Juniper NetScreen Deep Inspection Firewall - Licens - 1 firewall - for NetScr...
- Antal licenser: 1 firewall
Ikke på lager
Your ability to protect all network resources can be compromised by a single location in the network without application-level protection deployed throughout the network. To secure sensitive resources in the corporate headquarters and large regional offices, you can deploy a NetScreen-IDP behind a Stateful inspection firewall and in front of critical servers, where protecting application-level data from both internal and external attacks is a primary concern. But you also want to make application-level attack protection pervasive throughout your network. Small, remote and branch offices and telecommuters with home networks also need application-level attack mitigation. Adding deeper protection to the firewall for the types of attacks that threaten these network segments will enable you to stop these threats at the edge and strengthen your overall security stance.
NetScreen's Deep Inspection firewall builds on the strength of Stateful inspection and integrates intrusion prevention technology into the firewall to provide application-level attack protection at the network perimeter. Leveraging the efficiencies of both technologies, Deep Inspection firewall can efficiently perform network security functions as well as analysis on the application message to determine whether to accept or deny traffic.
NetScreen's Deep Inspection technology applies a deeper level of application understanding to the traffic to make access control decisions based on the intent of that traffic. Deployed at the perimeter, a NetScreen Deep Inspection firewall focuses on preventing application-level attacks aimed at Internet-facing applications, such as Web, e-mail, FTP and DNS. It eliminates application-level ambiguities, performing de-fragmentation, reassembly, scrubbing and normalization, to convert network packets to the application-level message being transferred between the client and the server. It then looks for protocol conformance and extracts data from identified application "service fields" where attacks are perpetrated and applies attack pattern matches. It then decides to accept or deny the traffic based on high impact protocol anomalies or any given attack pattern in one of these application service fields. The Deep Inspection firewall can block application-level attacks at the Internet gateway so they never reach their destination.