Más contenido relacionado
La actualidad más candente (20)
Similar a BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX (20)
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
- 4. 5 Keys to Evaluating The Juniper SRX: #1
Stateful Traffic Validation
4
- 5. 5 Keys to Evaluating The Juniper SRX: #2
Performance Under Massive Load
5
- 6. 5 Keys to Evaluating The Juniper SRX: #3
Performance Under Load + Attack
6
- 7. 5 Keys to Evaluating The Juniper SRX: #4
Performance and Accuracy of Protocol Decoding
7
- 8. 5 Keys to Evaluating The Juniper SRX: #5
Detection of Obfuscated Attacks
8
- 9. How? Attack Thyself!
Real Attacks
• 4,500 live security attacks
• 100+ evasions
• Malware
• Spam
• DDoS and Botnet simulation
• Custom attacks
• Research and frequent updates
Real World Applications
• 150+ application protocols
• Social media, peer-to-peer, voice, video
• Web and enterprise applications, gaming
• Custom applications
• Frequent updates
Unprecedented Performance
• 120 Gbps blended application traffic
• 90M concurrent TCP sessions
• 3M TCP sessions/second
• 38 Gbps SSL bulk encryption
- 10. Validating The Juniper SRX
Client
Simulation
150+ Blended
Application
Traffic (ex: MySQL, Oracle,
HTTP, etc.) +
4500+ Live
Security
Strikes
+
Millions of Sessions
BreakingPoint Storm CTM