Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017

Size: px
Start display at page:

Download "Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017"

Transcription

1 Security Everywhere Within Juniper Networks Mobile Cloud Architecture Mobile World Congress 2017

2 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points Juniper s Mobile Cloud Architecture

3 Challenges and Trends Customer challenge: rapid growth in security threat and exposure THREAT SOPHISTICATION Zero day attacks Advanced, persistent, targeted attacks Adaptive malware CLOUD Virtualization and SDN Applications, data, management in the cloud Application proliferation INFRASTRUCTURE Hybrid cloud deployments growing Device proliferation and BYOD IoT and big data everywhere

4 Software-Defined Secure Network Policy, Detection & Enforcement Cloud-based Threat Defense Detection Enforcement Threat Intelligence Dynamic and Adaptive Policy Engine Policy Bottoms Up and Top Down Approach Leverage entire network and ecosystem for threat intelligence and detection Utilize any point of the network as a point of enforcement Campus & Branch Network Detection DC Enforcement Private Cloud Public Cloud Dynamically execute policy across all network elements including third party devices

5 SDSN Enforcement - Granularity of Control Perimeter Security Secure Network Outside (Untrusted) Outside (Untrusted) Hyper-connected Network w/security at Perimeter Complex Security Policies Lateral Threat Propagation Limited Visibility Secure Network User Intent Based Policies Block Lateral Threat Propagation Comprehensive Visibility

6 SDSN - User Intent Policy Model Network Configuration User Intent Policy Firewall Rule Tables Access Control Lists Routing Tables & SDN Service Chains Access Control Threat Prevention Compliance Extensibility Automation IP MAC Proto Port Users Devices Sites Applications Meta Data Private Public AD CMDB vcenter Custom Islands of Management Device/Platform specific configurations Tough to automate, challenging compliance Comprehensive Security User Intent Based Policies Native automation and compliance support

7 SDSN - Threat Management Manual Threat Workflows Threat Management Automation Feed Incident Response Net-Sec Operations Endpoint Security CnC & GeoIP Custom/3 rd party feeds feeds Cloud based threat prevention Feed SIEM Malware Found TKT TKT SDSN Policy Controller Multiple Teams Cohesive Threat Management System Threat Detection Enforcement Delays Vendor specific threat feeds Automation across Network & Security Open API & 3 rd Party threat feeds

8 Solution: Secure IoT Service Fabric Virtualization, Orchestration, Analytics, Security Orchestration Contrail, CSO, Policy Analytics JTI, JSA Security VPN, SDSN, Sky ATP M2M/IoT Devices RAN MEC Mobile SP Network Control Plane Cloud CPE IoT Applications and Services IoT Gateway 2/3/4/5G NB-IoT User Plane (Distributed or Centralised) Wireline

9 Use Cases: Secure Mobile Network LTE Security Gateway Encrypts and protects integrity of traffic from enodeb to EPC across any mobile backhaul infrastructure Controls traffic between infrastructure components and protects against inter-device signaling overload (SCTP-FW) Gi/SGi Firewall and Service Delivery Gateway Protects service provider infrastructure and user devices from outside-in attacks Deliver value-added services such as UTM and App ID/QoS/FW Perform CGNAT for IPv6 transition and IPv4 address exhaustion 3G/GSM LTE LTE SecGW Backhaul Roaming Partners EPC Internet Gi Firewall Gp/S8 Firewall Create a security border with roaming control at the service provider to service provider roaming interface Manages 3GPP release interoperability and protocol differences between service providers Gp Firewall Comprehensive security solutions protecting customer data and privacy, as well as the infrastructure to enable a self defining network.

10 IPsec Capacity (IMIX) Gi FW Capacity (IMIX) Products: Security Gateways and Gi Firewalls Security Everywhere 400G SRX5800 MX TB 200G SRX5600 MX G 60G Scale out with Contrail SRX5400 MX G 10G 1G vsrx MX104 (SecGW only) SRX4100/ G Integrated Routing, Switching and Security Common Junos Operating System Unprecedented Scale

11 Service Provider: Mobile Edge Computing MOBILE HUB SITE NFX250 Network Perf App S1-U IP MEC server S1-U GTP IPsec MX104 vsrx IoT IoT App SRX SecGW 3 rd Party Feeds JSA SKY ATP SDSN Policy Enforcer Policy update for Service Chain Dynamic service Contrail Service chains Orchestrator IoT App Network Perf App SGi from EPC vsrx IoT TELCO CLOUD POLICY ENFORCER Describe traffic pathways for IoT and Network performance apps at Mobile Hub and Telco Cloud DETECTION Sky ATP: IoT malware detection Sky ATP: cloud server malware detection JSA: multi-dimensional detection ENFORCEMENT vsrx provisioned in service chains Infected IoT devices & servers quarantined Enforce legitimate traffic pathways

12 Use Case: Distributed Security Gateway LTE-A Features available as software upgrades 2016 onwards Coordinated Multi-Point (CoMP) Enhanced Inter-cell Interference Coordination, (eicic) Drive inter-cell site coordination & backhaul network requirements Timing: Frequency & Phase: Frequency16ppB, Phase +/- 0.5µSecs Distributed Security: X2 Handover Interface requires a latency of <3-5ms Accurate timing current & installed backhaul is a major change: accuracy relies on hardware Security gateways: Core SecGW terminates S1 IPsec tunnels & protects EPC Distributed LTE-A SecGW for X2 at the Hub-Site deployed at Fiber Edge IP Access Network CSR LTE-A X2 Traffic MX104 Hub site router Distributed SecGW w/ms-mic IPsec Termination for LTE-A X2 LTE-A S1 Traffic IPsec Termination For LTE S1 & X2 Protects EPC IPsec Termination for LTE-A S1 Other security features available CORE Switch Site Macro Cell Site Hub Site POC3 Hub Site LTE S1 Traffic LTE X2 Traffic Core LTE SecGW SRX5800 LTE SecGW EDGE Router EDGE Router Source: Qualcomm

13 Services Security Everywhere Customer Lifecycle Plan Build Operate Assessment Design Deployment Migration Maintenance Optimization Juniper Service Offerings Juniper Professional Services Security & SDSN Assessment and Deployment Security VNF Testing & Deployment Service Custom Engagements Customer On-Boarding Juniper Care Juniper Care Plus Juniper Optimum Care Juniper Education and Training

14 Proof Points Security Everywhere Juniper s SDSN framework We believe that security is the 'killer app' that will accelerate SDN adoption. The complement of SDN and security can solve one of the greatest problems enterprises have dealt with over the last 25 years of enterprise network expansion, an operationally efficient way to implement policy, detection and enforcement across the entire network. With its Software- Defined Secure Networking vision, Juniper is making a move in that direction. Mike Spanbauer, VP of Security Test & Advisory, NSS Labs The low footprint and high density advantages of the csrx, will allow us greater leverage to secure east west traffic. The multi-core vsrx delivers high performance and the ability to handle large amounts of traffic We expect both products to significantly increase the benefits we deliver to our customers. John White, VP of Product Strategy, Expedient As the security landscape continues to evolve, it is more important than ever to work together to combat cyber threats. These key additions to our security portfolio will further our Software-Defined Secure Networking vision and greatly benefit our customers Kevin Walker, Juniper Security CTO Comprehensive Global policy orchestration, unified threat detection, and automated + localized enforcement Interoperable Security solution interoperability and integration with major RAN vendors Integrated Integrated security policy enforcement into products like LTE Security Gateway function on Pre/IP-Agg routers High Performance Industry s highest performance physical and virtual firewalls for networks and Data Centers Open Framework Combined with proprietary countermeasures for advanced threat protection from the cloud

15 Mobile Cloud Architecture 1 of 5 Solutions within Juniper s Mobile Cloud Architecture Security Everywhere Use Cases Partners Services Automated Control & Orchestration Security Everywhere IPsec SecGw. FW, NAT, VPN SecGw FW, NAT, VPN Disaggregation & Virtualization Distributed Data Centers Integrated Packet, Optical & Timing Solutions Products Enterprise Site Software Defined Secure Networking Security detection, policy, and enforcement everywhere SRX Series Services Gateways Firewall, NAT, VPN vsrx Virtual Firewall, NAT, VPN, IPsec Sky ATP Advanced Threat Protection Het-Net Sites (Macro & Small Cells) Distributed Compute Node Distributed Data Center Access & Aggregation Network NGCO Regional Data Center Core Network Application Application Enablement Layer Compute Application Centralized Data Center Internet/ Roaming Junos Space Security Director Services Residential Business Security and SDSN Assessment and Deployment Services, Security VNF Testing & Deployment Service

16 Mobile Cloud Architecture Use Cases Partners Services Juniper s Mobile Cloud Architecture E2E Offering for your Next-gen Secure Distributed Telco Cloud from the Industry s Most Trusted Vendor Automated Control & Orchestration Industry s most deployed SDN solution for multi-vendor and multi-layer network automation. Security Everywhere Industry s most innovative and comprehensive platform to secure the distributed telco cloud. Disaggregation & Virtualization Pioneer in utilizing an open framework to ensure a seamless migration to carrier-grade NFV. Distributed Data Centers Complete, automated and secure solutions for mini DCs at the edge and large DCs in the core. Integrated Packet, Optical & Timing Solutions Integrated solutions from a global leader and innovator in packet networking and optical DCI. Enterprise Site Key mobile use cases supported Application Application Distributed Data Center Regional Data Center Application Enablement Layer Best-of-breed partner ecosystem Compute Best-in-class life-cycle service & support Het-Net Sites (Macro & Small Cells) Distributed Compute Node Access & Aggregation Network NGCO Core Network n Centralized Data Center Internet/ Roaming Residential Business

17 Thank you

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017 Overview of the Juniper Mobile Cloud Laying the Foundation for a Next-gen Secure Telco Cloud Mobile World Congress 2017 Summary Mobile Challenges and Trends through 2020 Business Drivers Enable new revenue

More information

Overview of the Juniper Networks Mobile Cloud Architecture

Overview of the Juniper Networks Mobile Cloud Architecture Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Security Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper

Security Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper Security Everywhere within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Build a Software-Defined Network to Defend your Business

Build a Software-Defined Network to Defend your Business Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks

More information

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment

More information

Distributed Data Centers Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017

Distributed Data Centers Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017 Distributed Data Centers Within Juniper Networks Mobile Cloud Architecture Mobile World Congress 2017 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points Juniper s Mobile

More information

Integrated Packet, Optical & Timing Solutions Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017

Integrated Packet, Optical & Timing Solutions Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017 Integrated Packet, Optical & Timing Solutions Within Networks Mobile Cloud Architecture Mobile World Congress 2017 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points

More information

Software-Define Secure Networks The Future of Network Security for Digital Learning

Software-Define Secure Networks The Future of Network Security for Digital Learning Software-Define Secure Networks The Future of Network Security for Digital Learning SIGS, 5.Juli 2015 Klaus Ernst, Systems Engineer Juniper Networks Threat Landscape Feels like Treading Water 2017 IT Priorities

More information

Zero Trust Security with Software-Defined Secure Networks

Zero Trust Security with Software-Defined Secure Networks Zero Trust Security with Software-Defined Secure Networks Srinivas Nimmagadda and Pradeep Nair Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject

More information

Software-Defined Secure Networks in Action

Software-Defined Secure Networks in Action Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated

More information

Digital Transformation

Digital Transformation Digital Transformation Content Consumer Pankaj Kitchlu CTO, Juniper Network (India-SAARC) Legal Statement Regarding Current Products and Intentions This statement of product direction sets forth Juniper

More information

SECURING THE MULTICLOUD

SECURING THE MULTICLOUD SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.

More information

Software Defined Secure Networks

Software Defined Secure Networks Software Defined Secure Networks Seguridad Avanzada en Campus Complejos José Fidel Tomás fidel.tomas@juniper.net Security is in Transformation THREAT SOPHISTICATION Zero day attacks Advanced, persistent,

More information

Policy Enforcer. Product Description. Data Sheet. Product Overview

Policy Enforcer. Product Description. Data Sheet. Product Overview Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.

More information

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks Defending Against Unkown Automation is the Key Rajesh Kumar Juniper Networks When and not if you will get attacked! ON AVERAGE, ATTACKERS GO UNDETECTED FOR OVER 229 DAYS Root cause of Security Incidents

More information

Software-Defined Secure Networks. Sergei Gotchev April 2016

Software-Defined Secure Networks. Sergei Gotchev April 2016 Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average

More information

Stop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks

Stop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks Stop Threats Faster Vaishali Ghiya & Dwann Hall Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases

More information

Journey to Secure and Automated Multi-cloud

Journey to Secure and Automated Multi-cloud Journey to Secure and Automated Multi-cloud 2018 Mark Hinckley WW SE and Partner Enablement Juniper Networks Agenda Evolution of Value [Chain] Rise of Enterprise Multicloud Network as the Security Platform

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

Distributed Data Centers within the Juniper Networks Mobile Cloud Architecture. White Paper

Distributed Data Centers within the Juniper Networks Mobile Cloud Architecture. White Paper Distributed Data Centers within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Extending Enterprise Security to Multicloud and Public Cloud

Extending Enterprise Security to Multicloud and Public Cloud Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention The evolution of malware threat mitigation Nguyễn Tiến Đức ntduc@juniper.net 1 Most network security strategies focus on security at the perimeter only outside in.

More information

Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud

Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud acezar@juniper.net MARKET DYNAMICS Branch/WAN Evolution: PMO FMO Bring Agility and Enhanced Customer Experience Utilizing Cloud

More information

Mitigating Branch Office Risks with SD-WAN

Mitigating Branch Office Risks with SD-WAN WHITE PAPER Mitigating Branch Office Risks with SD-WAN 1 M itigating Branch Office Risks with SD-WAN Branch Security Overview The branch or remote office stands out as a point of vulnerability in an increasingly

More information

Service Automation Made Easy

Service Automation Made Easy Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their

More information

Cloud-Enable Your District s Network For Digital Learning

Cloud-Enable Your District s Network For Digital Learning Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission

More information

Leverage SDN Principles in LTE to Meet Future Network Demands

Leverage SDN Principles in LTE to Meet Future Network Demands Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network

More information

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical

More information

Innovation & GTM Engine

Innovation & GTM Engine Investor Day 2014 Innovation & GTM Engine Rami Rahim EVP, Juniper Development & Innovation Vince Molinaro EVP, Chief Customer Officer October 30, 2014 How and Why Our Technology Will Win Addressing Your

More information

SD-WANs and Lifecycle Service Orchestration (LSO) October Daniel Bar-Lev Director, Office of the CTO

SD-WANs and Lifecycle Service Orchestration (LSO) October Daniel Bar-Lev Director, Office of the CTO s and Lifecycle Service Orchestration () October 2017 Daniel Bar-Lev Director, Office of the CTO About MEF MEF created the $80B* Carrier Ethernet Market. MEF s goal is to leverage the global Carrier Ethernet

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Automated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture. White Paper

Automated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture. White Paper Automated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks Mobile Cloud Architecture Automated Control and Orchrestration Juniper

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

SECURE HYBRID CLOUD Solution

SECURE HYBRID CLOUD Solution SECURE HYBRID CLOUD Solution DEFEND YOUR GREATEST ASSETS MARKET SITUATION On premise data centers = Expensive The migration of physical data centers to the private and public cloud is happening. Quickly.

More information

Software Defined Broadband Networks. Jon Mischel Director, Product Management

Software Defined Broadband Networks. Jon Mischel Director, Product Management Software Defined Broadband Networks Jon Mischel Director, Product Management This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.

More information

The Network Will Define The Winners In The Cloud

The Network Will Define The Winners In The Cloud Forward Looking Statements Statements in these presentation slides and related webcast concerning Juniper Networks business, economic, industry and market outlook, trends and opportunity; 2016 and long-term

More information

JN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.

JN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min. JN0-210.juniper Number: JN0-210 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which protocol does Juniper Networks recommend to provide real-time updates of the network topology to the NorthStar

More information

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End

More information

Versa Software-Defined Solutions for Service Providers

Versa Software-Defined Solutions for Service Providers PRODUCT BRIEF Software-Defined Solutions for Service Providers Transformative solutions to increase growth and value The Service Provider industry has seen an incredible amount of disruption due to NFV

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

Juniper Unite Cloud-Enabled Enterprise Reference Architecture

Juniper Unite Cloud-Enabled Enterprise Reference Architecture Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.

More information

Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce

Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger Director System Engineering, NCP Engineering Inc. Vaishali Ghiya Senior Director,

More information

Benefits of SD-WAN to the Distributed Enterprise

Benefits of SD-WAN to the Distributed Enterprise WHITE PAPER Benefits of SD-WAN to the Distributed Enterprise 1 B enefits of SD-WAN to the Distributed Enterprise Branch Networking Today More Bandwidth, More Complexity Branch or remote office network

More information

JUNIPER SKY ADVANCED THREAT PREVENTION

JUNIPER SKY ADVANCED THREAT PREVENTION Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX

More information

WHITE PAPER. Applying Software-Defined Security to the Branch Office

WHITE PAPER. Applying Software-Defined Security to the Branch Office Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry

More information

ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013

ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013 ETSI FUTURE Network SDN and NFV for Carriers MP Odini HP CMS CT Office April 2013 Challenges and Opportunities Reduce Capex/Opex Challenges Innovation at devices and OTT side Number of devices explode

More information

METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER

METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services

More information

IEEE NetSoft 2016 Keynote. June 7, 2016

IEEE NetSoft 2016 Keynote. June 7, 2016 IEEE NetSoft 2016 Keynote June 7, 2016 0 Contents Introduction - Network Evolution & Operator Challenges Re-architecting the RAN SDRAN: Software-defined RAN - Overview & Enabling Features SDRAN Opportunities

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

TIMING; The Key To Unlocking The Benefits Of LTE-A Timing & Security Considerations for Evolved IP Backhaul

TIMING; The Key To Unlocking The Benefits Of LTE-A Timing & Security Considerations for Evolved IP Backhaul TIMING; The Key To Unlocking The Benefits Of LTE-A Timing & Security Considerations for Evolved IP Backhaul Ian Goetz, Juniper Networks November, 2016 Market Trends & The Network Environment Mobile Market

More information

Cisco 5G Now! Product Announcements. February, 2018

Cisco 5G Now! Product Announcements. February, 2018 Cisco 5G Now! Product Announcements February, 2018 Mobile Cloud Services 2017 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Access (%) Displacing Legacy, Mobile

More information

Juniper Solutions for Turnkey, Managed Cloud Services

Juniper Solutions for Turnkey, Managed Cloud Services Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge

More information

SDN and NFV. Stepping Stones to the Telco Cloud. Prodip Sen CTO, NFV. March 16, 2016

SDN and NFV. Stepping Stones to the Telco Cloud. Prodip Sen CTO, NFV. March 16, 2016 SDN and NFV Stepping Stones to the Telco Cloud Prodip Sen CTO, NFV March 16, 2016 The Evolution of SDN and NFV 2 The technology journey: convergence of the SDN & NFV stages NFV phase 0 Decouple NFV phase

More information

Service Provider Security Architecture

Service Provider Security Architecture Service Provider Security Architecture Andrew Turner Technical Marketing, Security Business Group April 12 th 2017 Digitization is disrupting the SP business The world has gone mobile Traffic growth, driven

More information

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any

More information

Strategies for a Successful Security and Digital Transformation

Strategies for a Successful Security and Digital Transformation #RSAC SESSION ID: GPS-F02A Strategies for a Successful Security and Digital Transformation Jonathan Nguyen-Duy Vice President, Strategic Programs jnguyenduy@fortinet.com AGENDA 2017 Digital transformation

More information

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers. INTRODUCTION F5 has innovated to help operators by embracing virtualization for the key elements of its portfolio, and

More information

Extending Enterprise Security to Public and Hybrid Clouds

Extending Enterprise Security to Public and Hybrid Clouds Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are migrating toward public or hybrid clouds much faster than expected, creating

More information

Network Edge Innovation With Virtual Routing

Network Edge Innovation With Virtual Routing Independent market research and competitive analysis of next-generation business and technology solutions for service providers and vendors Network Edge Innovation With Virtual Routing A Heavy Reading

More information

Winning With Security. Ritesh Agrawal Product Line Director Rasmus Andersen Partner Sales Development

Winning With Security. Ritesh Agrawal Product Line Director Rasmus Andersen Partner Sales Development Winning With Security Ritesh Agrawal Product Line Director Rasmus Andersen Partner Sales Development Agenda EMEA MARKET A LOOK TO THE PAST JUNIPER SECURITY VISION THE ROAD AHEAD WHAT CAN YOU EFFECTIVELY

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

Building a Software-Defined Secure Network for Healthcare

Building a Software-Defined Secure Network for Healthcare Building a Software-Defined Secure Network for Healthcare Detect, adapt, and enforce security policies faster with network-wide visibility, orchestration, and control Challenge Enable digital transformation

More information

Delivering the Wireless Software-Defined Branch

Delivering the Wireless Software-Defined Branch Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,

More information

Extending Enterprise Security to Public and Hybrid Clouds

Extending Enterprise Security to Public and Hybrid Clouds Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are increasingly migrating to public or hybrid deployments, creating an immediate

More information

ENTERPRISE SECURITY MANAGEMENT. Frederick Verduyckt 20 September 2012

ENTERPRISE SECURITY MANAGEMENT. Frederick Verduyckt 20 September 2012 ENTERPRISE SECURITY MANAGEMENT Frederick Verduyckt 20 September 2012 SETTING THE AGENDA FOR THE NEXT DECADE JUNIPER NETWORKS IS TRANSFORMING THE EXPERIENCE AND ECONOMICS OF NETWORKING 2 Copyright 2012

More information

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private

More information

Evolution of connectivity in the era of cloud

Evolution of connectivity in the era of cloud Evolution of connectivity in the era of cloud Phil Harris SVP and GM SP Market Vertical Riverbed Technology 1 2017 Riverbed Technology. All rights reserved. Transformational Services Span The Business

More information

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The

More information

FUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY

FUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY FUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY Tony Sarathchandra Director, Product Management Dec 12 th, 2017 This statement of direction sets forth Juniper Networks current intention and is subject

More information

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

SDN TO BE OR NOT TO BE. Uwe Richter SE Director Russia/CIS, East and South East Europe

SDN TO BE OR NOT TO BE. Uwe Richter SE Director Russia/CIS, East and South East Europe SDN TO BE OR NOT TO BE Uwe Richter SE Director Russia/CIS, East and South East Europe uwe@juniper.net FUNDAMENTAL PROBLEMS TO SOLVE Want more innovation in networking Want it more quickly too Want more

More information

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to

More information

Cisco SD-WAN and DNA-C

Cisco SD-WAN and DNA-C Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent

More information

Junos Security Bundle, JSEC & AJSEC

Junos Security Bundle, JSEC & AJSEC Junos Security Bundle, JSEC & AJSEC COURSE OVERVIEW: This bundle combines JSEC & AJSEC at a discounted rate. Please Contact SLI to purchase this bundle. This five-day course covers the configuration, operation,

More information

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016 Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent

More information

Security in Cloud Environments

Security in Cloud Environments Security in Cloud Environments Security Product Manager Joern Mewes (joern.mewes@nokia.com) 16-11-2016 1 Cloud transformation happens in phases and will take 5+ years Steps into the cloud Now 2016+ 2020+

More information

Mobile Edge Computing:

Mobile Edge Computing: Mobile Edge Computing: Accelerating to 5G Era Hannu Flinck January 2016 1 Nokia 2015 Current megatrends Mobile computing, 5G and cloud computing Mobile computing Cloud computing 2 Nokia 2015 Architecture

More information

Optimised redundancy for Security Gateway deployments

Optimised redundancy for Security Gateway deployments Optimised redundancy for Security Gateway deployments RECAP:- JUNIPER LTE SECURITY OFFERING Customer Priorities Core elements protection RAN and UE protection SCTP protection Scalability Mission critical

More information

LTE Access Controller (LAC) for Small Cell Tool Design and Technology

LTE Access Controller (LAC) for Small Cell Tool Design and Technology LTE Access Controller (LAC) for Small Cell Tool Design and Technology http://parallelwireless.com/products/lte-access-controller/ 1 Team Expertise Came Together to Reimagine the RAN Core Access Networking,

More information

Next generation branch with SD-WAN and NFV

Next generation branch with SD-WAN and NFV Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Juniper Sky Enterprise

Juniper Sky Enterprise Juniper Sky Enterprise Product Overview Network complexity is growing exponentially. Traffic levels continue to rise thanks to the proliferation of mobile and Internet of Things (IoT) devices being connected

More information

INTERCONNECTING MULTICLOUD WITH VMX

INTERCONNECTING MULTICLOUD WITH VMX INTERCONNECTING MULTICLOUD WITH VMX Julie Zhao Senior Product Manager This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases

More information

Threat Detection & Security Policy Enforcement: A New Inflection Point in Mobile Security

Threat Detection & Security Policy Enforcement: A New Inflection Point in Mobile Security White Paper Threat Detection & Security Policy Enforcement: A New Inflection Point in Mobile Security Prepared by Patrick Donegan Chief Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net

More information

How Smart Networks are changing the Corporate WAN

How Smart Networks are changing the Corporate WAN How Smart Networks are changing the Corporate WAN Mark Bennett Head of Global Fixed Connectivity Vodafone Group Enterprise September 12017 About Vodafone Enterprise Unified Comms Cloud & Hosting Internet

More information

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today. Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces

More information

Beyond Firewalls: The Future Of Network Security

Beyond Firewalls: The Future Of Network Security Beyond Firewalls: The Future Of Network Security XChange University: IT Security Jennifer Blatnik 20 August 2016 Security Trends Today Network security landscape has expanded CISOs Treading Water Pouring

More information

HOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON)

HOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON) WHITE PAPER HOW SDN AND NFV EXTEND THE ADOPTION AND CAPABILITIES OF SELF-ORGANIZING NETWORKS (SON) WHAT WILL YOU LEARN? n SON in the radio access network n Adoption of SON solutions typical use cases n

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

Contrail SD-WAN Design & Architecture Guide

Contrail SD-WAN Design & Architecture Guide 2018 Juniper Networks, Inc. 1 Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. and/or its affiliates in the United States and other countries.

More information

10 Reasons to Choose AudioCodes Enterprise SBC

10 Reasons to Choose AudioCodes Enterprise SBC 10 Reasons to Choose AudioCodes Enterprise SBC Introduction The use of Enterprise Session Border Controllers (SBC) has become mainstream due to the adoption of SIP, according to a March 2016 IHS Research

More information

JUNIPER NETWORKS IR INVESTOR AND ANALYST UPDATE

JUNIPER NETWORKS IR INVESTOR AND ANALYST UPDATE JUNIPER NETWORKS IR INVESTOR AND ANALYST UPDATE MOBILE WORLD CONGRESS Barcelona, Spain February 28, 2012 1 Copyright 2012 Juniper Networks, Inc. www.juniper.net SAFE HARBOR Information, statements and

More information

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC.

Vodafone keynote. How smart networks are changing the corporate WAN. Peter Terry Brown Director of Connectivity & UC. How smart networks are changing the corporate WAN Vodafone keynote Peter Terry Brown Director of Connectivity & UC 17 October 2017 About Vodafone Enterprise Connectivity & UC IoT Cloud & Security Our vision:

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

PROTECT WORKLOADS IN THE HYBRID CLOUD

PROTECT WORKLOADS IN THE HYBRID CLOUD PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across

More information

ElastiNET FOR MOBILE BACKHAUL

ElastiNET FOR MOBILE BACKHAUL ElastiNET FOR MOBILE BACKHAUL OPTIMIZED MOBILE BACKHAUL TO SUPPORT 5G SERVICES ON 4G INFRASTRUCTURE The demand for mobile data is spiraling as consumers expect services, such as streamed mobile video,

More information

Security Vendor Line Card

Security Vendor Line Card Security Essential security controls required for complete security visibility Helps secure the world s largest Enterprise and provider networks from DDoS and advanced targeted attacks Deliver visibility

More information