corero network security - follow up to issa meeting - presenting proactive infrastructure protection

Upload: juicy69mann

Post on 03-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 Corero Network Security - Follow Up to ISSA Meeting - Presenting Proactive Infrastructure Protection

    1/2

    3/27/13 Gmail - Corero Network Security: Follow up to ISSA Meeting presenting Proactive Infrastructure Protection

    https://mail.goog le.com/mail/u/1/?ui=2&ik=dbe926f884&view=pt&q=zip&qs=true&search=query&th=13a901cdb21670d8

    Kerry Nye

    Corero Network Security: Follow up to ISSA Meeting presenting Proactive

    Infrastructure Protection1 message

    Jim Sortino Tue, Oct 23, 2012 at 5:12 PM

    To: [email protected]

    Hi Kerry,

    Thank you for attending our presentation at your ISSA meeting. I hope you found the event educational and

    I have attached the information that was provided during the presentation. I plan on being in the San Diegoarea on November 1st and 2nd and was hoping that you and your team would be available to discuss your

    goals in protecting your infrastructure against Reconnaissance techniques, DDoS attacks and other server

    targeted attacks as well as providing us the opportunity to go into some more detail about the solutions that

    Corero offers. Please let me know if we can meet on either of those days.

    Over the last 12 years, Corero has provided perimeter protection to over 2017 customers with a suite of

    appliances that provides on-premise three-dimensional protection architecture as a first line of defense to block

    reconnaissance technique that profile your web presence, network-layer and advanced application-layer DoS

    attacks and other server-targeted attacks that account for 94% of all attacks being propagated. In March, ourDDoS Defense solution was awarded the winner of the 2012 Info Security Global Excellence Award for Best

    Security Products and Solutions for Large Enterprises.

    Some key features of our Perimeter Protection solutions are:

    1) 12 years of DDoS Defense experience: A line of 4th generation non-intrusive 64 core appliances sitting in

    front of your firewall to protect your existing infrastructure against traditional network-layer DDoS attacks,

    advanced application-layer DoS attacks, unauthorized access, and other server-targeted attacks. Whether

    your pipe ranges from 20Mb to 20Gs, Corero has an appliance that fits your bandwidth needs at a pricecommensurate with your network utilization.

    1) Layer 2 7 protection: Stateful firewall filtering for protection against unauthorized access, IP reputation

    blocking and deep packet inspection to protect against specially crafted packets that created denial of

    service conditions as well other remote exploits targeting servers.

  • 7/28/2019 Corero Network Security - Follow Up to ISSA Meeting - Presenting Proactive Infrastructure Protection

    2/2

    3/27/13 Gmail - Corero Network Security: Follow up to ISSA Meeting presenting Proactive Infrastructure Protection

    https://mail.goog le.com/mail/u/1/?ui=2&ik=dbe926f884&view=pt&q=zip&qs=true&search=query&th=13a901cdb21670d8

    2) Behavioral Analysis System to defend against application layer DoS attacks such as HTTP GET and

    DNS attacks: Our Request/Response Behavioral Analysis and demerit scoring system work in concert with

    our Client Request Limiting technology to detect and block web site scraping and application layer attacks

    that can create a denial of service conditions that are undetectable by off premises (in the cloud) solutions

    and Web Application Firewalls. Our system assigns a demerit score to our appliance-maintained credit

    balance associated with each source IP address and blocks attacker requests when credits are depleted.

    3) Our unique two tiered stateful protocol analysis along with our 64 core processor architecture provides

    the ability to inspect all data transactions and compare the characteristics and content to what is allowed,

    expected or required based on network protocol specifications and known implementations with a network

    latency less than 50 uSec. The benefit of this technology is that zero day attacks such as the Apache Killer

    are blocked without having to rely on any pattern matching signatures that can degrade network

    performance.

    4) Management console: Coreros Network Security Analyzer provides an enterprise level security

    intelligence dashboard that contains compliance audit lifecycle management reporting, DDoS event

    management and response, forensics and root clause analysis reporting and real time alerting

    Jim Sortino, CISSP

    Corero Network Security

    390 Diablo Rd, Suite 202

    Danville, CA. 94526, USA

    Office: +1.925.820.8200

    Mobile: +1.925.413.7576

    www.corero.com

    Infrastructure Protection Solutions Your First Line of Defense

    Corero_Protecting your Infrastruture Proactively - ISSA San Diego Seminar October2012.zip

    3162K

    https://mail.google.com/mail/u/1/?ui=2&ik=dbe926f884&view=att&th=13a901cdb21670d8&attid=0.1&disp=attd&safe=1&zwhttp://www.corero.com/