Catalog excerpts
DDOS SECURE DDoS Mitigation for your Network and Critical Applications Product Overview DDoS Secure defends some of the world’s busiest Web servers and critical business applications against volumetric flood and applicationlayer distributed denial of service (DDoS) attacks. DDoS Secure utilizes advanced heuristic DDoS mitigation technology that dynamically responds to over-loading of the protected resources, automatically providing the full spectrum of DDoS defenses to detect and block attacks. It is used by the world’s leading companies and organizations, protecting in excess of $60 billion of revenue. DDoS Secure is today the most comprehensive DDoS mitigation solution available for enterprises and hosting service providers, delivering simple yet effective protection that stops multivector DDoS attacks before they can disrupt the availability of your network and critical applications. Product Description Juniper Networks® DDoS Secure technology has been ensuring availability of critical business resources for some of the world’s busiest e-commerce, financial, and public sector customers for over a decade. During this time, DDoS attacks have evolved from high-bandwidth volumetric attacks that bring down Web servers, to highly sophisticated targeted attacks that threaten availability of critical business applications and resources. DDoS volumetric flood attacks are still a problem for online businesses, but with the right defense in place, these attacks can be nullified. However, today’s new breed of “low and slow” application layer attacks are not as easy to detect, and therefore, are much more difficult to mitigate. Through an ongoing commitment to innovation with a dedicated focus on solving customers’ security needs, Juniper’s world-class technology has kept pace with the changing threat landscape in enterprise and service provider networks. By offering a highly effective, fine-grained DDoS mitigation solution, DDoS Secure protects network resources, regardless of which attack vectors are being deployed. DDoS Secure uses a stateful analysis and heuristics approach to DDoS mitigation that provides protection for high volume attacks, as well as advanced “low and slow” application attacks with minimal false positives. The solution delivers fully automated application-layer DDoS protection for Web (HTTP) and secure Web (HTTPS) applications, Domain Name Systems (DNS), and VoIP systems (SIP). DDoS Secure can be deployed as an on-premise hardware appliance or as a virtual machine (VM) in private, public or hybrid cloud environments. Architecture and Key Components Heuristic Approach Traditionally, a DDoS outage occurs when resources are unable to handle the volume of connection requests at a particular point in time. This might be through an induced malicious attack using a Botnet for some financial, ideological, or political motive, or the result of a legitimate “flash-crowd” effect during peak traffic periods. To the end user, there is no real difference—at best they experience degraded response times; at worst, it is a disruption in the resource’s availability resulting in an outage with serious business impact. Adding more horsepower to the server or increasing bandwidth connectivity can provide some insurance against a volumetric DDoS attack, but they are ultimately in-effective against today’s new breed of sophisticated DDoS threats. Simply throttling all traffic or blacklisting particular groups of IP addresses is also not a lasting solution, particularly as these measures can impact legitimate users.
Open the catalog to page 1Normal Internet Traffic Normal Internet Traffic DDoS Attack Traffic Normal Internet Traffic DDoS Secure DDoS Secure Heuristic Analysis DDoS Attack Traffic Management PC Figure 1: DDoS Secure heuristic mitigation in action. Normal Internet traffic flows through the DDoS Secure device, while the software analyses the type, origin, flow, data rate, sequencing, style and protocol being utilized by all inbound and outbound traffic. The analysis is heuristic in nature and adjusts over time but is applied in real time with minimal latency. DDoS Secure software is different. Its innovative...
Open the catalog to page 2and application response times, the DDoS Secure appliance automatically adjusts the flow rate to ensure optimal performance of the protected resources. Key performance indicators are fed into the Resource Optimization Console, providing the customer with a fast and powerful set of management tools to highlight bottlenecks and manually fine-tune the response times of all DDoS Secure protected resources. In addition to its unrivaled DDoS mitigation capabilities, DDoS Secure also incorporates a range of network performance monitoring and analysis tools to give data center managers finegrained...
Open the catalog to page 3Corporate and Sales Headquarters APAC and EMEA Headquarters Juniper Networks International B.V. 1194 North Mathilda Avenue www.juniper.net Copyright 2013 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the...
Open the catalog to page 4All Juniper Networks catalogs and technical brochures
-
SRX1500 FIREWALL DATASHEET
6 Pages
-
EX2300-C COMPACT ETHERNET SWITCH
10 Pages
-
EX3400 ETHERNET SWITCH
13 Pages
-
EX4300 LINE OF ETHERNET SWITCHES
17 Pages
-
EX4600 ETHERNET SWITCH
13 Pages
-
EX4650 Ethernet Switch
13 Pages
-
EX9200 Ethernet Switch
15 Pages
-
EX9250 Ethernet Switch
12 Pages
-
EX2300 ETHERNET SWITCH
12 Pages
-
QFX5200 SWITCH
13 Pages
-
QFX5210 SWITCH
9 Pages
-
ISG Series
11 Pages
Archived catalogs
-
AP550
2 Pages
-
AP250
2 Pages
-
AP150W
2 Pages
-
AP245X
2 Pages
-
JSA7500
8 Pages
-
LN1000 Mobile Secure Router
6 Pages
-
JSA Series Secure Analytics
12 Pages
-
EX4550 Ethernet Switch
12 Pages
-
EX4300 Ethernet Switch
12 Pages
-
WLA Series Antenna Matrix
2 Pages
-
QFX3100 QFabric Director
4 Pages
-
EX Series Ethernet Switches
20 Pages
-
QFX3500 Switch
12 Pages
-
QFX3600 Switch
12 Pages
-
QFabric System
12 Pages
-
QFX5100 Ethernet Switch
12 Pages
-
Unified Access Control
12 Pages
-
LN2600 Rugged Secure Router
6 Pages
-
1100018
6 Pages
-
1000195
6 Pages
-
1000300
4 Pages
-
backgrounder
4 Pages
-
VXA Series
4 Pages
-
SRX1400 Services Gateway
8 Pages
-
Security Services Gateways
8 Pages
-
T Series Core Routers
8 Pages
-
JCS1200 Control System
6 Pages
-
J Series Services Routers
16 Pages
-
BX7000 Multi-Access Gateway
4 Pages