Professional Documents
Culture Documents
3 of Top 4
U.S. WIRELESS CARRIERS
7 of Top 10
U.S. CABLE PROVIDERS
Top 3
WIRELESS CARRIERS IN JAPAN
Challenge
Solution
– Firewalls
Inline Non-Inline
Hardware Security Module (HSM) integration for FIPS 140-2 Level 3 compliant SSL key management
Traffic steering to intelligently route traffic, optimize performance and reduce security appliance costs
Validated interoperability with FireEye, RSA, IBM and other leading inspection products ensure that our solutions work together
“High-bandwidth DDoS attacks are becoming the new norm and will
continue wreaking havoc on unprepared enterprises”
Source: Gartner
High Performance
Mitigate 10 – 155 Gbps of attack
Multi-vector Broad Deployment
throughput, 200 M packets per
Application & Network Options & 3rd Party
Protection Integration second (PPS) in 1 rack unit
Symmetric Deployment
– Inline DDoS detection and mitigation in
one box
Real-time
– Inspect both inbound and outbound traffic
Detection
Flood Thresholds – Suitable for Enterprises
Protocol Anomalies UDP TCP HTTP DNS Telemetry Protecting own services
Behavioral Anomalies Permanent protection
L7 Scripts
Collection Sub-second detection-to-mitigation
Device
Resource Starvation
Profile
Black Lists
Telemetry
– Detection system analyses CPE data and
Thunder TPS CPE
DDoS Detection
System
mitigate when needed
BGP used to direct traffic to cloud based high
End performance Thunder TPS for scrubbing
Customer
Services
Profile
– Inbound traffic always routed toward TPS
End Customer Insight in peace-time and war-time
or Data Center
– DDoS detection at sub-second scale
Services
Data Center
Protocol Anomalies
Services
Behavioral Analysis
Geolocation
Global Thresholds
User Thresholds
SYN Cookies/sec PPS** 6.5 million 55 million 112 million 223 million