Your SlideShare is downloading. ×
0
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juniper SRX

636

Published on

BreakingPoint and Juniper evaluate the Juniper SRX at the 2011 RSA Conference.

BreakingPoint and Juniper evaluate the Juniper SRX at the 2011 RSA Conference.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
636
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Evaluating The Juniper SRXFebruary 15th at 1:30 pm
  • 2. IT Firestorm Threatens Business Performance
  • 3. The Drive Towards Resiliency3
  • 4. 5 Keys to Evaluating The Juniper SRX: #1 Stateful Traffic Validation4
  • 5. 5 Keys to Evaluating The Juniper SRX: #2 Performance Under Massive Load5
  • 6. 5 Keys to Evaluating The Juniper SRX: #3 Performance Under Load + Attack6
  • 7. 5 Keys to Evaluating The Juniper SRX: #4 Performance and Accuracy of Protocol Decoding7
  • 8. 5 Keys to Evaluating The Juniper SRX: #5 Detection of Obfuscated Attacks8
  • 9. How? Attack Thyself!Real Attacks• 4,500 live security attacks• 100+ evasions• Malware• Spam• DDoS and Botnet simulation• Custom attacks• Research and frequent updatesReal World Applications• 150+ application protocols• Social media, peer-to-peer, voice, video• Web and enterprise applications, gaming• Custom applications• Frequent updatesUnprecedented Performance• 120 Gbps blended application traffic• 90M concurrent TCP sessions• 3M TCP sessions/second• 38 Gbps SSL bulk encryption
  • 10. Validating The Juniper SRX Client Simulation 150+ Blended ApplicationTraffic (ex: MySQL, Oracle, HTTP, etc.) + 4500+ Live Security Strikes + Millions of Sessions BreakingPoint Storm CTM
  • 11. Questions and Answers1

×