botnet defense from threatstop juniper
Download
Skip this Video
Download Presentation
BOTNET DEFENSE FROM THREATSTOP & JuNIPER

Loading in 2 Seconds...

play fullscreen
1 / 6

BOTNET DEFENSE FROM THREATSTOP & JuNIPER - PowerPoint PPT Presentation


  • 95 Views
  • Uploaded on

BOTNET DEFENSE FROM THREATSTOP & JuNIPER. Stop Botnets Stealing From You! Presenter: Ken Liu, V.P. Business Development ThreatSTOP, Inc. STOP BOTNETS STEALING FROM YOU!. Problem Organized criminals now hacking for profit & malicious intent

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' BOTNET DEFENSE FROM THREATSTOP & JuNIPER' - ivana-russo


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
botnet defense from threatstop juniper

BOTNET DEFENSE FROM THREATSTOP & JuNIPER

Stop Botnets Stealing From You!

Presenter: Ken Liu, V.P. Business Development

ThreatSTOP, Inc.

stop botnets stealing from you
STOP BOTNETS STEALING FROM YOU!
  • Problem
    • Organized criminals now hacking for profit & malicious intent
    • Botnets and malware control your machines, steal your valuable data, and cause great damage
    • Rapidly growing and pervasive threat
      • ~100 million computers in U.S. “botted” in 2010
      • 88% of F500 networks are “botted”; 100% of ThreatSTOP customers
      • No one is immune
  • Challenge
    • Current signature-based solutions inadequate
      • Chasing the unknown, at the mercy of attackers.
      • Infinite combinations and sheer volume overwhelms signatures/patching cycle.
      • Lower catch rate
      • Slower updates/detection
      • High false- positives
      • High overhead to use.
cloud ip reputation service enables srx to block botnets malware at the network edge
Cloud ip reputation service enables srx to block botnets/malware at the network edge

5

  • 1. Aggregate threat feeds from
  • public and proprietary monitors
  • 2. Produce predictive, real-time threat list by proprietary correlation engine
  • 3. Deliver IP address block list to SRX via DNS (patent-pending)
  • 4. SRX blocks traffic to/from bad IPs
  • 5. Customer logs become part of ThreatSTOP defense network

3

4

1

2

DNS

value proposition
Value proposition
  • Block “call homes” & SSL traffic
  • “We found over 1,000 bots thanks to ThreatSTOP.”
  • -- IT Director, County Government

Prevent Data Theft

  • Cut spam by up to 90%
  • Improve network “goodput”
  • Offload other filters & save upgrade cost of expensive HW

Improve Performance—Save $

  • Your network “disappears” from criminals’ radar
  • Reduce more spam and risk of attack

Reduce Attack Surface

  • Use existing equipment, simple script install, immediate use
  • Eliminate manual maintenance & drudgery, increase IT productivity

Easy & Lowest TCO

testimonials
Testimonials

“I had no idea my network printers are talking to China!”

-- Gary Woodward

Network Administrator

W. Memphis Schools

  • Blocks 1 million+ malware/week
  • Reduces network saturation
  • Cuts help desk tickets by 90%
  • Eliminates manual IP blacklisting and remediation

University of Baltimore

(SRX 3400)

Hillsborough College

“ThreatSTOP saved us $200,000 on email server upgrades that we put into classrooms instead.”

-- Steve Gorham

CIO

“Now we have no service stoppages, no escalations with the ISP, and no manual cleanups. ThreatSTOP has solved a big headache for us.”

--Nikola Nikolic

Services & Contracts Manager

Bibliotheek Rotterdam

(SRX 240H)

ad