Juniper beefs up Mykonos Web Security to tackle more online threats

Juniper Networks has upgraded its recently acquired Mykonos Web Security Software to widen the range of attacks the technology can defend against.

The latest version, released Wednesday, has 30 new features and extensions, making the upgrade significantly better than the older version. Besides addressing a wider range of hacking techniques, the new software is also easier to configure and can handle larger traffic volumes.Ã'Â

"It's a good, strong incremental upgrade," Jeff Wilson, an analyst at Infonetics Research, said.

Among the additional attacks the upgrade can counteract is "directory traversal," which accounts for about a third of all attacks, according to Edward Roberts, director of product marketing at Juniper. The hacker typically spiders a site's directories looking for files that are accessible because of security flaws.

[See also:Ã'Â 2012: The new age of malware]

When Mykonos detects this type of attack, it fools the hacker's directory scanners into believing files are available, so that they will scan endlessly without obtaining information. At the same time, Mykonos gathers information about the attack, so customers can build better defenses.

Another attack addressed in the upgrade is "brute force authentication," Roberts said. If the hacker has a user ID, he will run scripts to try various combinations of commonly used passwords to try to break into the site. When such an attack is detected, Mykonos locks out the hacker's machine, so even if it guesses the password it still won't be able to enter. In the meantime, the real user will be able to access the system.

Finally, the upgrade offers vulnerability protection against third-party web applications embedded in a site. For example, if a site uses the blogging tool WordPress, Mykonos will automatically defend against attacks targeting known vulnerabilities.

In general, Mykonos inserts what Juniper calls "detection points" into web application code that fools hackers into believing there are vulnerabilities in the site. When an attack on one of these bogus flaws occurs, Mykonos inserts a cookie into the hacker's computer in order to build a profile. Customers have the option of monitoring the hacker's work for as long as they want, before blocking his system from the site.

Besides addressing more types of attacks, the latest upgrade also can handle more Web traffic. The previous version was limited to 1 gigabit of traffic per second. The upgrade lets customers run the software in clusters to handle much higher volumes, Roberts said. This makes the product more useful to very large Web sites in telecom, financial services and e-commerce.

Finally, the upgrade includes configuration wizards to make the setup process easier. "Rather than having to know how to code to get it to go, it's very graphical," Roberts said.

Juniper, the second-largest maker of network equipment, acquired privately held Mykonos Software in February for $80 million in cash. The so-called intrusion deception technology complements Juniper's firewalls, gateways and other security products.

The latest update will likely be the first of many incremental upgrades meant to attract enterprise customers, Wilson said. "[Mykonos] is still in the proving stages to a lot of companies, because they're getting something where enforcement comes from a different place," Wilson said. "Nobody else is doing this deception-based enforcement."

Mykonos Web Security Software has a retail subscription price of $175,000 a year.



Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Antone Gonsalves

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts