Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper in the Enterprise & Introducing STRM Stefan Nilsson Marketing.

Slides:



Advertisements
Similar presentations
Strategy Planning & BPM Consulting
Advertisements

December 2010 Partner Support Service Overview. © 2010 Cisco Systems, Inc. All rights reserved. 2 Agenda Collaborative Services, Customer Response Collaborative.
Life Science Services and Solutions
MASTER OF MANAGEMENT PROGRAM MM46 PPM GRADUATE SCHOOL OF MANAGEMENT January 09, 2010 LECTURER : HENRY CHRISTIANTO., ST., MTI.
Copyright © 2014 Juniper Networks, Inc. 1 Simplified Partnering for High IQ Networks & Cloud Solutions Mindware Synergy 2014 Fadi Chami Distribution &
Enabling traceability and transparency with standards-based regulatory reporting Dr. Said Tabet Senior Technologist and Industry Standards Strategist Office.
JUNE 2007 page 1 EDS Proprietary Applications Modernization Services Modernizing the Applications Portfolio.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Technological Challenges in Banking Operation. 2 © 2005 i-flex solutions ltd. All rights reserved.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Roy Sharples The art of hustling and gun slinging within the customer-oriented culture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
The Future Communication Services Provider
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 The Collapse of the Walled Garden Paul Gainham Director Service Provider.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Amdocs Services Reach New Heights of Success
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
Copyright © 2006 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Driving Business Value with an Open Multivendor Network Strategy.
Introduction Challenges of Managing in a Network Economy.
“Business Performance Management” Corporate Performance Management “The Importance of Integrity” Facilitated by: Warren White VP – Change Acceleration.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chris Wiborg Enterprise Architecture Marketing Manager Cisco Systems.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
11 Copyright © 2009 Juniper Networks, Inc. GERRI ELLIOTT EVP STRATEGIC ALLIANCES.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
© 2006 Cisco Systems, Inc. All rights reserved.Presentation_ID 1 Transforming Server Virtualization with Cisco VN-Link Belmont Chia Consulting System Engineer.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
Management Information Systems Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 3b.
Michael Saucier - OSIsoft Cliff Reeves - Microsoft Your Portal to Performance An Introduction to the RtPM Platform Copyright c 2004 OSIsoft Inc. All rights.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
JUNIPER NETWORKS OVERVIEW March 2012 Ing Stephen Vella Computime Ltd. Head of Technology Solutions.
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Unifying Talent Management. Harnessing the Power of Workforce Intelligence in Talent Planning to Drive Business Performance.
Demand to Deliver - Value Chain Innovation Oracle High Tech Summit, May 10 th, 2011 Jon S. Chorley Vice President, Supply Chain Applications.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Digital Solutions Extension Framework Mark Myers Director, Global Solutions Go-To-Market July 12, 2016 Solution Partner Forum.
Managed Services.
Challenges and opportunities for the CFO
CIM Modeling for E&U - (Short Version)
Hybrid Management and Security
Campus Communications Fabric
How Smart Networks are Changing Corporate Networks
Transforming IT Management
Consulting Services for IoT
Securing the Threats of Tomorrow, Today.
Juniper in the Enterprise & Introducing STRM
Supply Chain Transformation Highlights
The People Ready Vision for Business in the Enterprise
DATS International Portfolio.
Industrializing AI.
Presentation transcript:

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper in the Enterprise & Introducing STRM Stefan Nilsson Marketing Manager, Nordics

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 2 2 Agenda  The Juniper journey  Evolving Enterprise Trends  High Performance Networking  Product & Technology focus  Introducing STRM

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net #789 Incorporated 1999 Acorn A Decade of Innovation M-Series T-Series SSG UAC 2010 #789 Acorn

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 4 Operational Excellence Partner and Shareholder Value 5,000+ Dedicated Employees $2.7B Cash and Investments $120M Quarterly R&D Engine Leader in High-Performance Networking Well Positioned For Growth

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 5 Serving 20,000+ Customers Globally U.S. Dept of Labor

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 6 6 Enterprise trends & How IT needs to be aligned with business processes

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 7 Enterprise Trends Drive IT Requirements *The Economist, 2006 **Gartner, 2006 ***Information Week, 2006 ****McKinsey, 2006 New Business Directions Drive New IT Requirements 1.Performance for Business Speed 2.Risk management for Business Safety 3.Open standards and partnerships for Business Flexibility High Performance IT Organizations Differ ****  Aggressive adopters of new technology  Spend less time fixing systems  Manage to more performance metrics Boosting Network Performance Increases Productivity *** Executives Expect IT to Drive Competitive Advantage ** Speed of Execution on Strategy and Innovation is Top of Mind *

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 8 More than Ever, The Network is Critical to Business Success  The network is a strategic asset that should innovate businesses and business processes  Delivering strategic and tactical business results should not require unreasonable trade-offs Speed is the New Currency Dynamic Business Models Network Critical to Success CountriesCompaniesIndividuals

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 9 Aligning IT with the Business is Essential  Challenges Control operational costs, maximize investments, simplify operations Manage threats, control access Assure service levels and application performance Mitigate IT risk  Opportunities Pursue opportunity, enable growth, respond to changes Innovate to deliver services that create competitive advantage Change the rules and win the game Stay in the game The CIO Dilemma $ Time Grow & Transform Transform Transform IT Budgets Run the Business Run the Business

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 10 High-Performance Businesses View the Network as Critical to Success  Expedites workforce productivity and customer loyalty  Supports revenue growth and profitability goals  Ensures Risk Management by providing the visibility to react and respond to unplanned events and achieve preventative goals  Operational improvements that enable cost reductions and ensure quick time-to-value  Believe IT is strategic to their business, customers and differentiation from competitors  Must respond to new opportunities and challenges in the marketplace  Aggressive adopters of new technology*  Spend less time fixing systems*  Manage to more performance metrics* High-Performance Businesses Profile Benefits of a High-Performance Network Infrastructure * Gartner, 2006

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Product & Technology focus in the Enterprise market place

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 12 Product Strategy Steer Products Into a Naturally Integrated Portfolio Cutting-edge engineering Performance at scale Reliability Power efficiency Leverage: Build once - use multiple times Modular integration of services Commonality: Gradually converge on to a common OS (JUNOS), policy, and network mgmt

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 13 Enterprise Product & Technology focus  Security (Firewalls & IDP’s)  Remote Access (Secure Access)  Unified Access Control (NAC solutions)  Enterprise Routing (J-series)  WAN acceleration (WX-series)  JUNOS operating system  Ethernet Switching (EX-series) NEW!  Log & Event Management (STRM) NEW! INTEGRATION IS KEY!

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 14 Policy and Control (UAC) We Have a Complete Portfolio of Products Branches & Campuses Datacenter Datacenter of Partner or CSP Router Switches Secure Router Network Mgmt Router Switches FWVPN + IDP WAN Opt SSL VPN Remote Workers Service Provider Core / Edge Routers FWVPN + IDP SSL VPN

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 15 Remote Access – SSL VPN Intrusion PreventionWAN Optimization Firewall / IPSec VPN Gartner Magic Quadrants Show Juniper is a Proven Leader in All Categories The External Perception of Our Products Is Excellent

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 16 Industry-Leading Security Power & Cooling Efficiency Carrier-Class Reliability Performance at Scale Single OS, Policy & Mgmt Our Differentiation

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 17 Future Direction An aggressive strategy to deliver the best products, integrated solutions and services at the best economics The “preferred choice” for high-performance businesses

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 18 Juniper Security Threat Response Manager (STRM)

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 19 Customer Challenges  IT “information” overload Flood of logged events from many “point” network and security devices Lack of expertise to manage disparate data silos & tools  Compliance mandates Industry specific regulations mandating security best practices Internal IT “risk” assessment programs  Evolving internal and external threats Insider abuse, theft of intellectual property Complex integrated attacks Dispersed Threats Industry Regulations IT Overload

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 20 Security Information & Event Management Introducing Junipers SIEM/NBAD Solution STRM – “Security Threat Response Manager”  STRM Key application features Log Management Provides long term collection, archival, search and reporting of event logs, flow logs and application data Security Information and Event Management (SIEM) Centralizes heterogeneous event monitoring, correlation and management Network Behavior Anomaly Detection (NBAD) Discovers aberrant network activities using network and application flow data Integrates Mission Critical Network & Security Data Silos Network Behavior Analysis Log Management STRM

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 21 STRM’s Key Value Proposition Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Compliance and Policy Safety Net Complements Juniper’s Enterprise Mgmt Portfolio Juniper’s STRM Appliance Enterprise Value

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 22 STRM Architecture  STRM – Real time network & security visibility  Data collection provides network, security, application, and identity awareness  Embedded intelligence & analytics simplifies security operations  Prioritized “offenses” separates the wheat from the chafe  Solution enables effective Threat, Compliance & Log Management

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 23 Reporting  220+ Out of the box report templates  Fully customizable reporting engine: creating, branding and scheduling delivery of reports  Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA  Reports based on control frameworks: NIST, ISO and CoBIT

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 24 STRM Key Benefits  Converged network security management console Integrates typically silo’d network & security data  Network, security, application, & identity awareness Unrivaled data management greatly improves ability to meet IT security control objectives  Advanced analytics & threat detection Detects threats that other solutions miss  Compliance-driven capabilities Enables IT best practices that support compliance initiatives  Scalable distributed log collection and archival Network security management scales to any sized organization

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 25 STRM Products STRM500 STRM2500 STRM EPS 15k F 500EPS 15kF 1000EPS 50 & 100k F 2500EPS 50 & 100k F 5000EPS 100 & 200k F STRM - FP EPS 100 & 200k F STRM - EP Small Enterprise Small Medium Enterprise Large enterprises &Service Providers Events per sec Flows per Min

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 26 Thank You!

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 27 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 27