Download presentation
Presentation is loading. Please wait.
Published byJustina Sheila James Modified over 6 years ago
1
Juniper in the Enterprise & Introducing STRM
Stefan Nilsson Marketing Manager, Nordics
2
Agenda The Juniper journey Evolving Enterprise Trends
High Performance Networking Product & Technology focus Introducing STRM Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential 2
3
A Decade of Innovation 2010 2006 M-Series 2005 2004 2002 2001 2000
#789 #789 M-Series 2005 2004 2002 2001 2000 Acorn Acorn Acorn 1996 1998 1999 UAC Incorporated T-Series SSG
4
Leader in High-Performance Networking
Operational Excellence Well Positioned For Growth $ $2.7B Cash and Investments 5,000+ Dedicated Employees Juniper is well positioned for growth with a strong balance sheet of more than $2.7B USD in cash and investments. With nearly 500 technology patents issued or pending, Juniper remains maniacally focused on innovation and delivering customer value. In Q the company invested more than $120M in Research and Development. With more than 5,000 dedicated employees in 38 countries, Juniper has the resources in place to scale top line revenues, earnings and cash flow to deliver high returns for shareholders. Juniper is uniquely positioned to serve the High-Performance networking needs of the world’s most demanding businesses. $120M Quarterly R&D Engine Partner and Shareholder Value
5
Serving 20,000+ Customers Globally
U.S. Dept of Labor
6
Enterprise trends & How IT needs to be aligned with business processes
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential 6
7
Enterprise Trends Drive IT Requirements
Speed of Execution on Strategy and Innovation is Top of Mind* Executives Expect IT to Drive Competitive Advantage** Boosting Network Performance Increases Productivity*** High Performance IT Organizations Differ**** Aggressive adopters of new technology Spend less time fixing systems Manage to more performance metrics Key Takeaways: Enterprises much manage evolving business requirements New IT directions lead to new IT requirements: Performance for Business Speed Risk management for Business Safety Open standards and partnerships for Business Flexibility The Role of the Network is Changing Juniper is well positioned to address today’s evolving environment: The Criticality of the Network Enterprises must manage constantly evolving business requirements, while High-Performance organizations also understand that IT has a direct impact on the business and that they need to strategically invest in key IT initiatives (e.g. boosting bandwidth and performance), that align to corporate priorities (e.g. supporting competitive advantage and driving growth). It is shown that companies that do not invest in IT will suffer. These companies understand the importance of the role and performance of the network and that the network needs to scale as quickly as the business. Sources: Gartner influence curve: Through 2010, most organizations without network strategic plans will spend at least 20 percent more on networking than those with plans (0.8 probability). University of Virginia Roundtable study, 2006: In unsuccessful (technology) decisions studied, there’s a strong correlation of business roles being marginalized with little or no involvement Businesses with extensive business and technology integration “reported revenue increases three times as often as companies that were less integrated.” The study found that extensive integrators were growing revenue 5% faster than their competitors Source: IBM Global Business Services, “Expanding the Innovation Horizon”, The Global CEO Study 2006 Unbalanced involvement of IT technical support with a lack of business role influence is strongly correlated to unsuccessful (technology) decisions. In general, IT technical support roles are unlikely to have the breadth of experience across technology implementation and business user requirements that would enable strong input into technology-purchasing decisions Source: University of Virginia – Roundtable Survey “How Technology-Purchasing Decisions Are Really Made” New Business Directions Drive New IT Requirements Performance for Business Speed Risk management for Business Safety Open standards and partnerships for Business Flexibility * The Economist, 2006 ** Gartner, 2006 *** Information Week, 2006 **** McKinsey, 2006
8
More than Ever, The Network is Critical to Business Success
The network is a strategic asset that should innovate businesses and business processes Delivering strategic and tactical business results should not require unreasonable trade-offs Speed is the New Currency Dynamic Business Models Network Critical to Success Countries Companies Individuals The role of the network is changing to the point where it’s at the heart of many business, and certainly every high performing organization. Innovative businesses are realizing that speed is their ultimate competitive weapon combined with the ability to embrace more dynamic business models to not only spot trends, but to marshal resources and execute against them to bring new products and services to market overnight. Innovative businesses are increasingly viewing the network as critical to their success. And a high performance network infrastructure is the foundation for success However, as business demands more from the network infrastructure, the natural tension that exists between “keeping the lights on” and innovating forces compromises and tradeoffs
9
Aligning IT with the Business is Essential
Challenges Control operational costs, maximize investments, simplify operations Manage threats, control access Assure service levels and application performance Mitigate IT risk Opportunities Pursue opportunity, enable growth, respond to changes Innovate to deliver services that create competitive advantage The CIO Dilemma IT Budgets Grow & Transform Grow & Transform Grow & Transform Run the Business Run the Business Run the Business The CIO Priority is aligning business priorities with IT to enable the business. There are significant challenges for the companies that understand that their network is central to their business: Controlling costs (biggest issue is OPEX), maximizing investments, simplifying operations, managing threats, controlling access, assuring service levels and application performance, and sustaining IT compliance. At the same time, IT must have a critical role in assisting the company’s business opportunities. The Dilemma: How do you balance an essentially IT budget and free up resources to innovate more. (Question: How do I streamline to innovate?) Within the IT budget, there must be an appropriate balance between investing in innovation and driving down operating costs. Top items on a networking executives agenda: Mobile workforce (no new budget) Security (and the tension between security and the networking IT teams) Deploying services (e.g. Voice) $ Time Change the rules and win the game Stay in the game
10
High-Performance Businesses View the Network as Critical to Success
High-Performance Businesses Profile Believe IT is strategic to their business, customers and differentiation from competitors Must respond to new opportunities and challenges in the marketplace Aggressive adopters of new technology* Spend less time fixing systems* Manage to more performance metrics* Expedites workforce productivity and customer loyalty Supports revenue growth and profitability goals Ensures Risk Management by providing the visibility to react and respond to unplanned events and achieve preventative goals Operational improvements that enable cost reductions and ensure quick time-to-value Benefits of a High-Performance Network Infrastructure * Gartner, 2006
11
Product & Technology focus in the Enterprise market place
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential 11
12
Steer Products Into a Naturally Integrated Portfolio
Product Strategy Steer Products Into a Naturally Integrated Portfolio Cutting-edge engineering Performance at scale Reliability Power efficiency Leverage: Build once - use multiple times Modular integration of services Commonality: Gradually converge on to a common OS (JUNOS), policy, and network mgmt
13
Enterprise Product & Technology focus
Security (Firewalls & IDP’s) Remote Access (Secure Access) Unified Access Control (NAC solutions) Enterprise Routing (J-series) WAN acceleration (WX-series) JUNOS operating system Ethernet Switching (EX-series) NEW! Log & Event Management (STRM) NEW! INTEGRATION IS KEY!
14
We Have a Complete Portfolio of Products
Network Mgmt Policy and Control (UAC) Branches & Campuses Datacenter FWVPN + IDP Switches Router Core / Edge Routers FWVPN + IDP WAN Opt Secure Router Switches SSL VPN Service Provider Datacenter of Partner or CSP SSL VPN Switches Router Remote Workers
15
The External Perception of Our Products Is Excellent
Firewall / IPSec VPN Remote Access – SSL VPN Gartner Magic Quadrants Show Juniper is a Proven Leader in All Categories Intrusion Prevention WAN Optimization Market Recognition: Juniper in Leaders Quadrant in ALL Areas in Which We Compete! A leader: Demonstrates the ability to execute and completeness of vision (product and corporate) Market Share: Juniper is #2 in overall network security. Juniper is #2 in enterprise routing, high-end firewall and hardware secure routers. Juniper is #1 in SSL VPN.
16
Our Differentiation Industry-Leading Security Performance at Scale
Carrier-Class Reliability Power & Cooling Efficiency Single OS, Policy & Mgmt 16
17
The “preferred choice” for high-performance businesses
Future Direction An aggressive strategy to deliver the best products, integrated solutions and services at the best economics The “preferred choice” for high-performance businesses Going forward, Juniper has an aggressive strategy to deliver the best products, solutions and services at the best economics. This will ensure that Juniper’s High-Performance network infrastructure remains the “preferred choice” for High-Performance businesses.
18
Juniper Security Threat Response Manager (STRM)
19
Customer Challenges IT “information” overload Compliance mandates
Dispersed Threats IT “information” overload Flood of logged events from many “point” network and security devices Lack of expertise to manage disparate data silos & tools Compliance mandates Industry specific regulations mandating security best practices Internal IT “risk” assessment programs Evolving internal and external threats Insider abuse, theft of intellectual property Complex integrated attacks IT Overload Industry Regulations
20
Introducing Junipers SIEM/NBAD Solution STRM – “Security Threat Response Manager”
Integrates Mission Critical Network & Security Data Silos STRM Key application features Log Management Provides long term collection, archival, search and reporting of event logs, flow logs and application data Security Information and Event Management (SIEM) Centralizes heterogeneous event monitoring, correlation and management Network Behavior Anomaly Detection (NBAD) Discovers aberrant network activities using network and application flow data Log Management Security Information & Event Management STRM Network Behavior Analysis
21
STRM’s Key Value Proposition
Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Compliance and Policy Safety Net Complements Juniper’s Enterprise Mgmt Portfolio Enterprise Value Juniper’s STRM Appliance
22
STRM Architecture STRM – Real time network & security visibility
Data collection provides network, security, application, and identity awareness Embedded intelligence & analytics simplifies security operations [This slide is a build up. Each layer builds the story of how STRM delivers centralizes network & security information resulting in 3 key value propositions (threat, compliance & log Management)] Script: [Build 1] A key feature of STRM is the ability to centralize all Network & Security management functions in a single console. The console provides customizable access to the information as required by specific individuals in the organization, whether they be in network and security operations, management, or in an executive position. It provides different views into the information collected including event management, network & security surveillance, threat management, and compliance reporting. [Build 2] Fundamental to STRM is the ability to provide log and event collection across all the disparate network and security technologies deployed on the network. Differentiating Q1 is the ability to integrate traditional network and security events with network and application flow data, and user and device identity information. [Build 3] Once all information is collected, STRM provides unique surveillance by combining all of the information in a way that provides both real-time and historical context of what has happened in the past to more effectively gauge current behavior. [Build 4] A key capability of STRM is the ability to deliver prioritized “offenses” that is a significant improvement over what a traditional SIEM solution will provide. Through advanced event correlation and behavior analysis, STRM can better deliver actional information to the network and security operation teams. [Build 5] There are many benefits to the STRM solution. One of the more compelling reasons to implement STRM is that it provides exceptional value because it solves 3 difficult challenges in one solution. We’ll now discuss each of these solutions, log, threat and compliance management in more depth. Prioritized “offenses” separates the wheat from the chafe Solution enables effective Threat, Compliance & Log Management
23
Reporting 220+ Out of the box report templates
Fully customizable reporting engine: creating, branding and scheduling delivery of reports Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA Reports based on control frameworks: NIST, ISO and CoBIT
24
STRM Key Benefits Converged network security management console
Integrates typically silo’d network & security data Network, security, application, & identity awareness Unrivaled data management greatly improves ability to meet IT security control objectives Advanced analytics & threat detection Detects threats that other solutions miss Compliance-driven capabilities Enables IT best practices that support compliance initiatives Scalable distributed log collection and archival Network security management scales to any sized organization Converged network & security management console Integrated log management, security information and event management (SIEM), and network behavior analysis in a single console reduces security management solution acquisition costs and improves IT efficiency Network, security, application, & identity awareness Unrivalled data collection provides converged management of network events, security events, network and application flow data, vulnerability data, and identity information greatly improves ability to meet IT security objectives. Advanced threat and security incident detection QRadar’s unique “offense” management significantly reduces false positives and detects of threats that other solutions miss Compliance-driven capabilities QRadar provides compliance-centric workflow that enables the delivery of IT best practices that support compliance initiatives Scalable distributed log collection and archival QRadar’s distributed appliance architecture scales to provide log management in any enterprise network
25
Large enterprises &Service Providers Small Medium Enterprise
STRM Products Large enterprises &Service Providers STRM5000 STRM - EP STRM - FP Small Medium Enterprise STRM2500 Small Enterprise STRM500 Events per sec Flows per Min 250EPS 15k F 500EPS 15kF 1000EPS 50 & 100k F 2500EPS 50 & 100k F 5000EPS 100 & 200k F EPS 100 & 200k F
26
Thank You!
27
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential 27
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.