SOLUTION BRIEF
1
Challenge
As the network attack landscape
continues to evolve, IT managers can
no longer aord to focus solely on
protection against a single type of
attack and expect their network to
remain unaected.
Solution
Stopping all manner of inbound and
outbound attacks, requires a concerted,
multi-layered solution to eliminate
damage to the network, company
assets and the end user.
Benefits
To provide protection against inbound
and outbound attacks at all levels,
Juniper Networks integrates a complete
set of best-in-class Unified Threat
Management (UTM) features into their
line of branch and regional oce secure
router and firewall/VPN platforms. By
leveraging the development, support
and market expertise of many of the
leading content security partners,
Juniper is able to deliver a set of best-
in-class UTM features.
STOPPING INBOUND AND OUTBOUND
THREATS
JUNIPER NETWORKS SECURE ROUTER and FIREWALL/IPSEC VPN WITH
UNIFIED THREAT MANAGEMENT (UTM)
As the network attack landscape continues to evolve, IT managers can no longer aord to
focus solely on protection against a single type of attack and expect their network to remain
unaected. All types of attacks are squarely targeted at the corporate network. Relatively
simple network level attacks have morphed into more complex attacks that use both
network and application-level components to achieve their malicious goals. With more and
more companies providing direct access to the web, end-users are casually surfing sites
that may be known malware download sources, and/or unknowingly revealing personal
or corporate private data (credit cards, passwords, corporate trade secrets, etc) via email
scams or hidden background programs that collect and forward data. This means that an IT
manager must not only stop attacks at each layer of the network, for each application and
for all types of content, but they also need to stop both inbound and outbound threats.
• Inbound threats are those that originate from outside the corporate network, for
example, from an attacker on the Internet who intends to penetrate the corporation’s
perimeter defenses. These threats include virtually all types of attacks from worms to
viruses to spyware to phishing emails.
• Outbound threats are those that originate from someone inside, such as an employee
of the company who has a machine that has been unknowingly compromised and
is propagating a worm or virus throughout the corporate network. Other examples
of outbound attacks are users who respond to phishing attacks by entering their
personal data on a malicious web site, and spyware which is resident on an
employee’s machine that quietly sends sensitive corporate information to a malicious
party on the Internet.
INTERNET
Inbound Threats Outbound Threats
• Windows, macro & script viruses,
back doors
• Spyware, adware, keyloggers
• Spam, phishing
• Worms, trojans, DDoS, SoS, port
and reconnaissance scans
• Spyware, adware, malware, downloads
• Virus and file-based trojan propagation
• Response to phishing attacks
• Worm and trojan propagation
Comments to this Manuals