Botnet defense from threatstop juniper
Download
1 / 6

BOTNET DEFENSE FROM THREATSTOP & JuNIPER - PowerPoint PPT Presentation


  • 95 Views
  • Uploaded on

BOTNET DEFENSE FROM THREATSTOP & JuNIPER. Stop Botnets Stealing From You! Presenter: Ken Liu, V.P. Business Development ThreatSTOP, Inc. STOP BOTNETS STEALING FROM YOU!. Problem Organized criminals now hacking for profit & malicious intent

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' BOTNET DEFENSE FROM THREATSTOP & JuNIPER' - ivana-russo


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Botnet defense from threatstop juniper

BOTNET DEFENSE FROM THREATSTOP & JuNIPER

Stop Botnets Stealing From You!

Presenter: Ken Liu, V.P. Business Development

ThreatSTOP, Inc.


Stop botnets stealing from you
STOP BOTNETS STEALING FROM YOU!

  • Problem

    • Organized criminals now hacking for profit & malicious intent

    • Botnets and malware control your machines, steal your valuable data, and cause great damage

    • Rapidly growing and pervasive threat

      • ~100 million computers in U.S. “botted” in 2010

      • 88% of F500 networks are “botted”; 100% of ThreatSTOP customers

      • No one is immune

  • Challenge

    • Current signature-based solutions inadequate

      • Chasing the unknown, at the mercy of attackers.

      • Infinite combinations and sheer volume overwhelms signatures/patching cycle.

      • Lower catch rate

      • Slower updates/detection

      • High false- positives

      • High overhead to use.


Cloud ip reputation service enables srx to block botnets malware at the network edge
Cloud ip reputation service enables srx to block botnets/malware at the network edge

5

  • 1. Aggregate threat feeds from

  • public and proprietary monitors

  • 2. Produce predictive, real-time threat list by proprietary correlation engine

  • 3. Deliver IP address block list to SRX via DNS (patent-pending)

  • 4. SRX blocks traffic to/from bad IPs

  • 5. Customer logs become part of ThreatSTOP defense network

3

4

1

2

DNS



Value proposition
Value proposition

  • Block “call homes” & SSL traffic

  • “We found over 1,000 bots thanks to ThreatSTOP.”

  • -- IT Director, County Government

Prevent Data Theft

  • Cut spam by up to 90%

  • Improve network “goodput”

  • Offload other filters & save upgrade cost of expensive HW

Improve Performance—Save $

  • Your network “disappears” from criminals’ radar

  • Reduce more spam and risk of attack

Reduce Attack Surface

  • Use existing equipment, simple script install, immediate use

  • Eliminate manual maintenance & drudgery, increase IT productivity

Easy & Lowest TCO


Testimonials
Testimonials

“I had no idea my network printers are talking to China!”

-- Gary Woodward

Network Administrator

W. Memphis Schools

  • Blocks 1 million+ malware/week

  • Reduces network saturation

  • Cuts help desk tickets by 90%

  • Eliminates manual IP blacklisting and remediation

University of Baltimore

(SRX 3400)

Hillsborough College

“ThreatSTOP saved us $200,000 on email server upgrades that we put into classrooms instead.”

-- Steve Gorham

CIO

“Now we have no service stoppages, no escalations with the ISP, and no manual cleanups. ThreatSTOP has solved a big headache for us.”

--Nikola Nikolic

Services & Contracts Manager

Bibliotheek Rotterdam

(SRX 240H)