SlideShare a Scribd company logo
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  1	
  
	
  
Juniper’s	
  	
  
Threat	
  Intelligence	
  Pla/orm	
  
Explained	
  
	
  
	
  
	
  
23	
  February	
  2015	
  
In security, time matters. A lot.
Consider the time it takes to identify a new threat. Sometimes it takes days,
weeks, or months. Or, the time it takes to block a threat action, or stop a breach.
Same thing: typically it takes days, weeks or months.
During that time, the bad actor can do a lot of damage, before you’re even aware
that there’s a problem.
That’s why we built the Juniper Threat Intelligence Platform, which streams
threat data to where it’s needed most – at the enforcement point – in only
seconds. This means that moments after you know about a threat, your firewall
policies can take action, and stop it from turning into a problem.
In short, we can stop threats, faster.
Let’s explore how this works.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  2	
  
	
  
The threat landscape is dynamic: constantly growing, changing,
evolving.
There are a multitude of threat actions that bad actors use today to
execute an attack – establishing back doors, embedding root kits,
delivering malware, SQL injection, brute force, DDoS attacks, spear
phishing—the list is long, and the attacks often use a combination of
techniques that eventually result in a breach and exfiltration of data.
Often, they use a command and control server used to orchestrate
remote actions -- sometimes executed on a single host, and other
times executed in a peer-to-peer configuration, which makes it really
hard to track. The adversaries are quick to change their network
identifiers (like IP address) and behaviors so that their activities
continue unabated.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  3	
  
	
  
In response, scores of security research firms have been
established to find these threats. They make their findings available
to subscribers as a feed; sometimes free and sometimes at a price.
The good news is, there are plenty of choices for threat intelligence
data. Some research firms are industry specific (e.g. federal
government), some are technique specific (DDoS detection), some
on technologies areas, such as discovering app vulnerabilities.
The data is delivered to subscribers through a feed, where the data
is used to enrich SIEM or other analytic engines, and/or to inform the
enforcement point policy on the firewall itself.
The problem is, getting the data to an enforcement point takes
too long – typically days or weeks. First the data has to be
converted to a usable format, then it has to be associated with the
policies so that it’s actionable.
It takes time.
And when the source data changes (which it does every hour, every
day) you have to do it all over again.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  4	
  
	
  
So Juniper created a new approach, with the Spotlight Secure
Threat Intelligence service for the SRX Series firewall.
The threat intelligence service is designed to aggregate a variety of
command and control feeds, process them through algorithms and
machine learning techniques to remove false positives and
duplicates. Threat levels are added, data is prioritized, then pushed
down to the SRX enforcement point.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  5	
  
	
  
This results in clean, actionable data that’s optimized for SRX.
This threat information is delivered through a connector to JunOS
Space Security Director, the SRX management platform, which
controls security services (e.g. Web filtering, IPS, anti-virus) as well
as security policies for all SRX instances. Threat levels can be tuned
by the security administrator, who maintains control over what data
is syndicated out to various SRX firewalls.
This means that data center, campus and branch firewalls are all
controlled from a single management platform, and can each
consume threat intelligence data from Spotlight Secure.
Juniper’s strategy is to provide the fastest and most effective way to
take action to mitigate emerging threats. That’s why we make it easy
to use right out of the box, including a a GeoIP feed as well the
command and control capability.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  6	
  
	
  
Juniper’s threat intelligence platform
also allows customers to use data
from any other source--their own
incident response team, other
detection software such as advanced
malware detection, or threat data from
shared industry intelligence sources.
Because it’s designed with an open
data model, the SRX consumes data
easily, from virtually any source, and
incorporates it into policies across the
enterprise. You can even feed data
from your incident response team or
your SIEM directly into the system.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  7	
  
	
  
One advantage of Juniper’s Threat
Intelligence platform and SRX is that all
enforcement points can consume this
data – thus protecting the entire
organization, no matter how large or
distributed the enterprise. And, data can
be right-sized to each device. For
example, some quantity and type of
data might flow to branch devices, while
other data might be more pertinent in a
data center environment.
Importantly, as the data changes (and it
changes constantly), each firewall is
updated automatically, without
needing to go through change or
commit process.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  8	
  
	
  
Campus and branch environments primarily
need protection from the “inside out” problem –
where users are connecting to various sites
and services on the internet.
With a rich source of intelligence feeds,
Juniper SRX firewalls can block or alert on
outbound connections based on threat levels.
These threat levels can be used by network or
security administrators to fine-tune the security
policy based on the need of that particular
network. In other words, policy can be defined
based on threat severity, and administrators
can be given the power to make adjustments
that befit the need.
The security administrator can establish rules
about connecting to domains, URLs or IPs
based on acceptable use policy, and/or threat
level associated with the destination.
For example, some organization may choose
to block entire geographies of IP addresses. If
a user is requesting connection with a server
that happens to be in a country or region that
your organization considers a risk, the GeoIP
feed can inform the SRX to block the request
—preventing a user from connecting.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  9	
  
	
  
The data center is similarly protected from inbound and outbound
data exchange, based on GeoIP and C&C threat information, as
well as third party or proprietary feeds.
Data center firewalls, even those that aren’t internet facing, are
continually updated via Security Director, thus able to maintain up-
to-the-minute threat protection. In fact, it takes less than a minute
to update a firewall when new threat data enters the system.	
  	
  
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  10	
  
	
  
How to get going?
If you’re an SRX user, it’s easy. The
solution is up and running right out
of the box. It runs as a virtual machine
on JunOS Space. So you can take
advantage of better protection right
now. And remember:
•  The solution is open: it consumes
virtually any data feed
•  It’s scalable: each instance can
support more than 1,000 firewalls
•  It’s built for high capacity, supporting
over a million threat data records
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  11	
  
	
  
Finally, it’s vigilant. As threat data continues
to stream in, the SRX firewalls continually are
updated. It takes less than 60 seconds to get
data from the source to the enforcement
point.
That speed is what you need to prevent
threats from turning into attacks. By
reducing the time between knowing about a
threat and actually blocking that threat, you
are a whole lot more secure.
Time is on your side.
Talk to Juniper about SRX and the Spotlight
Secure Threat Intelligence Platform.
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  11	
  
	
  
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  12	
  
	
  
©	
  2015	
  Juniper	
  Networks	
  	
  	
  page	
  12	
  
	
  

More Related Content

PPTX
Honeypots for Cloud Providers - SDN World Congress
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
PDF
ds-threat-intelligence-exchange
PDF
Intelligence Driven Threat Detection and Response
 
PPTX
Vapt life cycle
PPTX
SAM05_Barber PW (7-9-15)
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PPT
Layered Approach - Information Security Recommendations
Honeypots for Cloud Providers - SDN World Congress
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
ds-threat-intelligence-exchange
Intelligence Driven Threat Detection and Response
 
Vapt life cycle
SAM05_Barber PW (7-9-15)
The Cost of Doing Nothing: A Ransomware Backup Story
Layered Approach - Information Security Recommendations

What's hot (20)

DOCX
Nice network intrusion detection and countermeasure
PPTX
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
PDF
Cyber Security - IDS/IPS is not enough
PPTX
Cyber Security protection by MultiPoint Ltd.
PDF
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
PPTX
Network Intrusion Detection and Countermeasure Selection
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
Defense In Depth Using NIST 800-30
PDF
Alien vault sans cyber threat intelligence
PPTX
APT Monitoring and Compliance
PDF
ePlus Next-Generation Firewalls
PDF
RSA Anatomy of an Attack
PDF
Cyber Kill Chain vs. Cyber Criminals
PPT
SoleraNetworks
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PDF
FBI Memo on How to Protect Yourself from Ransomware
PPT
PPTX
Network Security Risk
PDF
The Threat Landscape & Network Security Measures
PDF
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
Nice network intrusion detection and countermeasure
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Cyber Security - IDS/IPS is not enough
Cyber Security protection by MultiPoint Ltd.
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
Network Intrusion Detection and Countermeasure Selection
Cyber Incident Response Team - NIMS - Public Comment
Defense In Depth Using NIST 800-30
Alien vault sans cyber threat intelligence
APT Monitoring and Compliance
ePlus Next-Generation Firewalls
RSA Anatomy of an Attack
Cyber Kill Chain vs. Cyber Criminals
SoleraNetworks
VAPT - Vulnerability Assessment & Penetration Testing
FBI Memo on How to Protect Yourself from Ransomware
Network Security Risk
The Threat Landscape & Network Security Measures
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
Ad

Similar to Threat intelligence platform explained (20)

PDF
Why Your Business Needs Advanced Firewall Solutions?
PDF
Firewall buyers-guide
PDF
Marlabs cyber threat management
PDF
Cisco NGFW AMP
PDF
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
PDF
eBook-enterprise-firewall-Technology.pdf
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
PDF
Top reasons why Endpoint Security should move to Cloud | Sysfore
DOC
Take back your security infrastructure
PDF
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
PDF
Changing the Security Monitoring Status Quo
 
PDF
Strategies for Data Leakage Prevention
PDF
Websense security prediction 2014
PPTX
8 Top Cybersecurity Tools.pptx
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
PDF
8 Top Cybersecurity Tools.pdf
PDF
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
DOC
Network Security Essentials for IT Professionals.doc
Why Your Business Needs Advanced Firewall Solutions?
Firewall buyers-guide
Marlabs cyber threat management
Cisco NGFW AMP
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
eBook-enterprise-firewall-Technology.pdf
Project Quality-SIPOCSelect a process of your choice and creat.docx
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Top reasons why Endpoint Security should move to Cloud | Sysfore
Take back your security infrastructure
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
Changing the Security Monitoring Status Quo
 
Strategies for Data Leakage Prevention
Websense security prediction 2014
8 Top Cybersecurity Tools.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
8 Top Cybersecurity Tools.pdf
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Network Security Essentials for IT Professionals.doc
Ad

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?

Threat intelligence platform explained

  • 1. ©  2015  Juniper  Networks      page  1     Juniper’s     Threat  Intelligence  Pla/orm   Explained         23  February  2015   In security, time matters. A lot. Consider the time it takes to identify a new threat. Sometimes it takes days, weeks, or months. Or, the time it takes to block a threat action, or stop a breach. Same thing: typically it takes days, weeks or months. During that time, the bad actor can do a lot of damage, before you’re even aware that there’s a problem. That’s why we built the Juniper Threat Intelligence Platform, which streams threat data to where it’s needed most – at the enforcement point – in only seconds. This means that moments after you know about a threat, your firewall policies can take action, and stop it from turning into a problem. In short, we can stop threats, faster. Let’s explore how this works.
  • 2. ©  2015  Juniper  Networks      page  2     The threat landscape is dynamic: constantly growing, changing, evolving. There are a multitude of threat actions that bad actors use today to execute an attack – establishing back doors, embedding root kits, delivering malware, SQL injection, brute force, DDoS attacks, spear phishing—the list is long, and the attacks often use a combination of techniques that eventually result in a breach and exfiltration of data. Often, they use a command and control server used to orchestrate remote actions -- sometimes executed on a single host, and other times executed in a peer-to-peer configuration, which makes it really hard to track. The adversaries are quick to change their network identifiers (like IP address) and behaviors so that their activities continue unabated.
  • 3. ©  2015  Juniper  Networks      page  3     In response, scores of security research firms have been established to find these threats. They make their findings available to subscribers as a feed; sometimes free and sometimes at a price. The good news is, there are plenty of choices for threat intelligence data. Some research firms are industry specific (e.g. federal government), some are technique specific (DDoS detection), some on technologies areas, such as discovering app vulnerabilities. The data is delivered to subscribers through a feed, where the data is used to enrich SIEM or other analytic engines, and/or to inform the enforcement point policy on the firewall itself. The problem is, getting the data to an enforcement point takes too long – typically days or weeks. First the data has to be converted to a usable format, then it has to be associated with the policies so that it’s actionable. It takes time. And when the source data changes (which it does every hour, every day) you have to do it all over again.
  • 4. ©  2015  Juniper  Networks      page  4     So Juniper created a new approach, with the Spotlight Secure Threat Intelligence service for the SRX Series firewall. The threat intelligence service is designed to aggregate a variety of command and control feeds, process them through algorithms and machine learning techniques to remove false positives and duplicates. Threat levels are added, data is prioritized, then pushed down to the SRX enforcement point.
  • 5. ©  2015  Juniper  Networks      page  5     This results in clean, actionable data that’s optimized for SRX. This threat information is delivered through a connector to JunOS Space Security Director, the SRX management platform, which controls security services (e.g. Web filtering, IPS, anti-virus) as well as security policies for all SRX instances. Threat levels can be tuned by the security administrator, who maintains control over what data is syndicated out to various SRX firewalls. This means that data center, campus and branch firewalls are all controlled from a single management platform, and can each consume threat intelligence data from Spotlight Secure. Juniper’s strategy is to provide the fastest and most effective way to take action to mitigate emerging threats. That’s why we make it easy to use right out of the box, including a a GeoIP feed as well the command and control capability.
  • 6. ©  2015  Juniper  Networks      page  6     Juniper’s threat intelligence platform also allows customers to use data from any other source--their own incident response team, other detection software such as advanced malware detection, or threat data from shared industry intelligence sources. Because it’s designed with an open data model, the SRX consumes data easily, from virtually any source, and incorporates it into policies across the enterprise. You can even feed data from your incident response team or your SIEM directly into the system.
  • 7. ©  2015  Juniper  Networks      page  7     One advantage of Juniper’s Threat Intelligence platform and SRX is that all enforcement points can consume this data – thus protecting the entire organization, no matter how large or distributed the enterprise. And, data can be right-sized to each device. For example, some quantity and type of data might flow to branch devices, while other data might be more pertinent in a data center environment. Importantly, as the data changes (and it changes constantly), each firewall is updated automatically, without needing to go through change or commit process.
  • 8. ©  2015  Juniper  Networks      page  8     Campus and branch environments primarily need protection from the “inside out” problem – where users are connecting to various sites and services on the internet. With a rich source of intelligence feeds, Juniper SRX firewalls can block or alert on outbound connections based on threat levels. These threat levels can be used by network or security administrators to fine-tune the security policy based on the need of that particular network. In other words, policy can be defined based on threat severity, and administrators can be given the power to make adjustments that befit the need. The security administrator can establish rules about connecting to domains, URLs or IPs based on acceptable use policy, and/or threat level associated with the destination. For example, some organization may choose to block entire geographies of IP addresses. If a user is requesting connection with a server that happens to be in a country or region that your organization considers a risk, the GeoIP feed can inform the SRX to block the request —preventing a user from connecting.
  • 9. ©  2015  Juniper  Networks      page  9     The data center is similarly protected from inbound and outbound data exchange, based on GeoIP and C&C threat information, as well as third party or proprietary feeds. Data center firewalls, even those that aren’t internet facing, are continually updated via Security Director, thus able to maintain up- to-the-minute threat protection. In fact, it takes less than a minute to update a firewall when new threat data enters the system.    
  • 10. ©  2015  Juniper  Networks      page  10     How to get going? If you’re an SRX user, it’s easy. The solution is up and running right out of the box. It runs as a virtual machine on JunOS Space. So you can take advantage of better protection right now. And remember: •  The solution is open: it consumes virtually any data feed •  It’s scalable: each instance can support more than 1,000 firewalls •  It’s built for high capacity, supporting over a million threat data records
  • 11. ©  2015  Juniper  Networks      page  11     Finally, it’s vigilant. As threat data continues to stream in, the SRX firewalls continually are updated. It takes less than 60 seconds to get data from the source to the enforcement point. That speed is what you need to prevent threats from turning into attacks. By reducing the time between knowing about a threat and actually blocking that threat, you are a whole lot more secure. Time is on your side. Talk to Juniper about SRX and the Spotlight Secure Threat Intelligence Platform. ©  2015  Juniper  Networks      page  11    
  • 12. ©  2015  Juniper  Networks      page  12     ©  2015  Juniper  Networks      page  12