Evaluating The Juniper SRXFebruary 15th at 1:30 pm
IT Firestorm Threatens Business Performance
The Drive Towards Resiliency3
5 Keys to Evaluating The Juniper SRX: #1           Stateful Traffic Validation4
5 Keys to Evaluating The Juniper SRX: #2         Performance Under Massive Load5
5 Keys to Evaluating The Juniper SRX: #3         Performance Under Load + Attack6
5 Keys to Evaluating The Juniper SRX: #4    Performance and Accuracy of Protocol Decoding7
5 Keys to Evaluating The Juniper SRX: #5       Detection of Obfuscated Attacks8
How? Attack Thyself!Real Attacks•   4,500 live security attacks•   100+ evasions•   Malware•   Spam•   DDoS and Botnet sim...
Validating The Juniper SRX                   Client                 Simulation                150+ Blended                ...
Questions and Answers1
Upcoming SlideShare
Loading in …5
×

BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX

786 views
727 views

Published on

BreakingPoint and Juniper evaluate the Juniper SRX at the 2011 RSA Conference.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
786
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX

  1. 1. Evaluating The Juniper SRXFebruary 15th at 1:30 pm
  2. 2. IT Firestorm Threatens Business Performance
  3. 3. The Drive Towards Resiliency3
  4. 4. 5 Keys to Evaluating The Juniper SRX: #1 Stateful Traffic Validation4
  5. 5. 5 Keys to Evaluating The Juniper SRX: #2 Performance Under Massive Load5
  6. 6. 5 Keys to Evaluating The Juniper SRX: #3 Performance Under Load + Attack6
  7. 7. 5 Keys to Evaluating The Juniper SRX: #4 Performance and Accuracy of Protocol Decoding7
  8. 8. 5 Keys to Evaluating The Juniper SRX: #5 Detection of Obfuscated Attacks8
  9. 9. How? Attack Thyself!Real Attacks• 4,500 live security attacks• 100+ evasions• Malware• Spam• DDoS and Botnet simulation• Custom attacks• Research and frequent updatesReal World Applications• 150+ application protocols• Social media, peer-to-peer, voice, video• Web and enterprise applications, gaming• Custom applications• Frequent updatesUnprecedented Performance• 120 Gbps blended application traffic• 90M concurrent TCP sessions• 3M TCP sessions/second• 38 Gbps SSL bulk encryption
  10. 10. Validating The Juniper SRX Client Simulation 150+ Blended ApplicationTraffic (ex: MySQL, Oracle, HTTP, etc.) + 4500+ Live Security Strikes + Millions of Sessions BreakingPoint Storm CTM
  11. 11. Questions and Answers1

×