Juniper Software-Defined Secure Network

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Security Life Cycle for Advanced Threats
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.
MSIT 458: Information Security & Assurance By Curtis Pethley.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Dell Connected Security Solutions Simplify & unify.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Sky Advanced Threat Prevention
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
Surveillance and Security Systems Cyber Security Integration.
Securing Your Network with Juniper
Hybrid Management and Security
Understanding DATA LOSS PREVENTION
Cybersecurity - What’s Next? June 2017
CIM Modeling for E&U - (Short Version)
Do you know who your employees are sharing their credentials with
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Cybersecurity Trends for 2018
Active Cyber Security, OnDemand
Juniper and IBM Delivering Value Together
Speaker’s Name, SAP Month 00, 2017
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Jon Peppler, Menlo Security Channels
Bill Banks | Security Engineer
Information Security: Risk Management or Business Enablement?
Myths About Web Application Security That You Need To Ignore.
2018 Real Cisco Dumps IT-Dumps
Company Overview & Strategy
How to build a defense-in-depth
Azure AD Deployment Are you maximising your Azure AD investment?
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Software-Defined Secure Networks in Action
Check Point Connectra NGX R60
Securing the Threats of Tomorrow, Today.
CRITICAL INFRASTRUCTURE CYBERSECURITY
Panda Adaptive Defense Platform and Services
Secure once, run anywhere Simplify your security with Sophos
NSX Data Center for Security
Software-Defined Secure Networks in Action
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Protection
Microsoft Data Insights Summit
Security intelligence: solving the puzzle for actionable insight
AT&T Firewall Battlecard
Information Protection
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

Juniper Software-Defined Secure Network Haitham Saif

54% 60% 75% $11M Market Situation of the data breaches were related to compromised servers 60% of breaches were took weeks or months to discover 75% of attacks are driven by financial motives $11M average cost due to data breach

Market Situation Hacking is a multinational enterprise Security incident every 7 minutes Cost increasing per security incident $ Data breaches – 6 successful per day Source: Verizon 2015 Data Breach Investigation Report.

Network Security Complexity Multi-vendor, multi-vector solutions deployed Layered on top of the network Security tools lagging behind attacker ingenuity Unmanaged risk to business outcomes and operations App Servers Application Security Unified Threat Management Firewalls Data Loss Prevention Inline Intrusion Prevention LAG Core Centralized DHCP and Other Services Inline Anti Prevention

Threat Intelligence Feeds Actionable threat intelligence: Command and control threats GeoIP location information Open Scalable High capacity Effective Adaptive Threat Data Cloud Other threat intelligence Command & control GeoIP feed Device Management Security Management Cloud Data Connector SRX

A Change in Mindset Realize threats are everywhere. They are already inside. They walked in your front door Recognize perimeter security isn’t enough Detection and Enforcement should be enabled anywhere Acknowledge security is everyone’s problem – horizontal and vertical 6

The Software-Defined Secure Network Operate network as single enforcement domain, every element becomes a policy enforcement point Create and centrally manage intent based policy directly aligned to business objectives Gather & distribute threat intelligence, from multiple sources – know who the bad guys are faster Leverage cloud economics for real time analysis – find the bad guys faster Enforce policy to the threat feed information, real time across the network – adapt the network real-time Detection Policy Enforcement 7

SDSN Innovation Summary Simple Single network-wide policy manager Reduce risk of error and overlap function Open Most advanced threat detection capabilities by integration threat data from Juniper and 3rd party Comprehensive Adapt zero-trust and micro-segmentation to enforce network-wide policy Scalable Utilize all network resources to enforce policy and detect threats