NETWORK AVAILABILITY

DDoS Protection

Detect and respond to DDoS threats quickly. Verisign’s cloud-based monitoring and mitigation services provide a scalable solution to today’s increasingly complex DDoS attacks.

Request More Information

Hybrid Distributed Denial of Service (DDoS) Protection from Juniper and Verisign

Network and System Availability and Performance through Real-Time Adaptive Mitigation

The growing frequency and sophistication of Distributed Denial of Service (DDoS) attacks pose a major threat to maintaining availability of these systems. And while hybrid solutions have emerged, most lack the combined capabilities of best-in-class on-premise and cloud mitigation.

Juniper and Verisign have teamed to provide a hybrid solution for DDoS protection that effectively combats the growing diversity of DDoS attacks. The solution consists of network and application-layer protection provided by Juniper’s on-premise DDoS Secure and Verisign’s cloud-based DDoS Protection Service. The hybrid solution adjusts the parameters used for identifying and filtering potentially malicious traffic based on the response and performance of the protected applications.

Real-Time Adaptive Mitigation

Real-Time Adaptive Mitigation refers to the ability of certain mitigation technologies to change the parameters used for identifying and filtering potentially malicious traffic based on the response and performance of the application. Successful mitigation of increasingly sophisticated attacks requires much more than simple blocking of malicious IP addresses. Real-Time Adaptive Mitigation technologies use a combination of intelligence about inbound sources along with outbound application/resource response and performance impact to adapt quickly to the evolving threat. Two examples of Real-Time Adaptive Mitigation technology in the DDoS mitigation space include Juniper’s algorithm-based scoring system (“CHARM”) and Verisign’s Athena platform (specifically the proxy component), both of which ultimately improve filtering of malicious traffic while reducing false positives that turn away legitimate site users and reduce operational involvement to manage mitigation of evolving attacks.