DDoS Secure
4Pages

{{requestButtons}}

Catalog excerpts

DDoS Secure - 1

DDOS SECURE DDoS Mitigation for your Network and Critical Applications Product Overview DDoS Secure defends some of the world’s busiest Web servers and critical business applications against volumetric flood and applicationlayer distributed denial of service (DDoS) attacks. DDoS Secure utilizes advanced heuristic DDoS mitigation technology that dynamically responds to over-loading of the protected resources, automatically providing the full spectrum of DDoS defenses to detect and block attacks. It is used by the world’s leading companies and organizations, protecting in excess of $60 billion of revenue. DDoS Secure is today the most comprehensive DDoS mitigation solution available for enterprises and hosting service providers, delivering simple yet effective protection that stops multivector DDoS attacks before they can disrupt the availability of your network and critical applications. Product Description Juniper Networks® DDoS Secure technology has been ensuring availability of critical business resources for some of the world’s busiest e-commerce, financial, and public sector customers for over a decade. During this time, DDoS attacks have evolved from high-bandwidth volumetric attacks that bring down Web servers, to highly sophisticated targeted attacks that threaten availability of critical business applications and resources. DDoS volumetric flood attacks are still a problem for online businesses, but with the right defense in place, these attacks can be nullified. However, today’s new breed of “low and slow” application layer attacks are not as easy to detect, and therefore, are much more difficult to mitigate. Through an ongoing commitment to innovation with a dedicated focus on solving customers’ security needs, Juniper’s world-class technology has kept pace with the changing threat landscape in enterprise and service provider networks. By offering a highly effective, fine-grained DDoS mitigation solution, DDoS Secure protects network resources, regardless of which attack vectors are being deployed. DDoS Secure uses a stateful analysis and heuristics approach to DDoS mitigation that provides protection for high volume attacks, as well as advanced “low and slow” application attacks with minimal false positives. The solution delivers fully automated application-layer DDoS protection for Web (HTTP) and secure Web (HTTPS) applications, Domain Name Systems (DNS), and VoIP systems (SIP). DDoS Secure can be deployed as an on-premise hardware appliance or as a virtual machine (VM) in private, public or hybrid cloud environments. Architecture and Key Components Heuristic Approach Traditionally, a DDoS outage occurs when resources are unable to handle the volume of connection requests at a particular point in time. This might be through an induced malicious attack using a Botnet for some financial, ideological, or political motive, or the result of a legitimate “flash-crowd” effect during peak traffic periods. To the end user, there is no real difference—at best they experience degraded response times; at worst, it is a disruption in the resource’s availability resulting in an outage with serious business impact. Adding more horsepower to the server or increasing bandwidth connectivity can provide some insurance against a volumetric DDoS attack, but they are ultimately in-effective against today’s new breed of sophisticated DDoS threats. Simply throttling all traffic or blacklisting particular groups of IP addresses is also not a lasting solution, particularly as these measures can impact legitimate users.

Open the catalog to page 1
DDoS Secure - 2

Normal Internet Traffic Normal Internet Traffic DDoS Attack Traffic Normal Internet Traffic DDoS Secure DDoS Secure Heuristic Analysis DDoS Attack Traffic Management PC Figure 1: DDoS Secure heuristic mitigation in action. Normal Internet traffic flows through the DDoS Secure device, while the software analyses the type, origin, flow, data rate, sequencing, style and protocol being utilized by all inbound and outbound traffic. The analysis is heuristic in nature and adjusts over time but is applied in real time with minimal latency. DDoS Secure software is different. Its innovative...

Open the catalog to page 2
DDoS Secure - 3

and application response times, the DDoS Secure appliance automatically adjusts the flow rate to ensure optimal performance of the protected resources. Key performance indicators are fed into the Resource Optimization Console, providing the customer with a fast and powerful set of management tools to highlight bottlenecks and manually fine-tune the response times of all DDoS Secure protected resources. In addition to its unrivaled DDoS mitigation capabilities, DDoS Secure also incorporates a range of network performance monitoring and analysis tools to give data center managers finegrained...

Open the catalog to page 3
DDoS Secure - 4

Corporate and Sales Headquarters APAC and EMEA Headquarters Juniper Networks International B.V. 1194 North Mathilda Avenue www.juniper.net Copyright 2013 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the...

Open the catalog to page 4

All Juniper Networks catalogs and technical brochures

  1. QFX5200 SWITCH

    13 Pages

  2. AP550

    2 Pages

  3. AP250

    2 Pages

  4. AP150W

    2 Pages

  5. AP245X

    2 Pages

  6. PTX1000

    4 Pages

  7. SRX300

    6 Pages

  8. SRX1500

    4 Pages

  9. SRX4000

    5 Pages

  10. JSA7500

    8 Pages

  11. ISG Series

    11 Pages

  12. vSRX

    6 Pages

  13. ACX500

    7 Pages

  14. QFX3500 Switch

    12 Pages

  15. QFX3600 Switch

    12 Pages

  16. QFabric System

    12 Pages

  17. 1100018

    6 Pages

  18. 1000195

    6 Pages

  19. 1000300

    4 Pages

  20. backgrounder

    4 Pages

  21. VXA Series

    4 Pages