1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 Distributed Enterprise – Channel Proposition Jonathan Hallatt 22 nd July 2009.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Module 1: Demystifying Software Defined Networking Module 2: Realizing SDN - Microsoft’s Software Defined Networking Solutions with Windows Server 2012.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Unified Logs and Reporting for Hybrid Centralized Management
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
LB VIP:Input Endpoint Internal Endpoint foo.cloudapp.net  VIP.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Data Center Network Redesign using SDN
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
SRX Series Services Gateways
Application Delivery Controller
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
1 MICHAEL BANIC VP ENTERPRISE MAKETING. THE NEW DATA CENTER NETWORK.
Application Delivery: The Next Big Thing April, 2007.
CustomerSegment and workloads Your Datacenter Active Directory SharePoint SQL Server.
NEXT GENERATION FIREWALLS Why NGFWs are Next-Generation FWs?
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Network security Product Group 2 McAfee Network Security Platform.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
The role of networking in the Dynamic Data Center Niels Friis-Hansen Senior IT Specialist, CCIE IBM Communication & Collaboration.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Going Hybrid – part 1 Moving to Hybrid Cloud with Windows Azure Virtual Machines & System Center 2012 R2.
JUNIPER NETWORKS OVERVIEW March 2012 Ing Stephen Vella Computime Ltd. Head of Technology Solutions.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Marin Franković MVP: SCCDM Algebra visoko učilište What’s new in Azure for IT Pro.
Alfresco Enterprise on Azure Shah Rahman Founder and CEO, CloudlyIO.
A Better Way Huawei Financial Agile Network Solution Success Cases.
Alfresco on Azure Shah Rahman Founder and CEO, CloudlyIO.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Enterprise Network Security Threats that are Overlooked.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
Blue Coat Cloud Continuum
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
IXIA + FIREEYE SECURITY BATTLECARD
Designing Cisco Data Center Unified Fabric
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
STEPS TO A CLOUD READY DATA CENTER
The Cloud Connection Company
Network Security Solution
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Real-time protection for web sites and web apps against ATTACKS
Juniper and IBM Delivering Value Together
Introduction to the Junos Operating System
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Virtualization & Security real solutions
Replace with Application Image
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Software-Defined Secure Networks in Action
Software-Defined Secure Networks in Action
Introduction to the 3rd Gen Fortinet Security Fabric
AT&T Firewall Battlecard
Presentation transcript:

1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING

2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS

3 NEW TARGETS Virtual Machines Cloud Resources New Devices

4 Cyberattacks on Georgian Web Sites Are Reigniting a Washington Debate WASHINGTON – The cyberattacks in Georgia are re- energizing a debate over whether the laws of war apply in cyberspace. Among the biggest questions: When is a cyberattack an act of war? NEW THREATS DATACENTERS

5 WHAT IS NEEDED? Security services must scale dynamically as datacenters consolidate Application visibility & Control Who is accessing my network, from where, and why? Automate security operations to simplify and reduce risk SCALE APPLICATION SECURITY IDENTITY SIMPLIFY

6 JUNIPER’S SOLUTION

7 EVERY CUSTOMER AND LOCATION HAS A UNIQUE SECURITY BALANCE Control Data separation & user experience Capacity Throughput & response time Connectivity Users and devices

8 Needs:  Low to moderate connections  Low to moderate capacity  Firewall  IPsec VPN  IPS  UTM: Anti-virus/spam/web security  High connections  High capacity  Firewall  IPsec VPN  IPS  Virtual Server Security

9 THE LEGACY NETWORK SSL VPN Firewall IPSec VPN IPS L2/L3 Switch L2 Switch

10 CONSOLIDATE & VIRTUALIZE SECURITY APPLIANCES SSL VPN Firewall IPSec VPN IPS L2/L3 Switch SRX5800 L2 Switch

11 SECURITY APPLIANCE CONSOLIDATION RATIOS SEEN IN THE FIELD Consolidate, then additional capacity and service add-ons. 102 to

12 SECURITY IS BUILT-IN TO PROVIDE DYNAMIC SECURITY AT SCALE Dynamic allocation of security services within a single platform Scale to 120 Gbps/platform Automated firewall changes based on user visibility and policy Secure shifting traffic flows with a single platform FC SAN MX Series EX8216 SRX5800 ServersStorage

13 SERVICE OFFERINGS CONTINUE TO GROW SRX3600 SRX5800 SRX210SRX240 SRX650 SRX100 SRX5600 YESTERDAY’S BOX IS TOMORROW’S FEATURE PerimeterContentApplication FirewallIntrusion detectionAppDOS IPSec VPNAnti-Virus (Kaspersky/ Sophos)AppTrack SSL VPNURL filtering (Websense)Identity and application coordination Server virtualization security (Altor)Anti-spam NATMalware (FireEye)

14 TODAY’S APPSECURE PORTFOLIO Identity Threats AppSecure UserApp MORE TO COME… (Malware) AppTrack Discrete Data Analysis Business Analysis Deep packet intelligence Protoc ol IP Addr Port Data SAP Size Joe What application? What user? User location? User device? AppDOS Server connection monitoring Bot/client classification Protocol analysis

15 NEW SRX SERVICE: APPTRACK Discrete Data Analysis Business Analysis Deep packet intelligence Protoc ol IP Addr Port Data SAP Size Joe What application? What user? User location? User device? Unparalleled application visibility

16 WE CONTINUE TO BEAT COMPETITORS DATACENTER SECURITY BRANCH INTEGRATED SECURITY ENDPOINT ACCESS CONTROL TOTAL NETWORK SECURITY Juniper #1 at 43.7% share— up 9.2 points Y/Y Juniper #2 at 21% share— up 5.4 points Y/Y Juniper #1 at 31.7% share— up 3.4 points Y/Y Juniper #2 at 12.6% share— up 2.3 points Y/Y Source: Infonetics

17  Use the Red Carpet resources to determine migration timing  Get SreenOS experts trained on JUNOS  Offer SRX instead of new application specific hardware Installed BaseNew Customers  Use SRX to consolidate the conga line of network devices  Position SRX to address datacenter consolidation & virtualization security challenges  Sell the value of a consistent platform CUSTOMER SPECTRUM

18 THE NEW NETWORK FOR SECURE DATA CENTERS DELIVERS BIG ADVANTAGES DYNAMIC SECURITY SECURITY TAILORED TO APPLICATION USAGE IDENTITY BASED ARCHITECTURE