Download presentation
Presentation is loading. Please wait.
Published byFranklin Stevenson Modified over 9 years ago
1
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING
2
2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS
3
3 NEW TARGETS Virtual Machines Cloud Resources New Devices
4
4 Cyberattacks on Georgian Web Sites Are Reigniting a Washington Debate WASHINGTON – The cyberattacks in Georgia are re- energizing a debate over whether the laws of war apply in cyberspace. Among the biggest questions: When is a cyberattack an act of war? NEW THREATS DATACENTERS
5
5 WHAT IS NEEDED? Security services must scale dynamically as datacenters consolidate Application visibility & Control Who is accessing my network, from where, and why? Automate security operations to simplify and reduce risk SCALE APPLICATION SECURITY IDENTITY SIMPLIFY
6
6 JUNIPER’S SOLUTION
7
7 EVERY CUSTOMER AND LOCATION HAS A UNIQUE SECURITY BALANCE Control Data separation & user experience Capacity Throughput & response time Connectivity Users and devices
8
8 Needs: Low to moderate connections Low to moderate capacity Firewall IPsec VPN IPS UTM: Anti-virus/spam/web security High connections High capacity Firewall IPsec VPN IPS Virtual Server Security
9
9 THE LEGACY NETWORK SSL VPN Firewall IPSec VPN IPS L2/L3 Switch L2 Switch
10
10 CONSOLIDATE & VIRTUALIZE SECURITY APPLIANCES SSL VPN Firewall IPSec VPN IPS L2/L3 Switch SRX5800 L2 Switch
11
11 SECURITY APPLIANCE CONSOLIDATION RATIOS SEEN IN THE FIELD Consolidate, then additional capacity and service add-ons. 102 to
12
12 SECURITY IS BUILT-IN TO PROVIDE DYNAMIC SECURITY AT SCALE Dynamic allocation of security services within a single platform Scale to 120 Gbps/platform Automated firewall changes based on user visibility and policy Secure shifting traffic flows with a single platform FC SAN MX Series EX8216 SRX5800 ServersStorage
13
13 SERVICE OFFERINGS CONTINUE TO GROW SRX3600 SRX5800 SRX210SRX240 SRX650 SRX100 SRX5600 YESTERDAY’S BOX IS TOMORROW’S FEATURE PerimeterContentApplication FirewallIntrusion detectionAppDOS IPSec VPNAnti-Virus (Kaspersky/ Sophos)AppTrack SSL VPNURL filtering (Websense)Identity and application coordination Server virtualization security (Altor)Anti-spam NATMalware (FireEye)
14
14 TODAY’S APPSECURE PORTFOLIO Identity Threats AppSecure UserApp MORE TO COME… (Malware) AppTrack Discrete Data Analysis Business Analysis Deep packet intelligence Protoc ol IP Addr Port Data SAP Size Joe What application? What user? User location? User device? AppDOS Server connection monitoring Bot/client classification Protocol analysis
15
15 NEW SRX SERVICE: APPTRACK Discrete Data Analysis Business Analysis Deep packet intelligence Protoc ol IP Addr Port Data SAP Size Joe What application? What user? User location? User device? Unparalleled application visibility
16
16 WE CONTINUE TO BEAT COMPETITORS DATACENTER SECURITY BRANCH INTEGRATED SECURITY ENDPOINT ACCESS CONTROL TOTAL NETWORK SECURITY Juniper #1 at 43.7% share— up 9.2 points Y/Y Juniper #2 at 21% share— up 5.4 points Y/Y Juniper #1 at 31.7% share— up 3.4 points Y/Y Juniper #2 at 12.6% share— up 2.3 points Y/Y Source: Infonetics
17
17 Use the Red Carpet resources to determine migration timing Get SreenOS experts trained on JUNOS Offer SRX instead of new application specific hardware Installed BaseNew Customers Use SRX to consolidate the conga line of network devices Position SRX to address datacenter consolidation & virtualization security challenges Sell the value of a consistent platform CUSTOMER SPECTRUM
18
18 THE NEW NETWORK FOR SECURE DATA CENTERS DELIVERS BIG ADVANTAGES DYNAMIC SECURITY SECURITY TAILORED TO APPLICATION USAGE IDENTITY BASED ARCHITECTURE
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.