Download presentation
Presentation is loading. Please wait.
1
Juniper Software-Defined Secure Network
Haitham Saif
2
54% 60% 75% $11M Market Situation
of the data breaches were related to compromised servers 60% of breaches were took weeks or months to discover 75% of attacks are driven by financial motives $11M average cost due to data breach
3
Market Situation Hacking is a multinational enterprise
Security incident every 7 minutes Cost increasing per security incident $ Data breaches – 6 successful per day Source: Verizon 2015 Data Breach Investigation Report.
4
Network Security Complexity
Multi-vendor, multi-vector solutions deployed Layered on top of the network Security tools lagging behind attacker ingenuity Unmanaged risk to business outcomes and operations App Servers Application Security Unified Threat Management Firewalls Data Loss Prevention Inline Intrusion Prevention LAG Core Centralized DHCP and Other Services Inline Anti Prevention
5
Threat Intelligence Feeds
Actionable threat intelligence: Command and control threats GeoIP location information Open Scalable High capacity Effective Adaptive Threat Data Cloud Other threat intelligence Command & control GeoIP feed Device Management Security Management Cloud Data Connector SRX
6
A Change in Mindset Realize threats are everywhere. They are already inside. They walked in your front door Recognize perimeter security isn’t enough Detection and Enforcement should be enabled anywhere Acknowledge security is everyone’s problem – horizontal and vertical 6
7
The Software-Defined Secure Network
Operate network as single enforcement domain, every element becomes a policy enforcement point Create and centrally manage intent based policy directly aligned to business objectives Gather & distribute threat intelligence, from multiple sources – know who the bad guys are faster Leverage cloud economics for real time analysis – find the bad guys faster Enforce policy to the threat feed information, real time across the network – adapt the network real-time Detection Policy Enforcement 7
8
SDSN Innovation Summary
Simple Single network-wide policy manager Reduce risk of error and overlap function Open Most advanced threat detection capabilities by integration threat data from Juniper and 3rd party Comprehensive Adapt zero-trust and micro-segmentation to enforce network-wide policy Scalable Utilize all network resources to enforce policy and detect threats
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.