Download presentation
Presentation is loading. Please wait.
Published byAndrea Wright Modified over 9 years ago
1
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper in the Enterprise & Introducing STRM Stefan Nilsson Marketing Manager, Nordics
2
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 2 2 Agenda The Juniper journey Evolving Enterprise Trends High Performance Networking Product & Technology focus Introducing STRM
3
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 3 1996 2006 #789 Incorporated 1999 Acorn 2001 2005 2002 2004 2000 1998 A Decade of Innovation M-Series T-Series SSG UAC 2010 #789 Acorn
4
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 4 Operational Excellence Partner and Shareholder Value 5,000+ Dedicated Employees $2.7B Cash and Investments $120M Quarterly R&D Engine Leader in High-Performance Networking Well Positioned For Growth
5
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 5 Serving 20,000+ Customers Globally U.S. Dept of Labor
6
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 6 6 Enterprise trends & How IT needs to be aligned with business processes
7
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 7 Enterprise Trends Drive IT Requirements *The Economist, 2006 **Gartner, 2006 ***Information Week, 2006 ****McKinsey, 2006 New Business Directions Drive New IT Requirements 1.Performance for Business Speed 2.Risk management for Business Safety 3.Open standards and partnerships for Business Flexibility High Performance IT Organizations Differ **** Aggressive adopters of new technology Spend less time fixing systems Manage to more performance metrics Boosting Network Performance Increases Productivity *** Executives Expect IT to Drive Competitive Advantage ** Speed of Execution on Strategy and Innovation is Top of Mind *
8
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 8 More than Ever, The Network is Critical to Business Success The network is a strategic asset that should innovate businesses and business processes Delivering strategic and tactical business results should not require unreasonable trade-offs Speed is the New Currency Dynamic Business Models Network Critical to Success CountriesCompaniesIndividuals
9
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 9 Aligning IT with the Business is Essential Challenges Control operational costs, maximize investments, simplify operations Manage threats, control access Assure service levels and application performance Mitigate IT risk Opportunities Pursue opportunity, enable growth, respond to changes Innovate to deliver services that create competitive advantage Change the rules and win the game Stay in the game The CIO Dilemma $ Time Grow & Transform Transform Transform IT Budgets Run the Business Run the Business
10
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 10 High-Performance Businesses View the Network as Critical to Success Expedites workforce productivity and customer loyalty Supports revenue growth and profitability goals Ensures Risk Management by providing the visibility to react and respond to unplanned events and achieve preventative goals Operational improvements that enable cost reductions and ensure quick time-to-value Believe IT is strategic to their business, customers and differentiation from competitors Must respond to new opportunities and challenges in the marketplace Aggressive adopters of new technology* Spend less time fixing systems* Manage to more performance metrics* High-Performance Businesses Profile Benefits of a High-Performance Network Infrastructure * Gartner, 2006
11
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Product & Technology focus in the Enterprise market place
12
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 12 Product Strategy Steer Products Into a Naturally Integrated Portfolio Cutting-edge engineering Performance at scale Reliability Power efficiency Leverage: Build once - use multiple times Modular integration of services Commonality: Gradually converge on to a common OS (JUNOS), policy, and network mgmt
13
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 13 Enterprise Product & Technology focus Security (Firewalls & IDP’s) Remote Access (Secure Access) Unified Access Control (NAC solutions) Enterprise Routing (J-series) WAN acceleration (WX-series) JUNOS operating system Ethernet Switching (EX-series) NEW! Log & Event Management (STRM) NEW! INTEGRATION IS KEY!
14
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 14 Policy and Control (UAC) We Have a Complete Portfolio of Products Branches & Campuses Datacenter Datacenter of Partner or CSP Router Switches Secure Router Network Mgmt Router Switches FWVPN + IDP WAN Opt SSL VPN Remote Workers Service Provider Core / Edge Routers FWVPN + IDP SSL VPN
15
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 15 Remote Access – SSL VPN Intrusion PreventionWAN Optimization Firewall / IPSec VPN Gartner Magic Quadrants Show Juniper is a Proven Leader in All Categories The External Perception of Our Products Is Excellent
16
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 16 Industry-Leading Security Power & Cooling Efficiency Carrier-Class Reliability Performance at Scale Single OS, Policy & Mgmt Our Differentiation
17
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 17 Future Direction An aggressive strategy to deliver the best products, integrated solutions and services at the best economics The “preferred choice” for high-performance businesses
18
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 18 Juniper Security Threat Response Manager (STRM)
19
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 19 Customer Challenges IT “information” overload Flood of logged events from many “point” network and security devices Lack of expertise to manage disparate data silos & tools Compliance mandates Industry specific regulations mandating security best practices Internal IT “risk” assessment programs Evolving internal and external threats Insider abuse, theft of intellectual property Complex integrated attacks Dispersed Threats Industry Regulations IT Overload
20
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 20 Security Information & Event Management Introducing Junipers SIEM/NBAD Solution STRM – “Security Threat Response Manager” STRM Key application features Log Management Provides long term collection, archival, search and reporting of event logs, flow logs and application data Security Information and Event Management (SIEM) Centralizes heterogeneous event monitoring, correlation and management Network Behavior Anomaly Detection (NBAD) Discovers aberrant network activities using network and application flow data Integrates Mission Critical Network & Security Data Silos Network Behavior Analysis Log Management STRM
21
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 21 STRM’s Key Value Proposition Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Compliance and Policy Safety Net Complements Juniper’s Enterprise Mgmt Portfolio Juniper’s STRM Appliance Enterprise Value
22
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 22 STRM Architecture STRM – Real time network & security visibility Data collection provides network, security, application, and identity awareness Embedded intelligence & analytics simplifies security operations Prioritized “offenses” separates the wheat from the chafe Solution enables effective Threat, Compliance & Log Management
23
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 23 Reporting 220+ Out of the box report templates Fully customizable reporting engine: creating, branding and scheduling delivery of reports Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA Reports based on control frameworks: NIST, ISO and CoBIT
24
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 24 STRM Key Benefits Converged network security management console Integrates typically silo’d network & security data Network, security, application, & identity awareness Unrivaled data management greatly improves ability to meet IT security control objectives Advanced analytics & threat detection Detects threats that other solutions miss Compliance-driven capabilities Enables IT best practices that support compliance initiatives Scalable distributed log collection and archival Network security management scales to any sized organization
25
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 25 STRM Products STRM500 STRM2500 STRM5000 250EPS 15k F 500EPS 15kF 1000EPS 50 & 100k F 2500EPS 50 & 100k F 5000EPS 100 & 200k F STRM - FP 5000 + EPS 100 & 200k F STRM - EP Small Enterprise Small Medium Enterprise Large enterprises &Service Providers Events per sec Flows per Min
26
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 26 Thank You!
27
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 27 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 27
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.