Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017
|
|
- Oswin Parsons
- 6 years ago
- Views:
Transcription
1 Security Everywhere Within Juniper Networks Mobile Cloud Architecture Mobile World Congress 2017
2 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points Juniper s Mobile Cloud Architecture
3 Challenges and Trends Customer challenge: rapid growth in security threat and exposure THREAT SOPHISTICATION Zero day attacks Advanced, persistent, targeted attacks Adaptive malware CLOUD Virtualization and SDN Applications, data, management in the cloud Application proliferation INFRASTRUCTURE Hybrid cloud deployments growing Device proliferation and BYOD IoT and big data everywhere
4 Software-Defined Secure Network Policy, Detection & Enforcement Cloud-based Threat Defense Detection Enforcement Threat Intelligence Dynamic and Adaptive Policy Engine Policy Bottoms Up and Top Down Approach Leverage entire network and ecosystem for threat intelligence and detection Utilize any point of the network as a point of enforcement Campus & Branch Network Detection DC Enforcement Private Cloud Public Cloud Dynamically execute policy across all network elements including third party devices
5 SDSN Enforcement - Granularity of Control Perimeter Security Secure Network Outside (Untrusted) Outside (Untrusted) Hyper-connected Network w/security at Perimeter Complex Security Policies Lateral Threat Propagation Limited Visibility Secure Network User Intent Based Policies Block Lateral Threat Propagation Comprehensive Visibility
6 SDSN - User Intent Policy Model Network Configuration User Intent Policy Firewall Rule Tables Access Control Lists Routing Tables & SDN Service Chains Access Control Threat Prevention Compliance Extensibility Automation IP MAC Proto Port Users Devices Sites Applications Meta Data Private Public AD CMDB vcenter Custom Islands of Management Device/Platform specific configurations Tough to automate, challenging compliance Comprehensive Security User Intent Based Policies Native automation and compliance support
7 SDSN - Threat Management Manual Threat Workflows Threat Management Automation Feed Incident Response Net-Sec Operations Endpoint Security CnC & GeoIP Custom/3 rd party feeds feeds Cloud based threat prevention Feed SIEM Malware Found TKT TKT SDSN Policy Controller Multiple Teams Cohesive Threat Management System Threat Detection Enforcement Delays Vendor specific threat feeds Automation across Network & Security Open API & 3 rd Party threat feeds
8 Solution: Secure IoT Service Fabric Virtualization, Orchestration, Analytics, Security Orchestration Contrail, CSO, Policy Analytics JTI, JSA Security VPN, SDSN, Sky ATP M2M/IoT Devices RAN MEC Mobile SP Network Control Plane Cloud CPE IoT Applications and Services IoT Gateway 2/3/4/5G NB-IoT User Plane (Distributed or Centralised) Wireline
9 Use Cases: Secure Mobile Network LTE Security Gateway Encrypts and protects integrity of traffic from enodeb to EPC across any mobile backhaul infrastructure Controls traffic between infrastructure components and protects against inter-device signaling overload (SCTP-FW) Gi/SGi Firewall and Service Delivery Gateway Protects service provider infrastructure and user devices from outside-in attacks Deliver value-added services such as UTM and App ID/QoS/FW Perform CGNAT for IPv6 transition and IPv4 address exhaustion 3G/GSM LTE LTE SecGW Backhaul Roaming Partners EPC Internet Gi Firewall Gp/S8 Firewall Create a security border with roaming control at the service provider to service provider roaming interface Manages 3GPP release interoperability and protocol differences between service providers Gp Firewall Comprehensive security solutions protecting customer data and privacy, as well as the infrastructure to enable a self defining network.
10 IPsec Capacity (IMIX) Gi FW Capacity (IMIX) Products: Security Gateways and Gi Firewalls Security Everywhere 400G SRX5800 MX TB 200G SRX5600 MX G 60G Scale out with Contrail SRX5400 MX G 10G 1G vsrx MX104 (SecGW only) SRX4100/ G Integrated Routing, Switching and Security Common Junos Operating System Unprecedented Scale
11 Service Provider: Mobile Edge Computing MOBILE HUB SITE NFX250 Network Perf App S1-U IP MEC server S1-U GTP IPsec MX104 vsrx IoT IoT App SRX SecGW 3 rd Party Feeds JSA SKY ATP SDSN Policy Enforcer Policy update for Service Chain Dynamic service Contrail Service chains Orchestrator IoT App Network Perf App SGi from EPC vsrx IoT TELCO CLOUD POLICY ENFORCER Describe traffic pathways for IoT and Network performance apps at Mobile Hub and Telco Cloud DETECTION Sky ATP: IoT malware detection Sky ATP: cloud server malware detection JSA: multi-dimensional detection ENFORCEMENT vsrx provisioned in service chains Infected IoT devices & servers quarantined Enforce legitimate traffic pathways
12 Use Case: Distributed Security Gateway LTE-A Features available as software upgrades 2016 onwards Coordinated Multi-Point (CoMP) Enhanced Inter-cell Interference Coordination, (eicic) Drive inter-cell site coordination & backhaul network requirements Timing: Frequency & Phase: Frequency16ppB, Phase +/- 0.5µSecs Distributed Security: X2 Handover Interface requires a latency of <3-5ms Accurate timing current & installed backhaul is a major change: accuracy relies on hardware Security gateways: Core SecGW terminates S1 IPsec tunnels & protects EPC Distributed LTE-A SecGW for X2 at the Hub-Site deployed at Fiber Edge IP Access Network CSR LTE-A X2 Traffic MX104 Hub site router Distributed SecGW w/ms-mic IPsec Termination for LTE-A X2 LTE-A S1 Traffic IPsec Termination For LTE S1 & X2 Protects EPC IPsec Termination for LTE-A S1 Other security features available CORE Switch Site Macro Cell Site Hub Site POC3 Hub Site LTE S1 Traffic LTE X2 Traffic Core LTE SecGW SRX5800 LTE SecGW EDGE Router EDGE Router Source: Qualcomm
13 Services Security Everywhere Customer Lifecycle Plan Build Operate Assessment Design Deployment Migration Maintenance Optimization Juniper Service Offerings Juniper Professional Services Security & SDSN Assessment and Deployment Security VNF Testing & Deployment Service Custom Engagements Customer On-Boarding Juniper Care Juniper Care Plus Juniper Optimum Care Juniper Education and Training
14 Proof Points Security Everywhere Juniper s SDSN framework We believe that security is the 'killer app' that will accelerate SDN adoption. The complement of SDN and security can solve one of the greatest problems enterprises have dealt with over the last 25 years of enterprise network expansion, an operationally efficient way to implement policy, detection and enforcement across the entire network. With its Software- Defined Secure Networking vision, Juniper is making a move in that direction. Mike Spanbauer, VP of Security Test & Advisory, NSS Labs The low footprint and high density advantages of the csrx, will allow us greater leverage to secure east west traffic. The multi-core vsrx delivers high performance and the ability to handle large amounts of traffic We expect both products to significantly increase the benefits we deliver to our customers. John White, VP of Product Strategy, Expedient As the security landscape continues to evolve, it is more important than ever to work together to combat cyber threats. These key additions to our security portfolio will further our Software-Defined Secure Networking vision and greatly benefit our customers Kevin Walker, Juniper Security CTO Comprehensive Global policy orchestration, unified threat detection, and automated + localized enforcement Interoperable Security solution interoperability and integration with major RAN vendors Integrated Integrated security policy enforcement into products like LTE Security Gateway function on Pre/IP-Agg routers High Performance Industry s highest performance physical and virtual firewalls for networks and Data Centers Open Framework Combined with proprietary countermeasures for advanced threat protection from the cloud
15 Mobile Cloud Architecture 1 of 5 Solutions within Juniper s Mobile Cloud Architecture Security Everywhere Use Cases Partners Services Automated Control & Orchestration Security Everywhere IPsec SecGw. FW, NAT, VPN SecGw FW, NAT, VPN Disaggregation & Virtualization Distributed Data Centers Integrated Packet, Optical & Timing Solutions Products Enterprise Site Software Defined Secure Networking Security detection, policy, and enforcement everywhere SRX Series Services Gateways Firewall, NAT, VPN vsrx Virtual Firewall, NAT, VPN, IPsec Sky ATP Advanced Threat Protection Het-Net Sites (Macro & Small Cells) Distributed Compute Node Distributed Data Center Access & Aggregation Network NGCO Regional Data Center Core Network Application Application Enablement Layer Compute Application Centralized Data Center Internet/ Roaming Junos Space Security Director Services Residential Business Security and SDSN Assessment and Deployment Services, Security VNF Testing & Deployment Service
16 Mobile Cloud Architecture Use Cases Partners Services Juniper s Mobile Cloud Architecture E2E Offering for your Next-gen Secure Distributed Telco Cloud from the Industry s Most Trusted Vendor Automated Control & Orchestration Industry s most deployed SDN solution for multi-vendor and multi-layer network automation. Security Everywhere Industry s most innovative and comprehensive platform to secure the distributed telco cloud. Disaggregation & Virtualization Pioneer in utilizing an open framework to ensure a seamless migration to carrier-grade NFV. Distributed Data Centers Complete, automated and secure solutions for mini DCs at the edge and large DCs in the core. Integrated Packet, Optical & Timing Solutions Integrated solutions from a global leader and innovator in packet networking and optical DCI. Enterprise Site Key mobile use cases supported Application Application Distributed Data Center Regional Data Center Application Enablement Layer Best-of-breed partner ecosystem Compute Best-in-class life-cycle service & support Het-Net Sites (Macro & Small Cells) Distributed Compute Node Access & Aggregation Network NGCO Core Network n Centralized Data Center Internet/ Roaming Residential Business
17 Thank you
Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017
Overview of the Juniper Mobile Cloud Laying the Foundation for a Next-gen Secure Telco Cloud Mobile World Congress 2017 Summary Mobile Challenges and Trends through 2020 Business Drivers Enable new revenue
More informationOverview of the Juniper Networks Mobile Cloud Architecture
Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,
More informationSecurity Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper
Security Everywhere within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationBuild a Software-Defined Network to Defend your Business
Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationWhere is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations
Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment
More informationDistributed Data Centers Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017
Distributed Data Centers Within Juniper Networks Mobile Cloud Architecture Mobile World Congress 2017 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points Juniper s Mobile
More informationIntegrated Packet, Optical & Timing Solutions Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017
Integrated Packet, Optical & Timing Solutions Within Networks Mobile Cloud Architecture Mobile World Congress 2017 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points
More informationSoftware-Define Secure Networks The Future of Network Security for Digital Learning
Software-Define Secure Networks The Future of Network Security for Digital Learning SIGS, 5.Juli 2015 Klaus Ernst, Systems Engineer Juniper Networks Threat Landscape Feels like Treading Water 2017 IT Priorities
More informationZero Trust Security with Software-Defined Secure Networks
Zero Trust Security with Software-Defined Secure Networks Srinivas Nimmagadda and Pradeep Nair Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject
More informationSoftware-Defined Secure Networks in Action
Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated
More informationDigital Transformation
Digital Transformation Content Consumer Pankaj Kitchlu CTO, Juniper Network (India-SAARC) Legal Statement Regarding Current Products and Intentions This statement of product direction sets forth Juniper
More informationSECURING THE MULTICLOUD
SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.
More informationSoftware Defined Secure Networks
Software Defined Secure Networks Seguridad Avanzada en Campus Complejos José Fidel Tomás fidel.tomas@juniper.net Security is in Transformation THREAT SOPHISTICATION Zero day attacks Advanced, persistent,
More informationPolicy Enforcer. Product Description. Data Sheet. Product Overview
Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.
More informationDefending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks
Defending Against Unkown Automation is the Key Rajesh Kumar Juniper Networks When and not if you will get attacked! ON AVERAGE, ATTACKERS GO UNDETECTED FOR OVER 229 DAYS Root cause of Security Incidents
More informationSoftware-Defined Secure Networks. Sergei Gotchev April 2016
Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average
More informationStop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks
Stop Threats Faster Vaishali Ghiya & Dwann Hall Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases
More informationJourney to Secure and Automated Multi-cloud
Journey to Secure and Automated Multi-cloud 2018 Mark Hinckley WW SE and Partner Enablement Juniper Networks Agenda Evolution of Value [Chain] Rise of Enterprise Multicloud Network as the Security Platform
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationDistributed Data Centers within the Juniper Networks Mobile Cloud Architecture. White Paper
Distributed Data Centers within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationExtending Enterprise Security to Multicloud and Public Cloud
Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention The evolution of malware threat mitigation Nguyễn Tiến Đức ntduc@juniper.net 1 Most network security strategies focus on security at the perimeter only outside in.
More informationJuniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud
Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud acezar@juniper.net MARKET DYNAMICS Branch/WAN Evolution: PMO FMO Bring Agility and Enhanced Customer Experience Utilizing Cloud
More informationMitigating Branch Office Risks with SD-WAN
WHITE PAPER Mitigating Branch Office Risks with SD-WAN 1 M itigating Branch Office Risks with SD-WAN Branch Security Overview The branch or remote office stands out as a point of vulnerability in an increasingly
More informationService Automation Made Easy
Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationLeverage SDN Principles in LTE to Meet Future Network Demands
Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network
More informationSmart and Secured Infrastructure. Rajesh Kumar Technical Consultant
Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical
More informationInnovation & GTM Engine
Investor Day 2014 Innovation & GTM Engine Rami Rahim EVP, Juniper Development & Innovation Vince Molinaro EVP, Chief Customer Officer October 30, 2014 How and Why Our Technology Will Win Addressing Your
More informationSD-WANs and Lifecycle Service Orchestration (LSO) October Daniel Bar-Lev Director, Office of the CTO
s and Lifecycle Service Orchestration () October 2017 Daniel Bar-Lev Director, Office of the CTO About MEF MEF created the $80B* Carrier Ethernet Market. MEF s goal is to leverage the global Carrier Ethernet
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationAutomated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture. White Paper
Automated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks Mobile Cloud Architecture Automated Control and Orchrestration Juniper
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationSECURE HYBRID CLOUD Solution
SECURE HYBRID CLOUD Solution DEFEND YOUR GREATEST ASSETS MARKET SITUATION On premise data centers = Expensive The migration of physical data centers to the private and public cloud is happening. Quickly.
More informationSoftware Defined Broadband Networks. Jon Mischel Director, Product Management
Software Defined Broadband Networks Jon Mischel Director, Product Management This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.
More informationThe Network Will Define The Winners In The Cloud
Forward Looking Statements Statements in these presentation slides and related webcast concerning Juniper Networks business, economic, industry and market outlook, trends and opportunity; 2016 and long-term
More informationJN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.
JN0-210.juniper Number: JN0-210 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which protocol does Juniper Networks recommend to provide real-time updates of the network topology to the NorthStar
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationVersa Software-Defined Solutions for Service Providers
PRODUCT BRIEF Software-Defined Solutions for Service Providers Transformative solutions to increase growth and value The Service Provider industry has seen an incredible amount of disruption due to NFV
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationJuniper Unite Cloud-Enabled Enterprise Reference Architecture
Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.
More informationRemote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce
Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger Director System Engineering, NCP Engineering Inc. Vaishali Ghiya Senior Director,
More informationBenefits of SD-WAN to the Distributed Enterprise
WHITE PAPER Benefits of SD-WAN to the Distributed Enterprise 1 B enefits of SD-WAN to the Distributed Enterprise Branch Networking Today More Bandwidth, More Complexity Branch or remote office network
More informationJUNIPER SKY ADVANCED THREAT PREVENTION
Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX
More informationWHITE PAPER. Applying Software-Defined Security to the Branch Office
Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry
More informationETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013
ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013 Challenges and Opportunities Reduce Capex/Opex Challenges Innovation at devices and OTT side Number of devices explode
More informationMETAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER
METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services
More informationIEEE NetSoft 2016 Keynote. June 7, 2016
IEEE NetSoft 2016 Keynote June 7, 2016 0 Contents Introduction - Network Evolution & Operator Challenges Re-architecting the RAN SDRAN: Software-defined RAN - Overview & Enabling Features SDRAN Opportunities
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More informationTIMING; The Key To Unlocking The Benefits Of LTE-A Timing & Security Considerations for Evolved IP Backhaul
TIMING; The Key To Unlocking The Benefits Of LTE-A Timing & Security Considerations for Evolved IP Backhaul Ian Goetz, Juniper Networks November, 2016 Market Trends & The Network Environment Mobile Market
More informationCisco 5G Now! Product Announcements. February, 2018
Cisco 5G Now! Product Announcements February, 2018 Mobile Cloud Services 2017 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Access (%) Displacing Legacy, Mobile
More informationJuniper Solutions for Turnkey, Managed Cloud Services
Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge
More informationSDN and NFV. Stepping Stones to the Telco Cloud. Prodip Sen CTO, NFV. March 16, 2016
SDN and NFV Stepping Stones to the Telco Cloud Prodip Sen CTO, NFV March 16, 2016 The Evolution of SDN and NFV 2 The technology journey: convergence of the SDN & NFV stages NFV phase 0 Decouple NFV phase
More informationService Provider Security Architecture
Service Provider Security Architecture Andrew Turner Technical Marketing, Security Business Group April 12 th 2017 Digitization is disrupting the SP business The world has gone mobile Traffic growth, driven
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationStrategies for a Successful Security and Digital Transformation
#RSAC SESSION ID: GPS-F02A Strategies for a Successful Security and Digital Transformation Jonathan Nguyen-Duy Vice President, Strategic Programs jnguyenduy@fortinet.com AGENDA 2017 Digital transformation
More informationOPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.
OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. INTRODUCTION F5 has innovated to help operators by embracing virtualization for the key elements of its portfolio, and
More informationExtending Enterprise Security to Public and Hybrid Clouds
Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are migrating toward public or hybrid clouds much faster than expected, creating
More informationNetwork Edge Innovation With Virtual Routing
Independent market research and competitive analysis of next-generation business and technology solutions for service providers and vendors Network Edge Innovation With Virtual Routing A Heavy Reading
More informationWinning With Security. Ritesh Agrawal Product Line Director Rasmus Andersen Partner Sales Development
Winning With Security Ritesh Agrawal Product Line Director Rasmus Andersen Partner Sales Development Agenda EMEA MARKET A LOOK TO THE PAST JUNIPER SECURITY VISION THE ROAD AHEAD WHAT CAN YOU EFFECTIVELY
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationBuilding a Software-Defined Secure Network for Healthcare
Building a Software-Defined Secure Network for Healthcare Detect, adapt, and enforce security policies faster with network-wide visibility, orchestration, and control Challenge Enable digital transformation
More informationDelivering the Wireless Software-Defined Branch
Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,
More informationExtending Enterprise Security to Public and Hybrid Clouds
Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are increasingly migrating to public or hybrid deployments, creating an immediate
More informationENTERPRISE SECURITY MANAGEMENT. Frederick Verduyckt 20 September 2012
ENTERPRISE SECURITY MANAGEMENT Frederick Verduyckt 20 September 2012 SETTING THE AGENDA FOR THE NEXT DECADE JUNIPER NETWORKS IS TRANSFORMING THE EXPERIENCE AND ECONOMICS OF NETWORKING 2 Copyright 2012
More informationIntelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access
Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private
More informationEvolution of connectivity in the era of cloud
Evolution of connectivity in the era of cloud Phil Harris SVP and GM SP Market Vertical Riverbed Technology 1 2017 Riverbed Technology. All rights reserved. Transformational Services Span The Business
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationFUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY
FUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY Tony Sarathchandra Director, Product Management Dec 12 th, 2017 This statement of direction sets forth Juniper Networks current intention and is subject
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
More informationSDN TO BE OR NOT TO BE. Uwe Richter SE Director Russia/CIS, East and South East Europe
SDN TO BE OR NOT TO BE Uwe Richter SE Director Russia/CIS, East and South East Europe uwe@juniper.net FUNDAMENTAL PROBLEMS TO SOLVE Want more innovation in networking Want it more quickly too Want more
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationCisco SD-WAN and DNA-C
Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent
More informationJunos Security Bundle, JSEC & AJSEC
Junos Security Bundle, JSEC & AJSEC COURSE OVERVIEW: This bundle combines JSEC & AJSEC at a discounted rate. Please Contact SLI to purchase this bundle. This five-day course covers the configuration, operation,
More informationNetwork Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016
Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent
More informationSecurity in Cloud Environments
Security in Cloud Environments Security Product Manager Joern Mewes (joern.mewes@nokia.com) 16-11-2016 1 Cloud transformation happens in phases and will take 5+ years Steps into the cloud Now 2016+ 2020+
More informationMobile Edge Computing:
Mobile Edge Computing: Accelerating to 5G Era Hannu Flinck January 2016 1 Nokia 2015 Current megatrends Mobile computing, 5G and cloud computing Mobile computing Cloud computing 2 Nokia 2015 Architecture
More informationOptimised redundancy for Security Gateway deployments
Optimised redundancy for Security Gateway deployments RECAP:- JUNIPER LTE SECURITY OFFERING Customer Priorities Core elements protection RAN and UE protection SCTP protection Scalability Mission critical
More informationLTE Access Controller (LAC) for Small Cell Tool Design and Technology
LTE Access Controller (LAC) for Small Cell Tool Design and Technology http://parallelwireless.com/products/lte-access-controller/ 1 Team Expertise Came Together to Reimagine the RAN Core Access Networking,
More informationNext generation branch with SD-WAN and NFV
Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationJuniper Sky Enterprise
Juniper Sky Enterprise Product Overview Network complexity is growing exponentially. Traffic levels continue to rise thanks to the proliferation of mobile and Internet of Things (IoT) devices being connected
More informationINTERCONNECTING MULTICLOUD WITH VMX
INTERCONNECTING MULTICLOUD WITH VMX Julie Zhao Senior Product Manager This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases
More informationThreat Detection & Security Policy Enforcement: A New Inflection Point in Mobile Security
White Paper Threat Detection & Security Policy Enforcement: A New Inflection Point in Mobile Security Prepared by Patrick Donegan Chief Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net
More informationHow Smart Networks are changing the Corporate WAN
How Smart Networks are changing the Corporate WAN Mark Bennett Head of Global Fixed Connectivity Vodafone Group Enterprise September 12017 About Vodafone Enterprise Unified Comms Cloud & Hosting Internet
More informationCato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.
Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces
More informationBeyond Firewalls: The Future Of Network Security
Beyond Firewalls: The Future Of Network Security XChange University: IT Security Jennifer Blatnik 20 August 2016 Security Trends Today Network security landscape has expanded CISOs Treading Water Pouring
More informationHOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON)
WHITE PAPER HOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON) WHAT WILL YOU LEARN? n SON in the radio access network n Adoption of SON solutions typical use cases n
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationContrail SD-WAN Design & Architecture Guide
2018 Juniper Networks, Inc. 1 Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. and/or its affiliates in the United States and other countries.
More information10 Reasons to Choose AudioCodes Enterprise SBC
10 Reasons to Choose AudioCodes Enterprise SBC Introduction The use of Enterprise Session Border Controllers (SBC) has become mainstream due to the adoption of SIP, according to a March 2016 IHS Research
More informationJUNIPER NETWORKS IR INVESTOR AND ANALYST UPDATE
JUNIPER NETWORKS IR INVESTOR AND ANALYST UPDATE MOBILE WORLD CONGRESS Barcelona, Spain February 28, 2012 1 Copyright 2012 Juniper Networks, Inc. www.juniper.net SAFE HARBOR Information, statements and
More informationVodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.
How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationPROTECT WORKLOADS IN THE HYBRID CLOUD
PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across
More informationElastiNET FOR MOBILE BACKHAUL
ElastiNET FOR MOBILE BACKHAUL OPTIMIZED MOBILE BACKHAUL TO SUPPORT 5G SERVICES ON 4G INFRASTRUCTURE The demand for mobile data is spiraling as consumers expect services, such as streamed mobile video,
More informationSecurity Vendor Line Card
Security Essential security controls required for complete security visibility Helps secure the world s largest Enterprise and provider networks from DDoS and advanced targeted attacks Deliver visibility
More information