Download presentation
Presentation is loading. Please wait.
Published byTanner Gresham Modified over 10 years ago
1
1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry, Media & Local Gov MTJONENFA@JUNIPER.NET 06 44 710 796
2
2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net AGENDA The Cloud Cut Cost on MPLS Secure the Virtualized World Thinking of the Cloud Network has Changed Cloud Ready Network MPLS vs Internet Service Provider Solutions for Enterprise The Physical Firewall is not Enough Security = Portfolio of Solutions
3
3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Blank Slide THE CLOUD
4
4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net THINKING OF THE CLOUD? Decreasing Cost Cloud Increased Reliability More Offering Or already Connected
5
5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net ROLE OF NETWORK HAS CHANGED Is your network cloud Ready! Continuity Inefficient use of the Network Poor Network Visibility Inconsistent User Experience Security (BYOD) Legacy Three Tier Data Center Up to 75% of traffic EW
6
6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net THE CLOUD READY NETWORK MEANS 1.Continuity – 99,999% (or 100%-10 min) - BOTH Cloud and Your Network Infrastructure 2.Efficient use of Network – 2 Tier 3.Manageability / Visibility – Visibility on application level to optimize network / compliancy 4.Consistent Performance / Experience anywhere on any device
7
7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Redundancy in FW (SRX) Carrier Grade Hardware (SRX/EX/MX) JUNOS – Proven Service Provider OS Continuity Virtual Chassis Pay as you Grow Extend VC over Distance Throughput / € Efficiency SRX – App Secure Central Management - Space Secure Analytics Application WLAN - BYOD Control UAC Users
8
8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net CLOUD ENABLES YOU TO Move LAN away from commodity Discuss Multiple Solutions Technological Advantages become important Advise on the applications which are not CLOUD ready! – another opportunity
9
9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Blank Slide CUT COST ON MPLS
10
10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net MPLS VS INTERNET MPLS Uptime Bandwidth Utilization Managed with SLA’s Simplification NW INTERNET Improved SLA’s High Bandwidth Availability INTERNET Latency Complexity MPLS Expensive Security Partners not Flexible
11
11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SIMILARITIES IN RFP’S / FEEDBACK MKB+ Improved Security: BYOD NGF Take back Control:Central Management – Visibility Limited Solutions / Lack of Flexibility
12
12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Blank Slide EXAMPLE
13
13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SP SOLUTIONS FOR THE ENTERPRISE 1.Even if customer decides to keep MPLS – SRX can be placed in network 2.Create Overlay Network as Contracts Run Out 3.Juniper’s Core = Service Provider Solutions 4.Complete and Proven Portfolio
14
14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Best possible routing functionality on a firewall Carrier Grade Hardware JUNOS – Proven Service Provider OS SRX Central Granular Management Control Applications Simplified Roll Out SPACE Connect Any Device from Anywhere Riverbed MAG
15
15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Blank Slide SECURE THE VIRTUALIZED WORLD
16
16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net MEGA TREND – SERVER VIRTUALIZATION Source: IDC Capital Savings
17
17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net FIREWALL / VIRTUAL - SECURITY Firewall Secure the Physical Network IPS NGF VGW Secures the VM Policy Enforcement on Migrating VM’s Synchronizes with SRX
18
18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net WHAT ABOUT VIRTUAL MACHINES? Physical Network Virtual Network Physical Security Is “Blind” to Traffic between Virtual Machines VM1VM2VM3 ESX/ESXi Host Firewall/IDS Sees/Protects All Traffic between Servers HYPERVISOR Virtual Switch
19
19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Purpose Built Virtual Security VM1VM2VM3 VS ESX/ESXi Host Virtual Security Layer Traditional Security Agents VLANs & Physical Segmentation VM1VM2VM3 VS ESX/ESXi Host VM1VM2VM3 VS ESX/ESXi Host Regular Thick Agent for FW & AV HYPERVISOR APPROACHES TO SECURING VIRTUAL NETWORKS 123
20
20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net FIREWALL PERFORMANCE
21
21 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURE THE VM - EXAMPLES Cloud Service Provider Shipping Company CARE Prevent Customer Data Migration within VM’s Protect Customer Data To Proof SLA’s Protect VDI Users at Best Possible Performance Maintenance Tool VM’s Audit Tool Audit Tool for Electronic Client Records Protect Data Control Data on VM Level
22
22 Copyright © 2012 Juniper Networks, Inc. www.juniper.net REAL LIFE http://news.techworld.com/security/3474018/hackers-planted-remote-devices-to-smuggle- drugs-through-antwerp-port-europol-reveals/
23
23 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SRX Series Physical Hypervisor vGW Series VM vGW Virtual Gateway Management and Security Services Security Design Security Threat Response Manager STRM Services Virtual Firewall IPS DoS Prevention AppSecure DoS JUNIPER SECURITY SOLUTION THAT SPANS PHYSICAL AND VIRTUAL NETWORKS
24
24 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SUMMARY1 Recurring Revenue 2 Drivers Seat 3 Portfolio 4 Services
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.