BOTNET DEFENSE FROM THREATSTOP & JUNIPER Stop Botnets Stealing From You! Presenter: Ken Liu, V.P. Business Development ThreatSTOP, Inc.

Slides:



Advertisements
Similar presentations
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
Advertisements

HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
1 Effective, secure and reliable hosted security and continuity solution.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
PART THREE E-commerce in Action Norton University E-commerce in Action.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Akamai Technologies - Overview RSA ® Conference 2013.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.
1 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO x4242 Cloud Network Defense.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Sky Advanced Threat Prevention
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
BUILD SECURE PRODUCTS AND SERVICES
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
IoT Security Part 2, The Malware
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
Top 5 Open Source Firewall Software for Linux User
Today’s cyber security landscape
Network Security Analysis Name : Waleed Al-Rumaih ID :
Real-time protection for web sites and web apps against ATTACKS
Virtualization & Security real solutions
Honeypots and Honeynets
Defending high value targets in the cloud using IP Reputation
Marcial Quinones-Cardona
Presentation transcript:

BOTNET DEFENSE FROM THREATSTOP & JUNIPER Stop Botnets Stealing From You! Presenter: Ken Liu, V.P. Business Development ThreatSTOP, Inc.

2 Copyright © 2009 Juniper Networks, Inc. STOP BOTNETS STEALING FROM YOU! Problem  Organized criminals now hacking for profit & malicious intent  Botnets and malware control your machines, steal your valuable data, and cause great damage  Rapidly growing and pervasive threat  ~100 million computers in U.S. “botted” in 2010  88% of F500 networks are “botted”; 100% of ThreatSTOP customers  No one is immune Challenge  Current signature-based solutions inadequate  Chasing the unknown, at the mercy of attackers.  Infinite combinations and sheer volume overwhelms signatures/patching cycle.  Lower catch rate  Slower updates/detection  High false- positives  High overhead to use.

3 Copyright © 2009 Juniper Networks, Inc. CLOUD IP REPUTATION SERVICE ENABLES SRX TO BLOCK BOTNETS/MALWARE AT THE NETWORK EDGE 1. Aggregate threat feeds from public and proprietary monitors 2. Produce predictive, real-time threat list by proprietary correlation engine 3. Deliver IP address block list to SRX via DNS (patent-pending) 4. SRX blocks traffic to/from bad IPs 5. Customer logs become part of ThreatSTOP defense network DNS

4 Copyright © 2009 Juniper Networks, Inc. SRX BLOCKS BOTNETS WITH THREATSTOP Track known bad IP addresses Develop accurate block lists in real time Continually updated and verified Deliver threat lists to SRXs for enforcement via DNS Apply filters provided by ThreatSTOP Leverage high-performance IP address filtering Blocks inbound/outbound traffic to bad addresses, even encrypted SSL traffic All protocols and applications covered. Prevent data theft Day zero protection and reduce attack surface Better network performance and lower burden on other services Reduce help desk calls and reportable events Easy install, immediate protection and lowest TCO Benefits

5 Copyright © 2009 Juniper Networks, Inc. VALUE PROPOSITION  Block “call homes” & SSL traffic  “We found over 1,000 bots thanks to ThreatSTOP.” -- IT Director, County Government Prevent Data Theft  Cut spam by up to 90%  Improve network “goodput”  Offload other filters & save upgrade cost of expensive HW Improve Performance—Save $  Your network “disappears” from criminals’ radar  Reduce more spam and risk of attack Reduce Attack Surface  Use existing equipment, simple script install, immediate use  Eliminate manual maintenance & drudgery, increase IT productivity Easy & Lowest TCO

6 Copyright © 2009 Juniper Networks, Inc. TESTIMONIALS “I had no idea my network printers are talking to China!” -- Gary Woodward Network Administrator W. Memphis Schools  Blocks 1 million+ malware/week  Reduces network saturation  Cuts help desk tickets by 90%  Eliminates manual IP blacklisting and remediation University of Baltimore (SRX 3400) University of Baltimore (SRX 3400) “ThreatSTOP saved us $200,000 on server upgrades that we put into classrooms instead.” -- Steve Gorham CIO Hillsborough College “Now we have no service stoppages, no escalations with the ISP, and no manual cleanups. ThreatSTOP has solved a big headache for us.” --Nikola Nikolic Services & Contracts Manager Bibliotheek Rotterdam (SRX 240H) Bibliotheek Rotterdam (SRX 240H)