention and accuracy for Shellcode/buffer overflow
attacks
 100% prevention in protecting against Microsoft Vulnerabilities:
Same day & Zero protection on “Patch Tuesday’s”
 Comprehensive Spyware protection, including 700+ signatures and
growing daily
 Daily signature updates, including auto signature updates and auto
policy push
53Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Product Innovation
 Next generation of network visibility w/ Security Explorer
 Granular, Flexible Management solution for all Juniper Networks
security appliances
 Automatic custom reports
 Multi Gigabit Performance
 Multiple Deployment Options
 “Profile” the network to understand applications and network
traffic
 Carrier Class IDP: Multi-Gbps combined with SDX / JNPR Router
integration
 Custom Signature Editor / Open Signatures Database
54Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Trusted Company
 Financial Strength / $2 Billion in Revenue /
Profitable / Cash Reserves
 Investment in R&D 25% - 30% of revenue
 Product Roadmap – IDP plays a key role in
Juniper’s Infranet solution
 Global Support & Relationships
55Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Market Recognition
 Most decorated IPS product in 2005
• Winner ‘Editors Choice’ – Network Computing: ‘The Great IPS Test’
• Winner ‘Best Multifunction Appliance’ – Network Computing (Well-Connected)
• Winner ‘Best IPS Appliance’ – Network Computing (Well-Connected)
• Winner ‘Product of the Year’ – SearchNetworking.com
• Winner ‘Product of the Year’ – IDG Research / TechWorld
• Winner ‘Best Deployment Scenario’ ISP Guide: City of Burbank, Juniper IDP
Customer
• Awarded ‘NSS Certification’ for Industry Approved IPS: IDP 600F
• Winner ‘Product of the Year’ – ISG 1000 - ZDnet Australia
• Winner ‘Editors Choice’ – IDP 200 - ZDnet Australia
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 56
Thanks You!

Weitere ähnliche Inhalte

Was ist angesagt?

The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsAnthony Daniel
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeSplunk
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 

Was ist angesagt? (20)

The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 

Andere mochten auch

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonAltaware, Inc.
 
Troubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper ExamplesTroubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper ExamplesSalachudin Emir
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentialsbeachghim
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGPAPNIC
 
Universal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design GuideUniversal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design GuideJuniper Networks
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernetvnandlall
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernetrjain51
 
Carrier Ethernet - What and Why
Carrier Ethernet - What and Why  Carrier Ethernet - What and Why
Carrier Ethernet - What and Why Anuradha Udunuwara
 
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Vishal Sharma, Ph.D.
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriFebrian ‎
 
MPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet NetworksMPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet NetworksAPNIC
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product ComparisonsAltaware, Inc.
 

Andere mochten auch (16)

Netgear ReadyNAS Comparison
Netgear ReadyNAS ComparisonNetgear ReadyNAS Comparison
Netgear ReadyNAS Comparison
 
Troubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper ExamplesTroubleshooting BGP Juniper Examples
Troubleshooting BGP Juniper Examples
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentials
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGP
 
Universal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design GuideUniversal Access and Aggregation Mobile Backhaul Design Guide
Universal Access and Aggregation Mobile Backhaul Design Guide
 
SIP2 for ILS
SIP2 for ILSSIP2 for ILS
SIP2 for ILS
 
Individual development plan
Individual development planIndividual development plan
Individual development plan
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Carrier Ethernet - What and Why
Carrier Ethernet - What and Why  Carrier Ethernet - What and Why
Carrier Ethernet - What and Why
 
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by Khatri
 
MPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet NetworksMPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet Networks
 
Juniper Networks Product Comparisons
Juniper Networks Product ComparisonsJuniper Networks Product Comparisons
Juniper Networks Product Comparisons
 

Ähnlich wie Juniper idp overview

All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworksBrozaa
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - MagnifierJisc
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...North Texas Chapter of the ISSA
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 

Ähnlich wie Juniper idp overview (20)

All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworks
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - Magnifier
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Network security
Network securityNetwork security
Network security
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Juniper idp overview

  • 1. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1 Juniper Networks Intrusion Detection & Prevention June 2006
  • 2. 3Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Agenda  Security Market Climate • IPS & Security Market • Market Drivers  Juniper Networks IDP Product Overview • Complete Solution – Security Team • Product Features • Product Offering  Management with Juniper Networks NSM  Summary
  • 3. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4 IPS and Security Market
  • 4. 5Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Security Market  IPS technology is a mainstream part of network security for companies of all sizes  Keeping up with new security threats and finding integrated management systems remain key concerns for security admins  Assuring business critical applications have predictable quality of service over nonessential apps like P2P and IM  Need Visibility, Control and Ease of Use
  • 5. 6Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Worldwide IPS Market  Market focus on IPS technology exemplified by market forecast  Worldwide IDS/IPS revenue expected to top $800 Million by year 2009  Network-based products continue to account for more than 2/3 of total revenue 277 384 427 544 603 667 752 790 819 0 100 200 300 400 500 600 700 800 900 Revenue ($ Million) CY01 CY02 CY03 CY04 CY05 CY06 CY07 CY08 CY09 Year World Wide IDS/IPS Product Revenue Network-based Host-based Source: Network Security Appliance and Software Quarterly Worldwide Market Share and Forecast for 1Q06
  • 6. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7 Customer Drivers
  • 7. 8Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Fear of external network attack and internal noncompliance  External attacks remain the top reason for purchasing security appliances • Failure to block viruses, attacks or malware directly impact end-users  A growing concern meanwhile is ensuring users on the network are doing what they’re supposed to be doing Direct impact to end-users •Quantifiable loss of productivity •Impact to revenue •Headaches to administrators •Unauthorized access to critical data
  • 8. 9Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Firewall alone is not enough  Every organization is connected to the Internet and deploys some form of firewall  Most enterprise realize firewall alone is not sufficient to block sophisticated attacks Vulnerability Discovered Advisory Issued Exploits Released W orm Released Getting Shorter Lifecycle of Vulnerabilities and Threats
  • 9. 10Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Business compliance  Need to enforce business practices including types and version of applications  Need to ensure non-business applications does not hinder critical business applications practices
  • 10. 11Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net New Technology Adoption  Adoptions of new technologies continue to increase  Enterprises are not satisfied to wait until security “catches up”  Convergence of networks open up the infrastructure to new attacks New Technologies = New Risks
  • 11. 12Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Not Only for Enterprise  Service Providers face similar security concerns as enterprise  Keeping ahead of new security threats considered highest technical challenge by SP Source: Service Provider Plans for VPNs and Security North America, Europe, and Asia Pacific 2006
  • 12. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13 IDP Product Overview Security Team
  • 13. 14Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net The Juniper Approach Complete Solution Service Provider Security Teams Worldwide Juniper Security Team Juniper Customers Juniper Products Technology Vendor Relationships Technology Vendor Relationships Internal ResearchInternal Research 3rd Party Security Teams 3rd Party Security Teams Customer Security Team Customer Security Team Cooperative Security Research Partner MSSP Intelligence Daily Updates
  • 14. 15Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net The Basic Security Threat Landscape Unknown Threats & Vulnerabilities Known Threats but no known ways to protect Known Threats with available protection
  • 15. 16Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net The Juniper Advantage  Superior protocol decoding and anomaly detection – the majority of the unknown  Dedicated teams researching protocols and standards  Provide breadth & depth of coverage  Give Security Experts better tools to deal with the unknown Unknown Threats & Vulnerabilities Protocol Anomalies
  • 16. 17Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Dedicated Security Team  Dedicated team to research vulnerabilities and emerging threats • Protocol decode expertise • Multiple research and vendor partnerships • Reverse engineering experts • Global honey pot network  Industry-leading response time • Daily and Emergency signature updates • Customer Accuracy Program • Team distributed globally • Emergency update within an hour  www.juniper.net/security
  • 17. 18Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Real-world Example Security Team’s Response 10:17 AM 5/9/2006 Microsoft announces security bulletins; MS06-018, MS06- 019, MS06-20 and posts patches for the vulnerabilities 10:21 AM +4 min Juniper Networks announces coverage for vulnerabilities on all IDP platforms 11:50 AM +1hr 33min TippingPoint provides mixed messages on coverage 11:58 AM +1hr 41min ISS announces coverage only for MS06-019 End of Day No announcements from Cisco or McAfee Symantec announces coverage only for MS06-019  Typical chain of events on recent Microsoft “Super Tuesday”
  • 18. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 19 IDP Product Overview Product Features
  • 19. 20Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Thwart Attacks at Every Turn Multiple Methods of Detection •Traffic Anomaly Detection •Network Honeypot Malicious Activities/Attacks •Protocol Anomaly Detection •Stateful Signatures •Synflood Protector •Backdoor Detection •IP Spoof Detection •Layer-2 Attack Detection Recon Multiple Method of Detection Attack Proliferation • Profiler • Security Explorer
  • 20. 21Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Traffic Anomaly Detection  Method of identifying abnormal traffic usage  No protocol anomalies or specific attack patterns but unusual traffic usage/volume  Example: Ping Sweep • Scan the network to identify resources for possible attack in the future - reconnaissance • Ping sweep from external/suspicious source should alert administrator
  • 21. 22Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Protocol Anomaly Detection  Protocols are well defined allowing accurate description of “normal” usage  “Abuse” or abnormal use of the protocol are detected by the IDP appliances  Example: FTP Bounce Attack x.x.x.A x.x.x.B Please connect to x.x.x.B (so unauthorized client can receive data) Please open FTP connection x.x.x.B is not the authorized client machine Possible abuse of FTP protocol Request denied!!! FTP Server FTP Client
  • 22. 23Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Stateful Signatures  Look for attacks in context  Avoid blindly scanning all traffic for particular pattern • Improve efficiency • Reduce false-positives  Example: Code Red Worm • Utilizes HTTP GET request for attack • IDP appliance only scan for the specific request and not any other HTTP traffic
  • 23. 24Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Backdoor Detection/Trojan  Well-known “Trojan horse” concept  Challenge is to identify the attack when the first line of defense has been overcome  Heuristic method of analyzing interactive traffic  Example: Traffic originating from web server • Web servers typically respond to requests for information, not initiate one • A sign of infected server/node
  • 24. 25Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Features Addressing Customer Challenges  How can I uncover new network activities?  How can easily I find out what’s really running on my network?  I don’t want to block non-business apps but how else can I control it?  How can I make sure new technologies doesn’t translate to new threats?  Wireless is great but how can I secure it?
  • 25. 26Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Security Explorer  Interactive and dynamic touchgraph providing comprehensive network and application layer views • Integrated with Log Viewer and Profiler  Identifies what’s running on a network host • Uncovers attacks, peer IP addresses, open ports, available applications and operating systems NEW - IDP 4.0
  • 26. 27Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Enhanced Profiler  Uncovers new activities and traffic information across network and application levels  Identifies new protocols, applications and operating systems • Alerts on rogue hosts, servers or IP addresses • Detect unwanted applications like P2P and IM  Records information on active hosts, devices, protocols and services in various contexts • Instant Messaging alias, FTP username, e-mail address, subject heading, etc… NEW - NSM 2006.1
  • 27. 28Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Diffserv (DSCP) Marking  Controls bandwidth allocation based on specific types of application  Marks on a packet that match an IDP signature  Allows upstream router to enforce on markings (value 1-63) to assure quality of service on critical applications or appropriate response to nonessential apps  Available as an action per IDP rule for full granular control NEW - IDP 4.0
  • 28. 29Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Securing VoIP Applications  New Protocol Decode – H.225  Assures that the VoIP signaling and control protocol cannot be used as a source of network attacks or abuse  Protocol decode capability protects underlying vulnerability of protocol  Allows creation of custom attack objects with contexts  VoIP protection on top of existing SIP protocol support  Proactively prevent future exploits NEW - IDP 4.0
  • 29. 30Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Securing Database Applications  New Protocol Decode – Oracle TNS  Protects database applications from an increasing number of exploits and buffer overflows in the internal network  Blocks unauthorized users to Oracle servers  Protects the underlying vulnerability of Oracle TNS protocol  Prevents future threats at day zero NEW - IDP 4.0
  • 30. 31Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Securing Mobile Data Networks  New Inspection Capability – GTP Encapsulated Traffic • Protects an inherently unsecured traffic • Supports UDP tunnel packets per GTPv0 and GTPv1  Ensures users on cellular network aren’t exposing the entire network to possible attacks  Carrier protection on top of existing inspection for GRE encapsulated traffic NEW - IDP 4.0
  • 31. 32Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Coordinated Threat Control  Identify specific attacks originating from remote user via SSL VPN and quarantine the user (and only the offending user) Only from Juniper Networks ! Available IDP 3.2r2 Infected Attack 1. User logs in using SSL VPN & deliberate or inadvertent attacks are launched 2. IDP detect the attack and block requests to the internal resources 3. IDP sends identifying data to SA SSL VPN gateway 4. Based on data from IDP, SA quarantine and notifies the user Attack Identifying Data Quarantine
  • 32. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 33 IDP Product Overview Product Offering
  • 33. 34Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net IDP Product Overview -Timeline 2002 2004 2005 2006 •IDP platform introduced •Integrated Stateful Signature creation and updates •Protocol decodes •Secure response notices •First and only IPS integrating Profiler for best-in-class network awareness •Introduction of fully integrated multi-gigabit FW/VPN/IDP system (ISG 1000 and 2000) •First to introduce daily signature updates •Next generation of network visibility and control •Consolidated security management solution •First to introduce Integrated Threat Control for SSL and IDP appliances
  • 34. 35Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Typical IPS Deployment Regional Head Office Satellite Office Main Office NSM
  • 35. 36Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net IDP Product Line • Med Bus • Large BO • Enterprise Perimeter • Enterprise Perimeter • Enterprise Perimeter • Internal LAN IDP 50 @ 50Mbps IDP 200 @ 200Mbps IDP 600 @ 500Mbps IDP 1100@ 1 Gbps • SMB • Branch Office • Service Provider • Large Enterprise Perimeter • Internal LAN ISG 1000/2000
  • 36. 37Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net IDP Standalone – 1100 C/F  1100C 1100F IDP 1100 C/FIDP 1100 C/F Optimal for largeOptimal for large enterprise / Gigenterprise / Gig environmentsenvironments Up to 1 Gbps throughput 500,000 max sessions 10 CG or 8 Fiber SX + 2 CG traffic, 1 CG mgmt & 1 CG HA ports HA clustering option Integrated bypass for CG traffic ports
  • 37. 38Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net High Availability Options Standalone HA state-sync Third-party HA state-sync Bypass Bypass Unit for Fiber Gig networks - IDP 600F - IDP 1100F - ISG
  • 38. 39Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Solutions for Every Need Juniper IDP Standalone Appliances • 50 Mbps – 1 Gbps • HA Clustering • Centralized policy management •Complement existing FW/VPN •Protect network segments •DMZ •LAN •Departmental servers Juniper ISG Series •Next-Gen Security ASIC (GigaScreen) •Multi-Gigabit FW/VPN/IDP •Centralized policy management •High performance for demanding networks •Virtualization features •Granular rule-by-rule management
  • 39. 40Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net ISG – Under the hood  Integrated Best-of-breed Security & Networking gear  Multi-Gig 2-way Layer 7 IDP Security Modules  Module “blades” available for ISG-1000 and ISG-2000
  • 40. 41Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net ISG Series Architecture I/O I/O I/O I/O GigaScreen3 ASIC 1GB RAM Programmable Processors Security modules Dual 1Ghz PowerPC CPU 1GB RAM Management Processing • Dedicated processing helps ensure linear performance • High performance interconnect & flow setup Security Module Processing • Dedicated processing for other security applications Network Level Security Processing • ASIC-accelerated security •Stateful FW, NAT, VPN, DoS/DDoS •Intelligent Intrusion Prevention session load balancing •Embedded programmable processor facilitate new feature acceleration Unmatched processing power!
  • 41. 42Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net ISG Series Summary: ISG 1000 and ISG 2000 ISG 1000 ISG 2000 Max Throughput: Firewall 1 Gbps 2 Gbps Max Throughput: IPSec VPN (3DES/AES) 1 Gbps 1 Gbps Packets per second: FW/VPN 1.5/1.5 Million 3/1.5 Million Max sessions 500,000 1,000,000 VPN tunnels 2000 10000 Max Throughput: Deep Inspection 200 Mbps 300 Mbps Max Throughput: IDP Up to 1 Gbps Up to 2 Gbps Number of supported security modules (IDP) Up to 2 Up to 3 Number of fixed I/O interfaces 4 – 10/100/1000 0 Max interfaces Up to 20 Up to 28 Number of I/O modules 2 4
  • 42. 43Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Product Details Juniper Firewall/VPN, with Screen OS Deep Inspection Juniper Stand-alone IDP Juniper ISG Series with IDP Hardware •NS-5XT •NS-5GT •NS-25 •NS-50 •NS-204 •NS-208 •NS-500 •ISG 1000 •ISG 2000 •NS-5200 •NS-5400 •IDP 50 •IDP 200 •IDP 600C •IDP 600F •IDP 1100C •IDP 1100F •ISG 2000 with IDP •ISG 1000 with IDP Software ScreenOS 5.0, 5.1, 5.2 IDP 4.0 ScreenOS 5.0-IDP Management NSM NSM 2006.1 NSM 2004 FP3-IDP1
  • 43. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 44 Management
  • 44. 45Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3-Tier Management – Secure and Scalable Distributed IDP Sensors Distributed ISG with IDP Centralized NSM Server Common User Interface NSM Standalone IDP appliances requires IDP 4.0 for NSM support
  • 45. 46Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Customers with a Hybrid Network Regional Head Office Satellite Office Main Office FW Mgmt IPS Mgmt FW Mgmt IPS Mgmt FW Mgmt IPS Mgmt  Business Challenges • What is on my network? • Who is on my network?  Product Challenges • Complex network environments • Multi-vendor FW and IPS systems • Multiple Management Systems
  • 46. 47Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Juniper Networks Customers Regional Head Office Satellite Office Main Office NSM  Juniper Offering • Juniper Networks IDPs & Firewalls • Single Management System • Single User Interface  Business Benefits • Enhanced Network Visibility • Granular Control • Ease of Use
  • 47. 48Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net NSM Management Features Scheduled Security Updates Automatically update devices with new attack objects. Domains Service providers and distributed enterprises may use this mechanism to logically separate devices, policies, reports, objects, etc… Role-based Administration granular approach in which all 100+ activities in the system may be assigned as separate permissions. Object Locking Multiple administrators can safely and concurrently modify different objects in the system at the same time. Audit Logs Sortable and filterable record of who made which changes to which objects in the system. Device Templates Manage shared configuration such as sensor settings in one place. Job Manager View pending and completed directives (such as device updates) and their status. High Availability Active/passive high availability of the management server. Scheduled Database Backups Copies of the NSM database may be saved on a daily basis. NEW - NSM 2006.1
  • 48. 49Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Granular IDP Control w/NSM Firewall and IDP management from same user interface Configure attack detectionConfigure desired response
  • 49. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 50 Summary
  • 50. 51Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Why Juniper Networks IDP products?  Security Coverage  Product Innovation  Trusted Company  Market Recognition
  • 51. 52Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Security Coverage  Multiple prevention methods for protection against entire 'Vulnerability & Attack Lifecycle’  Complete packet capture and protocol decode @ Layer 7, including VoIP protocols  2-way Layer 7 inspection: blocks attacks from client-to-server and server-to-client  100% prevention and accuracy for Shellcode/buffer overflow attacks  100% prevention in protecting against Microsoft Vulnerabilities: Same day & Zero protection on “Patch Tuesday’s”  Comprehensive Spyware protection, including 700+ signatures and growing daily  Daily signature updates, including auto signature updates and auto policy push
  • 52. 53Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Product Innovation  Next generation of network visibility w/ Security Explorer  Granular, Flexible Management solution for all Juniper Networks security appliances  Automatic custom reports  Multi Gigabit Performance  Multiple Deployment Options  “Profile” the network to understand applications and network traffic  Carrier Class IDP: Multi-Gbps combined with SDX / JNPR Router integration  Custom Signature Editor / Open Signatures Database
  • 53. 54Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Trusted Company  Financial Strength / $2 Billion in Revenue / Profitable / Cash Reserves  Investment in R&D 25% - 30% of revenue  Product Roadmap – IDP plays a key role in Juniper’s Infranet solution  Global Support & Relationships
  • 54. 55Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net Market Recognition  Most decorated IPS product in 2005 • Winner ‘Editors Choice’ – Network Computing: ‘The Great IPS Test’ • Winner ‘Best Multifunction Appliance’ – Network Computing (Well-Connected) • Winner ‘Best IPS Appliance’ – Network Computing (Well-Connected) • Winner ‘Product of the Year’ – SearchNetworking.com • Winner ‘Product of the Year’ – IDG Research / TechWorld • Winner ‘Best Deployment Scenario’ ISP Guide: City of Burbank, Juniper IDP Customer • Awarded ‘NSS Certification’ for Industry Approved IPS: IDP 600F • Winner ‘Product of the Year’ – ISG 1000 - ZDnet Australia • Winner ‘Editors Choice’ – IDP 200 - ZDnet Australia
  • 55. Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 56 Thanks You!

Hinweis der Redaktion

  1. Discussions regarding security gear deployments include IDP appliances in addition to the traditional firewalls. Administrators are aware that traditional firewalls alone is not sufficient to keep ahead of the emerging attacks. In addition to allowing valid traffic and blocking attacks, more and more customers are looking for ways to control applications that are not attacks but are also not mission-critical. P2P and Instant Messaging are common examples but others include music servers and other “personal” applications.
  2. Using the projected IPS market as an indication of the concern over security, the data in this slide is from Infonetics Research. The obvious item to note is that the revenue for IDS/IPS continues to climb topping $800 Mil by CY09. The other item to note is how network-based products (which categorizes Juniper IDP products) more than double the host-based products in revenue.
  3. Following slides dive more into the customer drivers for IDP products.
  4. Despite the amount of varying attacks and threats, external network attacks remain the top reason for purchasing security gears. Basically, the fear of being hacked. While network downtime can directly be correlated to business impact, the graphics illustrate how impact to end-users can also have significant consequences. This is designed to illustrate that overly aggressive security policies can keep network attacks out but can also cause quantifiable impact to the business with the increase in false positives.
  5. This slide illustrate why firewall alone is not enough to protect typical enterprise network. ANIMATION 1 st click – Displays the time when vulnerability is discovered and advisory is issued. A good example if Microsoft who provide vulnerability information on a monthly basis. 2 nd click – At some later time after the vulnerability has been discovered, exploits are released to take advantage of the vulnerability. For example, hackers develop an attack to leverage the newly discovered vulnerability. 3 rd click – Worms are released which can leverage the vulnerability for massive attacks. 4 th click – The main point of this graphic is that the time from when the vulnerability is discovered to a full blown worm attack is getting shorter. This requires security products designed to be highly adaptable and the company geared to provide new updates in a timely manner.
  6. Business compliance is also a good example for the need for IDP products. The word “compliance” has been crossed and replaced with “practices” to indicate that we are not just talking about regulatory compliance. Any enterprise wishing to conform to their business practices would benefit from IDP products. Good and possibly overly used example is IM where some businesses will allows its use but with the understanding that its use will not hinder critical business applications. One question you can ask the audience is “Do you have the means to easily find out how much IM traffic is in your network?”. Naturally, with Juniper IDP products, you can.
  7. Another customer driver for IDP products are new technologies. Many enterprise adopt new technologies to reduce cost and gain competitive edge over competitors. They require security solutions to support the new technologies. Good example is the proliferation of VoIP solutions. Sharing the same network infrastructure as the enterprise data network, an un-secure VoIP solution would be opening the entire enterprise network to attack. Attacking through the phone is a very real possibility. ANIMATION 1 st click – Displays text “New Technologies = New Risks” reiterating that customers need to consider the risks any time a new technology is being introduced.
  8. Finishing off the customer driver section, touch on the service provider and managed service provider market. SPs face much of the same issues as the enterprise. The chart in the slide is from Infonetics and illustrates how “Keeping up with new security threats” is the top concern for service providers.
  9. This slide outlines how Juniper approach is not just point products. The IDP product as a whole has several components to it including 3 rd party security team, internal research, etc… All these resources are tied to the in-house Juniper Security team and the results of that goes into every IDP product on a daily basis. The discussion should illustrate how there are so many other factors to an IDP product that must be taken into consideration compared to the usual, throughput, price, footprint, etc…
  10. This slide is not designed to provide a specific percentage of the data show but only to illustrate that unknown or undiscovered threats and vulnerabilities dwarf the amount of known threats. Some of the threats are known but no effective way to protect from it while others have been identified and there are known protection, patches, etc… Question that will come up is “how to protect against unknown vulnerabilities?”
  11. This slide builds on the previous slide and addresses the question of “how do you protect from vulnerabilities that are unknown?” Good portion of unknown vulnerabilities is from protocol anomalies where the use of protocols beyond the defined specification can have adverse effect. The way to prevent such attack is to ensure that all usage of the protocol conforms to the acceptable guidelines. Hence, if an vulnerability is found for a particular protocol and exploits are developed, Juniper IDP would already have the coverage since it’ll treat such attack as protocol anomaly and block it … protection from the unknown.
  12. Juniper Networks Security Team had traditionally been under-marketed. Yet, they provide market-leading support for IDP products. The key thing to outline regarding the Security Team is its expertise in protocol decodes and partnership with multiple security vendors. The proof of excellent security team is in its response time. How fast the team can provide signature updates based on new vulnerabilities is a good indication of how effective the entire IDP product really is. This is a good lead-in to the next slide. The graphics is a screen capture of the Juniper Security portal indicated by the URL.
  13. Continuing the emphasis on response time, this slide outlines the actual timeline for response time based on a Microsoft vulnerability announcement. The “Super Tuesday” refers to Microsoft’s monthly disclosure of security vulnerabilities. ANIMATION 1 st click – The text illustrate that at 10:17 AM, Microsoft announced 3 security bulletins 2 nd click – 4 minutes later, Juniper Security team announced coverage for all three bulletins 3 rd click – After 1.5 hrs, TippingPoint provided unclear message regarding their coverage of the bulletins 4 th click – Close to 2 hours, ISS announced coverage for only one of the bulletins 5 th click – By end of the day, Cisco and McAfee had no announcements regarding the bulletins. Similar to ISS, Symantec announced coverage for only one of the bulletins
  14. Following slides dive into the IDP products.
  15. Before talking about IDP product features, this slide illustrates some of the basic responses to different malicious activities. It offers high-level view of how the IDP product thwart these activities. ANIMATION 1 st click – Recon (or reconnaissance) is used by attackers to see what resources are out there. IDP can detect this activity through traffic anomaly detection in terms of the change in volume of the traffic as well as network honeypot where the attacker thinks the target resource exists when in actuality, it does not. 2 nd click - To thwart an attack, IDP uses protocol anomaly (already discussed), stateful signatures and features such as Synflood protector. 3 rd click – Reacting to proliferation is designed to stop the spread attacks. Backdoor detection is an obvious feature as it assumes the first level of defense had been compromised and a Trojan is sitting in your network. The key is to continue to provide high level of security even if the first line of defense has been breached.
  16. This slide is an example of traffic anomaly detection. The concept being that there are no obvious sign of attack other than suspicious amount of traffic pattern change. ANIMATION 1 st click – Displays the example of ping sweep where administrators see a high traffic volume of network scans to identify target resources.
  17. This slides provide example of protocol anomaly detection. The concept should be familiar so an example would be the best way to discuss this slide. ANIMATION 1 st click – The set up graphic shows the FTP client and the FTP server with the IDP appliance in front of the server. 2 nd click – A request is sent from the client to the server requesting an FTP session. No attack has occurred yet. 3 rd click – The client sends a second request to open a connection from the server to the client. However, instead of sending its open address, the address of a different server is sent. If this request were to go though, data can be sent to an unauthorized client. This is the attack. 4 th click – The IDP appliance recognizes that the FTP protocol is not being used as expected and blocks the communication to the FTP server. Attack blocked.
  18. Stateful signature refers to the ability to look for attacks in the context of the network traffic. Without it, IDP would need to scan any and all traffic for a specific pattern that matches the attack. This can result in performance degradation and increased false positives. ANIMATION 1 st click – The example shown here is Code Red Worm. The worm utilized HTTP but only the GET request of HTTP. Hence the IDP only scans the specific traffic (in this case, HTTP GET) for a pattern that matches the attack.
  19. The slides in this section addresses some of the new features available in IDP 4.0 and NSM 2006.1 release.
  20. Security Explorer is a simple, intuitive, interactive graphical user interface released as part of IDP 4.0 and NSM 2006.1 release. Some customer may be aware of this feature as it had been an officially unsupported features in previous versions of IDP Manager. The graphic is a screen capture of Security Explorer and illustrates how you can see the traffic between multiple nodes. The UI is interactive in the sense that you can follow the traffic from one node/user to another simply by clicking the graphic icon of that node/user.
  21. Profiler feature is carried over from IDP Manager to NSM. After being configured, Profiler continually captures information about the network node and traffic relevant to the administrator requirements. The level and detail of information span to the application showing not just the type of applications but details such as the on-line user name, e-mail address, subject of e-mails, etc…
  22. New to IDP 4.0, Diffserv marking is the rate limiting capability introduced to IDP product line. Rather than just allowing or blocking traffic based on various criteria, IDP can now set priorities of the traffic. Since the level of granularity can be as detailed as the type of applications, its simple to tag certain application traffic as lower priority (e.g., IM or P2P). Since the Diffserv marking is defined as an action based on IDP rules, the configuration is as simple as any other IDP policy rule configuration. Since the actual enforcement of Diffserv marking is performed by routers, its important to note that this feature will work in networks with Juniper network gear as well as non-Juniper gear.
  23. H.225 Protocol is the signaling protocol for the H.323 VoIP solution. Since VoIP attacks utilize the signaling portion of the traffic (rather than the actual voice data), the support for H.225 bolsters the Juniper IDP products which already supported SIP. With fill protocol decode, we can offer day-zero protection against future exploits.
  24. Support of GTP decodes is tailored primarily for service providers of cellular data infrastructure. GTP encapsulated standard network traffic for the GPRS cellular data infrastructure. In order to apply the various analysis to the actual traffic, IDP must understand the GTP protocol.
  25. Coordinated Threat Control is an example of innovation brought on by collaboration between Juniper Networks products. In this case, tight integration between Juniper IDP and SSL VPN products have resulted in enhanced capability to thwart attacks from remote users. SSL VPN gateways often act as proxy between the remote users and the enterprise resources. While IDP appliances can detect attacks from remote users, pinpointing the actual user to quarantine or block the user has been difficult. SSL VPN gateway acting as a proxy does not make the end-user information available. With Juniper product, once an attack has been detected, the IDP appliance will send the identifying information to the SSL VPN gateway which will in turn, identify the offending end-user and take specific actions (often quarantining the user). This feature is only available from Juniper Networks. ANIMATION The steps are self-explanatory as defined above.
  26. 1999 - Juniper Networks IDP was being developed as the industry’s first Intrusion Prevention (IPS) product / platform, launched amidst IDS only offerings 2002 - IDP platforms introduced to market, backed by a dedicated Security Team that provided attack signature creation and updates, protocol decodes, and security response notices 2003 - Integrated Stateful signature and protocol anomaly detection mechanisms from IDP – specifically Internet facing protocols ideal for remote/branch offices – into firewall known as Deep Inspection (DI) 2004 - Industry’s first and only IPS to integrate full ‘forensics’ / ‘network profiling’ capabilities with Profiler 2005 - Juniper launches ISG Series (ASIC-based FW/VPN) with IDP ‘blades’, a fully integrated FW/VPN/IDP system with multi-Gigabit performance and Next-Generation ASICs 2006 – Launch of Coordinated Threat Control feature in collaboration with SSL VPN product line 2006 – Introduction of the next generation of network awareness and control with common management solution as Juniper FW/VPN and integrated security platform (ISG) as well as Security Explorer for graphical, interactive and intuitive user interface.
  27. This slide illustrates typical IDP deployments in distributed enterprise environment. Key item to note is that while IDP appliances may be deployed in different geographical locations, only one NSM management server located at the main office/headquarter is needed. This concept extends to Juniper Networks FW/VPN and ISG platforms deployed throughout the network.
  28. IDP 50, targeted at small and branch offices, do not support full active-active HA. All other platforms support state sync HA redundancy.
  29. This slide is a review of the capabilities of the various platforms, as well as the differences between them. Note the management solution for all three types of platforms is NSM.
  30. This is a set up slide for the next one. The graphic illustrates how “hybrid” or networks with different vendor’s firewalls and IDP appliances can result in multiple management solutions. Obviously, not an ideal environment.
  31. Much simplified consolidated view of the network with single management server for all the security gears in the network.
  32. Domains and Role-based Admin feature deserves to be pointed out in this slide. While often requested by service providers, this feature is also very valuable to enterprise. It is not uncommon for enterprise to logically divide the roles of administrators based on the type of security gears so that specific administrators manage firewall policies while others manage IDP policies, etc… It is also common for enterprise to logically separate admin responsibilities based on their business requirements (e.g., a particular admin manages all security gear at a specific branch office while another manages the headquarter).
  33. This slides illustrate how NSM truly integrates the management of IDP products along with other security devices. The main point of this slide is to convey how simple it is to manage IDP policies. ANIMATION 1 st click – Circles the tab section of the screen shot. Within the circle, you can see the different tasks available. In particular, you can see the tab used to configure firewall rules and IDP. 2 nd click – The Attack button from the main page launches the window used for configuring attack detection. 3 rd click – The Action button from the main page launches the window for configuring the response to a particular attack.
  34. Some consider the selection of IDP products to be based on throughput first and all else, second. While the product is an inline network device, its important to iterate that the main purpose for the appliance is security. IDP appliance with sub-par security coverage is not much better than a simple router. Do you need another router in your network? Focus needs to be on the level of security coverage and the rapid response of Juniper Networks security team. Reiterate the example from previous slides on how we compare to our competitors on responding to Microsoft vulnerability announcement.
  35. While NSM does not provide management of “all” Juniper products, it does manage FW, IDP and ISG platforms which make up the bulk of enterprise security appliances. Multiple deployment options include inline, sniffer mode (traditional IDS), HA, etc… “Profile” the network obviously refers to Profiler feature in NSM and previously in IDP manager where administrators can configure the type of information to gather from the network to better understand the network traffic and application.