Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 2 Aligning IT with the Business is Essential Challenges Control operational costs, maximize investments, simplify operations Manage threats, control access Assure service levels and application performance Mitigate IT risk Opportunities Pursue opportunity, enable growth, respond to changes Innovate to deliver services that create competitive advantage Change the rules and win the game Stay in the game The CIO Dilemma $ Time Grow & Transform Transform Transform IT Budgets Run the Business Run the Business
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 3 Customer Challenges IT “information” overload Flood of logged events from many “point” network and security devices Lack of expertise to manage disparate data silos & tools Compliance mandates Industry specific regulations mandating security best practices Internal IT “risk” assessment programs Evolving internal and external threats Insider abuse, theft of intellectual property Complex integrated attacks Dispersed Threats Industry Regulations IT Overload
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 4 Security Information & Event Management Introducing Junipers SIEM/NBAD Solution STRM – “Security Threat Response Manager” STRM Key application features Log Management Provides long term collection, archival, search and reporting of event logs, flow logs and application data Security Information and Event Management (SIEM) Centralizes heterogeneous event monitoring, correlation and management Network Behavior Anomaly Detection (NBAD) Discovers aberrant network activities using network and application flow data Integrates Mission Critical Network & Security Data Silos Network Behavior Analysis Log Management STRM
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 5 STRM’s Key Value Proposition Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Compliance and Policy Safety Net Complements Juniper’s Enterprise Mgmt Portfolio Juniper’s STRM Appliance Enterprise Value
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 6 STRM Architecture STRM – Real time network & security visibility Data collection provides network, security, application, and identity awareness Embedded intelligence & analytics simplifies security operations Prioritized “offenses” separates the wheat from the chafe Solution enables effective Threat, Compliance & Log Management
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 7 Reporting 220+ Out of the box report templates Fully customizable reporting engine: creating, branding and scheduling delivery of reports Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA Reports based on control frameworks: NIST, ISO and CoBIT
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 8 STRM Key Benefits Converged network security management console Integrates typically silo’d network & security data Network, security, application, & identity awareness Unrivaled data management greatly improves ability to meet IT security control objectives Advanced analytics & threat detection Detects threats that other solutions miss Compliance-driven capabilities Enables IT best practices that support compliance initiatives Scalable distributed log collection and archival Network security management scales to any sized organization
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 9 STRM Products STRM500 STRM2500 STRM EPS 15k F 500EPS 15kF 1000EPS 50 & 100k F 2500EPS 50 & 100k F 5000EPS 100 & 200k F STRM - FP EPS 100 & 200k F STRM - EP Small Enterprise Small Medium Enterprise Large enterprises &Service Providers Events per sec Flows per Min
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 10 Thank You!
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11