Verisign Cloud Mitigation
Upcoming SlideShare
Loading in...5
×
 

Verisign Cloud Mitigation

on

  • 515 views

 

Statistics

Views

Total Views
515
Views on SlideShare
515
Embed Views
0

Actions

Likes
0
Downloads
16
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Verisign Cloud Mitigation Verisign Cloud Mitigation Document Transcript

  • Customer Traffic Verisign Cloud Mitigation Verisign Cloud Infrastructure Customer Premises (Data Center) Internet Cloud Layer Juniper DDoS Secure: • Signature free, heuristics based application intelligence • Immediate mitigation on-premise for L7 and stealthy attacks • Redirects to cloud for volumetric and flooding attacks Stealthy L7 attacks Joint Solution Innovation • Multi-layered, coordinated DDoS defense L3 to L7 • Responds at the speed of the threat • Designed for minimal operational involvement • Open Standard1 2 1 2 3 Customer traffic mixed with attack traffic Application-layer attacks stopped locally Volumetric attack traffic redirected to cloud Scrubbed traffic returned from cloud Verisign Mitigation Centers Good Traffic • Robust Cloud Capacity • Globally distributed • Mitigates highest volume attacks Critical Applications DDoS Secure Verisign Monitoring Facilities 3 4 4