The purpose o this technical white paper is to highlight, in detail, some of the techniques that Sprint uses to control packet flows and protect its network core against security risks associated with such threats as DDos and other types of attacks. In addition, it provides an overview of some of the security solutions available to mitigate network threats against high-profile Internet-based businesses. Because the Sprint network is built end-to-end with Cisco Systems equipment, and thus many of Sprint's services posses the Cisco Powered Network designation, many of the techniques in this paper are based on Cisco technology and innovation.
Vendors (Listed Alphabetically):
Advertising Info |
Contact Us |
Submit a White Paper