1 / 6

BOTNET DEFENSE FROM THREATSTOP & JuNIPER

BOTNET DEFENSE FROM THREATSTOP & JuNIPER. Stop Botnets Stealing From You! Presenter: Ken Liu, V.P. Business Development ThreatSTOP, Inc. STOP BOTNETS STEALING FROM YOU!. Problem Organized criminals now hacking for profit & malicious intent

bin
Download Presentation

BOTNET DEFENSE FROM THREATSTOP & JuNIPER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BOTNET DEFENSE FROM THREATSTOP & JuNIPER Stop Botnets Stealing From You! Presenter: Ken Liu, V.P. Business Development ThreatSTOP, Inc.

  2. STOP BOTNETS STEALING FROM YOU! • Problem • Organized criminals now hacking for profit & malicious intent • Botnets and malware control your machines, steal your valuable data, and cause great damage • Rapidly growing and pervasive threat • ~100 million computers in U.S. “botted” in 2010 • 88% of F500 networks are “botted”; 100% of ThreatSTOP customers • No one is immune • Challenge • Current signature-based solutions inadequate • Chasing the unknown, at the mercy of attackers. • Infinite combinations and sheer volume overwhelms signatures/patching cycle. • Lower catch rate • Slower updates/detection • High false- positives • High overhead to use.

  3. Cloud ip reputation service enables srx to block botnets/malware at the network edge 5 • 1. Aggregate threat feeds from • public and proprietary monitors • 2. Produce predictive, real-time threat list by proprietary correlation engine • 3. Deliver IP address block list to SRX via DNS (patent-pending) • 4. SRX blocks traffic to/from bad IPs • 5. Customer logs become part of ThreatSTOP defense network 3 4 1 2 DNS

  4. SRX BLOCKS botnets WITH THREATSTOP

  5. Value proposition • Block “call homes” & SSL traffic • “We found over 1,000 bots thanks to ThreatSTOP.” • -- IT Director, County Government Prevent Data Theft • Cut spam by up to 90% • Improve network “goodput” • Offload other filters & save upgrade cost of expensive HW Improve Performance—Save $ • Your network “disappears” from criminals’ radar • Reduce more spam and risk of attack Reduce Attack Surface • Use existing equipment, simple script install, immediate use • Eliminate manual maintenance & drudgery, increase IT productivity Easy & Lowest TCO

  6. Testimonials “I had no idea my network printers are talking to China!” -- Gary Woodward Network Administrator W. Memphis Schools • Blocks 1 million+ malware/week • Reduces network saturation • Cuts help desk tickets by 90% • Eliminates manual IP blacklisting and remediation University of Baltimore (SRX 3400) Hillsborough College “ThreatSTOP saved us $200,000 on email server upgrades that we put into classrooms instead.” -- Steve Gorham CIO “Now we have no service stoppages, no escalations with the ISP, and no manual cleanups. ThreatSTOP has solved a big headache for us.” --Nikola Nikolic Services & Contracts Manager Bibliotheek Rotterdam (SRX 240H)

More Related