Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)

Slides:



Advertisements
Similar presentations
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Advertisements

BalaBit Shell Control Box
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Bill McClanahan – Principal Business Consultant LPS Integration.
Technological Challenges in Banking Operation. 2 © 2005 i-flex solutions ltd. All rights reserved.
Security Controls – What Works
Unified Logs and Reporting for Hybrid Centralized Management
Viewpoint Consulting – Committed to your success.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper in the Enterprise & Introducing STRM Stefan Nilsson Marketing.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
The Changing World of Endpoint Protection
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Network security Product Group 2 McAfee Network Security Platform.
© 2010 IBM Corporation Business Analytics software Business Analytics Editable Text Editable Text Editable Text.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 STRM SKU’s & Pricing Update NM PLM team May 2008.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Why SIEM – Why Security Intelligence??
Centralized Logging and Reporting for Managed Security Services Providers.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
Viewtrust software overview
Information Security Program
Challenges and opportunities for the CFO
CIM Modeling for E&U - (Short Version)
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
Introduction to a Security Intelligence Maturity Model
Active Cyber Security, OnDemand
StealthWatch: Network Visibility & Security Intelligence BATTLE CARD
Transforming IT Management
Network Packet Broker Market
Consulting Services for IoT
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Application Portfolio Optimization
Securing the Threats of Tomorrow, Today.
Cloud Analytics for Microsoft Azure
Juniper in the Enterprise & Introducing STRM
XtremeData on the Microsoft Azure Cloud Platform:
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
A 5-minute overview of ADAudit Plus
Improve Patient Experience with Saama and Microsoft Azure
Cybersecurity ATD technical
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Supply Chain Transformation Highlights
The People Ready Vision for Business in the Enterprise
DATS International Portfolio.
Industrializing AI.
The MobileIron® Threat Detection difference:
Customer 360.
Presentation transcript:

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 2 Aligning IT with the Business is Essential  Challenges Control operational costs, maximize investments, simplify operations Manage threats, control access Assure service levels and application performance Mitigate IT risk  Opportunities Pursue opportunity, enable growth, respond to changes Innovate to deliver services that create competitive advantage Change the rules and win the game Stay in the game The CIO Dilemma $ Time Grow & Transform Transform Transform IT Budgets Run the Business Run the Business

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 3 Customer Challenges  IT “information” overload Flood of logged events from many “point” network and security devices Lack of expertise to manage disparate data silos & tools  Compliance mandates Industry specific regulations mandating security best practices Internal IT “risk” assessment programs  Evolving internal and external threats Insider abuse, theft of intellectual property Complex integrated attacks Dispersed Threats Industry Regulations IT Overload

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 4 Security Information & Event Management Introducing Junipers SIEM/NBAD Solution STRM – “Security Threat Response Manager”  STRM Key application features Log Management Provides long term collection, archival, search and reporting of event logs, flow logs and application data Security Information and Event Management (SIEM) Centralizes heterogeneous event monitoring, correlation and management Network Behavior Anomaly Detection (NBAD) Discovers aberrant network activities using network and application flow data Integrates Mission Critical Network & Security Data Silos Network Behavior Analysis Log Management STRM

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 5 STRM’s Key Value Proposition Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Compliance and Policy Safety Net Complements Juniper’s Enterprise Mgmt Portfolio Juniper’s STRM Appliance Enterprise Value

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 6 STRM Architecture  STRM – Real time network & security visibility  Data collection provides network, security, application, and identity awareness  Embedded intelligence & analytics simplifies security operations  Prioritized “offenses” separates the wheat from the chafe  Solution enables effective Threat, Compliance & Log Management

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 7 Reporting  220+ Out of the box report templates  Fully customizable reporting engine: creating, branding and scheduling delivery of reports  Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA  Reports based on control frameworks: NIST, ISO and CoBIT

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 8 STRM Key Benefits  Converged network security management console Integrates typically silo’d network & security data  Network, security, application, & identity awareness Unrivaled data management greatly improves ability to meet IT security control objectives  Advanced analytics & threat detection Detects threats that other solutions miss  Compliance-driven capabilities Enables IT best practices that support compliance initiatives  Scalable distributed log collection and archival Network security management scales to any sized organization

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 9 STRM Products STRM500 STRM2500 STRM EPS 15k F 500EPS 15kF 1000EPS 50 & 100k F 2500EPS 50 & 100k F 5000EPS 100 & 200k F STRM - FP EPS 100 & 200k F STRM - EP Small Enterprise Small Medium Enterprise Large enterprises &Service Providers Events per sec Flows per Min

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 10 Thank You!

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11