1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry,

Slides:



Advertisements
Similar presentations
Cloud Communications Ecosystem Panel Alan Bugos, Vice President of Technology October 15th, 2013.
Advertisements

1 Making the Desktop Dynamic. 2 What does RES do? »IT as a Service & Automation »Context Aware Security »Dynamic Desktop Delivery »Follow-me Secure Data.
VCS 5.0 for VMware ESX.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Communicating over the Network
Mid-market server campaign – thru partner presentation: Slide for presenter only: do not show Speaker: Partner Title of Presentation: Giving you the power.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Govern the Flow of Data: Moving from Chaos to Control
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
| Copyright © 2009 Juniper Networks, Inc. | 1 Distributed Enterprise – Channel Proposition Jonathan Hallatt 22 nd July 2009.
Chapter 1: Introduction to Scaling Networks
December 2010 Partner Support Service Overview. © 2010 Cisco Systems, Inc. All rights reserved. 2 Agenda Collaborative Services, Customer Response Collaborative.
Agenda Small BusinessMid-market 2 Opportunity to Grow Your Business IT Transformation 4.
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
Public Thomas Mejtoft Exjobbsredovisning Teknisk fysik, Umeå universitet
Enabling business beyond the corporate network.
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
© 2009 VMware Inc. All rights reserved Confidential Overview: vCenter Server Heartbeat Q
© 2012 National Heart Foundation of Australia. Slide 2.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Beyond virtualization  Complete virtualization platform  Improved scalability and performance.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Chapter 7: Intranet LAN Design
Addition 1’s to 20.
25 seconds left…...
Week 1.
We will resume in: 25 Minutes.
Chapter 12: Project Management and Strategic Planning Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Connecting LANs, Backbone Networks, and Virtual LANs
Microsoft Volume Licensing
Scalable Rule Management for Data Centers Masoud Moshref, Minlan Yu, Abhishek Sharma, Ramesh Govindan 4/3/2013.
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
What is a Virtual Tap? Intelligent Access and Monitoring Architecture Solutions.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Data Center Network Redesign using SDN
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SRX Series Services Gateways
1 MICHAEL BANIC VP ENTERPRISE MAKETING. THE NEW DATA CENTER NETWORK.
CONNECTED VIRTUALISATION WESTCON 5-DAAGSE / SALES 13 FEBRUARY 2012 Dennis de Leest Security Systems Engineer.
11 Copyright © 2009 Juniper Networks, Inc. ANDY INGRAM VP FST PRODUCT MARKETING & BUSINESS DEVELOPMENT.
JUNIPER TECHNOLOGY UPDATE Debbie Montano Jan 31, 2011.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
©2015 EarthLink. All rights reserved. Private Cloud Hosting Create Your Own Private IT Environment.
DaaS (Desktop as a Service) Last Update: July 15 th, 2015.
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.
Private Cloud Hosting. IT Business Challenges I need to extend my on-premises virtualized environment to utilize the Cloud and manage the entire environment.
Customer references Data Centre solutions.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Copyright © 2008 Juniper Networks, Inc. 1 Simplifying the Data Center Network Advancing the Fundamentals and Economics of Networking.
PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved Aruba Networks.
JUNIPER NETWORKS OVERVIEW March 2012 Ing Stephen Vella Computime Ltd. Head of Technology Solutions.
Chapter 6: Securing the Cloud
STEPS TO A CLOUD READY DATA CENTER
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Concept of VLAN (Virtual LAN) and Benefits
Presentation transcript:

1 Copyright © 2012 Juniper Networks, Inc. Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry, Media & Local Gov

2 Copyright © 2012 Juniper Networks, Inc. AGENDA The Cloud Cut Cost on MPLS Secure the Virtualized World Thinking of the Cloud Network has Changed Cloud Ready Network MPLS vs Internet Service Provider Solutions for Enterprise The Physical Firewall is not Enough Security = Portfolio of Solutions

3 Copyright © 2012 Juniper Networks, Inc. Blank Slide THE CLOUD

4 Copyright © 2012 Juniper Networks, Inc. THINKING OF THE CLOUD?  Decreasing Cost Cloud  Increased Reliability  More Offering  Or already Connected

5 Copyright © 2012 Juniper Networks, Inc. ROLE OF NETWORK HAS CHANGED Is your network cloud Ready! Continuity Inefficient use of the Network Poor Network Visibility Inconsistent User Experience Security (BYOD) Legacy Three Tier Data Center Up to 75% of traffic EW

6 Copyright © 2012 Juniper Networks, Inc. THE CLOUD READY NETWORK MEANS 1.Continuity – 99,999% (or 100%-10 min) - BOTH Cloud and Your Network Infrastructure 2.Efficient use of Network – 2 Tier 3.Manageability / Visibility – Visibility on application level to optimize network / compliancy 4.Consistent Performance / Experience anywhere on any device

7 Copyright © 2012 Juniper Networks, Inc. EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Redundancy in FW (SRX) Carrier Grade Hardware (SRX/EX/MX) JUNOS – Proven Service Provider OS Continuity Virtual Chassis Pay as you Grow Extend VC over Distance Throughput / € Efficiency SRX – App Secure Central Management - Space Secure Analytics Application WLAN - BYOD Control UAC Users

8 Copyright © 2012 Juniper Networks, Inc. CLOUD ENABLES YOU TO  Move LAN away from commodity  Discuss Multiple Solutions  Technological Advantages become important  Advise on the applications which are not CLOUD ready! – another opportunity

9 Copyright © 2012 Juniper Networks, Inc. Blank Slide CUT COST ON MPLS

10 Copyright © 2012 Juniper Networks, Inc. MPLS VS INTERNET MPLS Uptime Bandwidth Utilization Managed with SLA’s Simplification NW INTERNET Improved SLA’s High Bandwidth Availability INTERNET Latency Complexity MPLS Expensive Security Partners not Flexible

11 Copyright © 2012 Juniper Networks, Inc. SIMILARITIES IN RFP’S / FEEDBACK MKB+ Improved Security: BYOD NGF Take back Control:Central Management – Visibility Limited Solutions / Lack of Flexibility

12 Copyright © 2012 Juniper Networks, Inc. Blank Slide EXAMPLE

13 Copyright © 2012 Juniper Networks, Inc. SP SOLUTIONS FOR THE ENTERPRISE 1.Even if customer decides to keep MPLS – SRX can be placed in network 2.Create Overlay Network as Contracts Run Out 3.Juniper’s Core = Service Provider Solutions 4.Complete and Proven Portfolio

14 Copyright © 2012 Juniper Networks, Inc. EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Best possible routing functionality on a firewall Carrier Grade Hardware JUNOS – Proven Service Provider OS SRX Central Granular Management Control Applications Simplified Roll Out SPACE Connect Any Device from Anywhere Riverbed MAG

15 Copyright © 2012 Juniper Networks, Inc. Blank Slide SECURE THE VIRTUALIZED WORLD

16 Copyright © 2012 Juniper Networks, Inc. MEGA TREND – SERVER VIRTUALIZATION Source: IDC Capital Savings

17 Copyright © 2012 Juniper Networks, Inc. FIREWALL / VIRTUAL - SECURITY Firewall Secure the Physical Network IPS NGF VGW Secures the VM Policy Enforcement on Migrating VM’s Synchronizes with SRX

18 Copyright © 2012 Juniper Networks, Inc. WHAT ABOUT VIRTUAL MACHINES? Physical Network Virtual Network Physical Security Is “Blind” to Traffic between Virtual Machines VM1VM2VM3 ESX/ESXi Host Firewall/IDS Sees/Protects All Traffic between Servers HYPERVISOR Virtual Switch

19 Copyright © 2012 Juniper Networks, Inc. Purpose Built Virtual Security VM1VM2VM3 VS ESX/ESXi Host Virtual Security Layer Traditional Security Agents VLANs & Physical Segmentation VM1VM2VM3 VS ESX/ESXi Host VM1VM2VM3 VS ESX/ESXi Host Regular Thick Agent for FW & AV HYPERVISOR APPROACHES TO SECURING VIRTUAL NETWORKS 123

20 Copyright © 2012 Juniper Networks, Inc. FIREWALL PERFORMANCE

21 Copyright © 2012 Juniper Networks, Inc. SECURE THE VM - EXAMPLES Cloud Service Provider Shipping Company CARE Prevent Customer Data Migration within VM’s Protect Customer Data To Proof SLA’s Protect VDI Users at Best Possible Performance Maintenance Tool VM’s Audit Tool Audit Tool for Electronic Client Records Protect Data Control Data on VM Level

22 Copyright © 2012 Juniper Networks, Inc. REAL LIFE drugs-through-antwerp-port-europol-reveals/

23 Copyright © 2012 Juniper Networks, Inc. SRX Series Physical Hypervisor vGW Series VM vGW Virtual Gateway Management and Security Services Security Design Security Threat Response Manager STRM Services Virtual Firewall IPS DoS Prevention AppSecure DoS JUNIPER SECURITY SOLUTION THAT SPANS PHYSICAL AND VIRTUAL NETWORKS

24 Copyright © 2012 Juniper Networks, Inc. SUMMARY1 Recurring Revenue 2 Drivers Seat 3 Portfolio 4 Services