Juniper NS-SPAM-SSG350-2-R Datasheet

Browse online or download Datasheet for Warranty & support extensions Juniper NS-SPAM-SSG350-2-R. Juniper NS-DI-25 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 6
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
SOLUTION BRIEF
1
Challenge
As the network attack landscape
continues to evolve, IT managers can
no longer aord to focus solely on
protection against a single type of
attack and expect their network to
remain unaected.
Solution
Stopping all manner of inbound and
outbound attacks, requires a concerted,
multi-layered solution to eliminate
damage to the network, company
assets and the end user.
Benefits
To provide protection against inbound
and outbound attacks at all levels,
Juniper Networks integrates a complete
set of best-in-class Unified Threat
Management (UTM) features into their
line of branch and regional oce secure
router and firewall/VPN platforms. By
leveraging the development, support
and market expertise of many of the
leading content security partners,
Juniper is able to deliver a set of best-
in-class UTM features.
STOPPING INBOUND AND OUTBOUND
THREATS
JUNIPER NETWORKS SECURE ROUTER and FIREWALL/IPSEC VPN WITH
UNIFIED THREAT MANAGEMENT (UTM)
As the network attack landscape continues to evolve, IT managers can no longer aord to
focus solely on protection against a single type of attack and expect their network to remain
unaected. All types of attacks are squarely targeted at the corporate network. Relatively
simple network level attacks have morphed into more complex attacks that use both
network and application-level components to achieve their malicious goals. With more and
more companies providing direct access to the web, end-users are casually surfing sites
that may be known malware download sources, and/or unknowingly revealing personal
or corporate private data (credit cards, passwords, corporate trade secrets, etc) via email
scams or hidden background programs that collect and forward data. This means that an IT
manager must not only stop attacks at each layer of the network, for each application and
for all types of content, but they also need to stop both inbound and outbound threats.
Inbound threats are those that originate from outside the corporate network, for
example, from an attacker on the Internet who intends to penetrate the corporation’s
perimeter defenses. These threats include virtually all types of attacks from worms to
viruses to spyware to phishing emails.
Outbound threats are those that originate from someone inside, such as an employee
of the company who has a machine that has been unknowingly compromised and
is propagating a worm or virus throughout the corporate network. Other examples
of outbound attacks are users who respond to phishing attacks by entering their
personal data on a malicious web site, and spyware which is resident on an
employee’s machine that quietly sends sensitive corporate information to a malicious
party on the Internet.
INTERNET
Inbound Threats Outbound Threats
• Windows, macro & script viruses,
back doors
• Spyware, adware, keyloggers
• Spam, phishing
• Worms, trojans, DDoS, SoS, port
and reconnaissance scans
• Spyware, adware, malware, downloads
• Virus and file-based trojan propagation
• Response to phishing attacks
• Worm and trojan propagation
Page view 0
1 2 3 4 5 6

Summary of Contents

Page 1 - SOLUTION BRIEF

SOLUTION BRIEF 1ChallengeAs the network attack landscape continues to evolve, IT managers can no longer aord to focus solely on protection against a

Page 2 - The Right Tool for the Job

2Stopping all inbound and outbound attacks requires a concerted, multi-layered solution to prevent damage to the network, company assets and end user

Page 3

3and application-level attack protection at the perimeter. Using policy-based management, administrators can pick and choose which protocols to inspe

Page 4

4INTEGRATED WEB FILTERING SPECIFICATIONS (WEBSENSE)URL database >25 Million – growing dailyPages covered within database >3.9 BillionNew pages

Page 5 - Technology Partners

5IPS DEEP INSPECTION INTRUSION PREVENTION SYSTEM (IDP)Attack notification mechanisms 1. Session Packet Log2. Session Summary3. E-mail4. SNMP5. Syslog6

Page 6 - About Juniper Networks

63510202-003-EN July 2010Copyright 2010 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen

Comments to this Manuals

No comments