E-SPIN partner with Juniper Networks to offer full range of its IDP Series Intrusion Detection and Prevention Systems as part of E-SPIN Intrusion Detection and Prevention (IDP) System that cover Network, Host/Mission Critical System and Application Intrusion Defense Solutions.
Future Proof Multi Method Detection and Prevention Technology
Juniper Networks® IDP Series Intrusion Detection and Prevention Appliances features with “Future Proof” Multi-Method Detection (MMD) technology, offers comprehensive coverage by leveraging multiple detection mechanisms. For example, by utilizing signatures, as well as other detection methods including protocol anomaly traffic anomaly detection, the Juniper Networks IDP Series appliances can thwart known attacks as well as possible future variations of the attack. Intrusion attack signatures are continue update during subscription period to protect against know and non-known vulnerabilities to ensures that you’re not merely reacting to new attacks, but proactively securing your network from future attacks.
Intelligence Based False Positive Management
One of the top concerns in deployment of any IDP solution is false positives. Incorrectly identifying valid access and traffic as an attack could at times be just as damaging as a true attack. Critical business activities can be delayed and additional IT resources needed to investigate and determine the nature of the false positives. Juniper Networks IDP Series with Stateful Signature Detection dramatically reduces false positives by examining the traffic in the context of the application. With full understanding of the application and its relevant traffic, the IDP Series can pinpoint the signature pattern-matching to the exact location where an attack can occur. This application layer intelligence dramatically reduces the number of false positives compared to IDP platforms utilizing traditional non-stateful signature detection. In addition to the improved accuracy of the detection, the throughput of the solution is also optimized as the pattern detection is applied only to relevant network traffic.
High Performance Throughput to cope with Real World Production Load
Network throughput capacity of IDP platforms by itself often lends very little to the true performance of the appliance in a real-world environment. Many IDP platforms can exhibit very high throughput when only few attacks are being monitored. When more and more attack detections are enabled, the overall throughput can degrade. Also, while some appliances ship with default coverage settings optimized for performance, these settings often do not include the necessary attack coverage necessary in real-world deployments to gear for high performance perception during proof of concept (POC) or technical evaluation operation. The throughput of Juniper Networks IDP Series appliances span wide range enterprise and service provider needs from 150 Mbps to 10 Gbps in actual production environments. All performance measurements are conducted in real-world deployment scenarios and are indicative of performance customers can expect when installing the IDP Series in their network.
Secure Application Traffic and Bandwidth Management
While an IDP solution is a critical component of every enterprise security infrastructure, it also offers the benefit of streamlining your business based on the applications used in the network. In addition to identifying viruses and attacks, the Juniper Networks IDP Series can identify the application associated with the particular traffic. Application intelligence enables accurate detection and reporting of volume used by applications such as social networking, peer-to-peer, or instant messaging. Armed with the knowledge of these applications running in the network, administrators can easily manage them by limiting bandwidth, restricting their use, or changing their prioritization for the best network optimization. By accurately identifying and prioritizing application traffic, enterprises can ensure the necessary network bandwidth for business-critical applications without banning or blocking non-business applications. If necessary, specific application traffic can be blocked altogether to meet business or regulatory compliance.
Flexible and Secure Identity and System User Management
Collaborative projects are commonplace in today’s workplace. Making sure that security policies are easily enforced requires knowledge of how those collaborative user groups are formed and which groups have application usage rights. The IDP Series works in harmony with Juniper Networks Unified Access Control infrastructure to obtain user role information gathered from the IC Series Unified Access Control Appliances thereby enabling enforcement of application and security policies based on user roles. The IC Series interacts with a company’s Active Directory (AD) or LDAP servers to assign users to roles and provides host information upon which the IDP Series appliance can act. This allows for better management of applications and more control over threats by extending application policy enforcement and IPS rules with user role information.
Full range of system cater for different production requirements
Juniper Networks IDP Series appliances reputable worldwide and have complete range of appliances cater for small, mid-size and large enterprises, data centers, service providers, as well as multi site/country or global wide distributed deployment. The appliances can be deployed in existing networks to thwart network attacks and interface with other Juniper Networks products such as the firewall and SSL VPN solutions, or coexist with others system being invested to provide the highest level of network security available. The integrated IDP Series appliances offer the combination of IDP and firewall capabilities in a single footprint simplifying installation, network management and maintenance.
|Stateful signatures||• Intelligently track the state of the connection/traffic and scan for attack patterns matching the signature
• Minimizes false-positives
• Optimizes performance
|Zero-day protection||• Protocol anomaly detection and same-day coverage for newly found vulnerabilities.|
|Traffic anomaly detection||• Identify attacks spanning multiple connections by comparing incoming traffic volume to baseline activities
• Thwart attacks such as network probes and port scans
|Application awareness/identification||• Use of context, protocols and signatures to identify applications on any port.
• Enable rules and policies based on applications.
|Application policy enforcement||• Manage unwanted applications with various actions while maintaining threat coverage.|
|Application volume tracking||• Observe network bandwidth consumption per application.|
|Network honeypots||• Proactively identify potential attackers by impersonating network services that do not exist
• Using the attacker’s IP address, future attacks can easily be thwarted
Intrusion Detection and Prevention Systems
Complete professional services from consulting, training, solutions development to maintenance support
To ensure your network is always secure, the Juniper Networks IDP Series Intrusion Detection and Prevention Appliances include the latest signatures and updates during warranty and software update during ongoing subscription period. E-SPIN as the Juniper Networks Professional Services consultants, system integrator, solutions vendor, authorized Juniper Networks partners are trained, certified and knowledgeable in proposing and maintaining Juniper Networks networking and security products throughout the supported region with consulting, supply, trade-in, integrating, migrating, training and maintaining on 8×5 or 24×7 basis according to client requirements. E-SPIN are uniquely act as “value integrator” to assist you in planning and implementing your IDP solution as well as other networking and security infrastructure solutions in single “project”, “turnkey project” or “managed service” basis.