Kunal Jha, Juniper Networks
|
|
- Christina Bell
- 6 years ago
- Views:
Transcription
1 Kunal Jha, Juniper Networks 1 1
2 Security Cloud Virtualization BYOD / Mobility SDN 2 2
3 Simplified Networking Senior Systems Engineer Juniper Networks Proprietary and Confidential -- printed copies of this document are for reference only
4 FIXED MODULAR Core Aggrega tion Access EX8216 1G-Copper EX8208 8x10G 1G-Fiber EX8200 Virtual Chassis 40x10G Extra-Scale EX6200 EX F EX Core Aggrega tion EX42000 Virtual Chassis EX4200 EX4500 Virtual Chassis EX3300 Virtual Chassis EX4550 SFP+ EX GT External RPS Access EX3200 EX4500 EX2200 EX4200-PX EX3300 EX2200-C 4 4
5 Deployed Extensively Over 19,000 customers, 15M+ ports Data center, campus, branch, SP Financials, healthcare, education #3 LAN switching vendor Why We Win Technology Flexibility Performance OPERATIONAL SIMPLICITY 5 5
6 Rigid, legacy model of I.T. THE REST OF THE DATA CENTER HAS ADVANCED DRAMATICALLY IN RECENT YEARS From To Applications On-Premise Apps Servers/ Dedicated Servers Compute Storage Dedicated Storage Software Services Virtualized Workloads Shared Storage Flexible, virtualized model 6 6
7 Rigid, legacy model of I.T. THE DATA CENTER NETWORK HAS NOT EVOLVED, AND IS NOW AN INHIBITOR From To Applications On-Premise Apps Servers/ Dedicated Servers Compute Storage Dedicated Storage Network Layers of Complexity Software Services Virtualized Workloads Shared Storage Experience? Economics? Flexible, virtualized model 7 7
8 Ethernet Network evolution Legacy three-tier data center 2. Juniper two-tier data center 1. Juniper s data center fabric W Up to 75% of traffic E 8 8
9 Virtual chassis : advantage Core Switches 128 Gig Distribution Switches 10 Gig 10 Gig 10 Gig 10 Gig Access Switches 9 9
10 Multi Building campus Deployment example Utilize the same MM fiber One-switch LAN 1 to manage 1 to upgrade 1 software version No L2 Loop/No STP required High Availability Redundant Pwr/Cooling Redundant Switch Fabric Sub-second Convergence in case of device/link failure Integrated Access Security Integrated QoS for Voice/Video/Data Local L3/L2 processing Peer-peer traffic can be processed by VC ring itself, no need to load the core. Optimized for Voice and Video over IP as inter building bypasses the core switch. GbE/10GbE VCP Lab Bldg 2 EX4200 Virtual Chassis Classroom Bldg 3 EX4200 Virtual Chassis EX4200 Virtual Chassis 1GbE uplink Admin Bldg 1 One Virtual Chassis to Manage for the entire campus backbone 1GbE uplink Classroom Bldg 4 EX4200 Virtual Chassis Recreation Bldg 5 EX4200 Virtual Chassis GbE/10GbE VCP WAN 10 10
11 Distributed CORE with 8-member VC EX4200 A Location EX4200 EX4200 C Location EX4200 Single core switch to manage across all sites One core switch to manage across multiple sites EX4200 EX4500 EX4200 EX4500 Sites could be campus or DC or both common hardware and operating system Location B Location D Seamless virtual workload mobility across sites 11 11
12 TRANSFORM THE NETWORK One Network Flat, any-to-any connectivity Single device N=1 Switch Fabric Data Plane Flat Any-to-any Control Plane Single device Shared state A Fabric has the. Performance and simplicity of a single switch And the Scalability and resilience of a network 12 12
13 Chassis Switch End of Row Single point of management Cabling complexity 13 13
14 QFabric evolving the single switch model Director Fabric Route Engine Separate the I/O modules from the fabric and replace copper traces with fiber links. For redundancy add multiple Interconnect devices. Federated Control and Intelligent Nodes One logical switch Interconnect I/O Modules Node Chassis Switch QFabric 14 14
15 QFABRIC Family Summary Scalability Runs Junos QFX3000-M 10s to 768 ports QFX3000-G 10s to 6,144 ports Rich functionality Performance QFX3000-M Low jitter <3us on avg. Simplicity N=1 QFX3000-G Low jitter <5us on avg. Lossless DCB compliant Storage End-to-end FCoE FCoE/FC Gateway and FCoE/iSCSI Transit Switch Designed for Modern DC Virtualization and convergence Seamless Layer 2 and Layer 3 Flexible VLAN capability 15 15
16 Approaches To Securing Virtual servers: 1. VLAN Segmentation Each VM in separate VLAN Inter-VM communications must route through the firewall Drawback: Possibly complex VLAN networking 2. Agent-based Each VM has a software firewall Drawback: Significant performance implications; Huge management overhead of maintaining software and signature on 1000s of VMs 3. Kernel-based Firewall VMs can securely share VLANs Inter-VM traffic always protected High-performance from implementing firewall in the kernel Micro-segmenting capabilities VM1 VM2 VM3 VM1 VM2 VM3 VM1 VM2 VM3 ESX Host ESX Host FW as Kernel Module ESX Host HYPERVISOR HYPERVISOR HYPERVISOR FW Agents 16 16
17 vgw Firewall Performance TCP Throughput Test (Standard 1500 Byte packet size). See slide notes for details 17 17
18 Juniper is recognized industry leader in Security Leaders Quadrant in Four Categories: Network Access Control SIEM/STRM SSL VPN FW/IPSec VPN Visionaries Quadrant in: Intrusion Prevention Category Network Access Control SIEM/STRM SSL VPN Firewall/IPSec VPN SSL VPN Intrusion Prevention 18 18
19 Inconvenient Statistics 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two years through insecure Web apps. Ponemon Institute 19 19
20 WAF is not enough Bot Nets Targeted Scanners IP Scanners Reliance on signatures Static attack surface No understanding of attackers Reactive Manual Hacking 20 20
21 WAF is not enough WAFW00F can fingerprint WAF products protecting a website. Can already profile 20 WAF products. 21 Source: 21
22 5 attack Phases:- APT behaviour Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Silent Reconnaissance Attack Vector Establishment Attack Implementation Attack Automation Maintenance Attackers profile physical and virtual devices and applications Weaknesses in attack surface identified for attack Attacks launched to take control of device, application or VM. Can be used to begin further Reconnaissance Repeat attack to increase effectiveness, increase Profit or extract more data Evade patching and remediation measures to stop the attack WAF Plays Here Plays Here 22 22
23 The Junos WebApp Secure (MYKONOS) advantage Deception-based Security Detect Track Profile Respond Tar Traps detect threats without false positives. Track IPs, browsers, software and scripts. Understand attacker s capabilities and intents. Adaptive responses, including block, warn and deceive
24 Detection by Deception Tar Traps Query String Parameters Network Perimeter Hidden Input Fields Client Firewall App Server Database Server Configuration 24 24
25 Fingerprint of An Attacker Timezone Browser version Fonts Browser add-ons 200+ attributes used to create the fingerprint. ~ Real Time availability of fingerprints IP Address False Positives nearly zero 25 25
26 Smart Profile of Attacker Attacker local name (on machine) Attacker global name (in Spotlight) Attacker threat level Incident history 26 26
27 Respond and Deceive Junos WebApp Secure Responses Human Hacker Botnet Targeted Scan IP Scan Scripts &Tools Exploits Warn attacker Block user Force CAPTCHA Slow connection Simulate broken application Force log-out All responses are available for any type of threat. Highlighted responses are most appropriate for each type of threat
28 Solution Slides Mobility & BYOD 28 28
29 THE HISTORY OF BUSINESS CONNECTIVITY Terminals PCs Laptops Mobile Devices Serial Networks Ethernet Networks Casual Wireless Primarily Wireless 29 29
30 Juniper wireless today Over 6,000 Customers 1 M+ AP installed base since 2005 Healthcare Education (Higher Ed & K-12) Hospitality Presence in Fortune 500: Shell, Chevron, Alcoa, Audi, VW Many Mission Critical Environments: University Minnesota 18,000 AP, 300 Buildings, 1200 Acres Belfast Health & Social Care Trust 2,220 AP, 7 hospitals, 22,000 Staff Largest wlan patent portfolio today Proven Technology Track Record: Simple, Secure, Mobile Real Time Location Aware 17 issued patents, 49 pending Differentiating WLAN Innovations: Seamless roaming Life Cycle Management Intelligent Switching Controller Virtualization Identity Based Networking Unified Mobility Services 30 30
31 Juniper Networks Wireless LAN Evolution Fat AP Architecture Local Switching Thin AP Architecture Central Switching Juniper WLAN Architecture Local AND Central Switching Optimized for: x Security x Management x Reliability Performanc e Optimized for: Security Management x Reliability x Performanc Copyright 2011 Juniper Networks, Inc. e Optimized for: Security Management Reliability Performanc e
32 DISTRIBUTED SWITCHING MAXIMIZES SCALABILITY Centralized-Only Switching Breaks Down Under Increased Load from n Cisco & Aruba 10x increase exceeds controller capacity Distributed Switching Handles n without Breaking Down Juniper Internet Internet 11n increases load by up to 10x All traffic gets forwarded by controller Twice the traffic through network core n increases load up to 10x Can't scale without expensive upgrades Traffic can be forwarded by the AP Optimized traffic flows ideal for voice n has no impact on controller Scales in place without upgrades 32 32
33 RESILIENCY ADVANTAGE OF WLAN VIRTUALIZAION Hot Standby Approach - Aruba Controller Virtualization - Juniper Catastrophic failure dropped user sessions (imagine voice call) APs restart using hot standby controller No AP load balancing across controllers Fully loaded hot standby required Hitless failover even for active session (including voice calls) APs instantly remapped to in-service controller Dynamic AP load balancing across controllers No additional equipment required 33 33
34 Core differentiator: CONTROLLER CLUSTERING Competitors Complex Approach Vendor A Hot Stand-by or Back-up controller Vendor B Juniper s Simplified Approach Controller A Controller B Controller C Discrete controllers operate independently for AP redundancy configuration Harder to scale since adding capacity is cumbersome Limited resiliency APs mapped directly to controller & resets upon network/device failure Limited reliability N+1 (limited to number of designated back-up switches) Difficult to manage, highest cost of ownership Clustered controllers act collectively as single virtual controller for wireless configuration Easy to scale Capacity can be added in chunks, anywhere in the network Highest resiliency APs dynamically map to controllers optimized, auto AP load balancing Always-on reliability many-to-many redundancy all switches can serve as back-up Easiest to manage, lowest cost of ownership 34 34
35 35 35
THE EXPONENTIAL DATA CENTER
THE EXPONENTIAL DATA CENTER THE TYRANNY OF TREES Typical tree configuration Location matters in a tree architecture Bubbles Optimal performance VM One Hop 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net
More informationMETAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER
METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH
More informationTHE NEW NETWORK IS SIMPLIFIED
THE NEW NETWORK IS SIMPLIFIED IT security seminar Stallion IOIIII, Tallinn Jukka Piirainen November 10, 2011 JUNIPER NETWORKS A DECADE OF INNOVATION 2010 M Series FORTUNE 1 THOUSAND #789 2008 2009 2007
More informationCAMPUS AND BRANCH RECAP. Ralph Wanders Consulting Systems Engineer
CAMPUS AND BRANCH RECAP Ralph Wanders Consulting Systems Engineer THE NEW CAMPUS & BRANCH ARCHITECTURE IS SIMPLY CONNECTED.. BYOD, Explosion of Apps Coordinated Security Simply Connected Performance at
More informationSAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012
SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationWHAT S NEW FROM JUNIPER?
WHAT S NEW FROM JUNIPER? IT security seminar Stallion 071112, Tallinn Jukka Piirainen Channel Manager PURE PLAY IN HIGH-PERFORMANCE NETWORKING First 10 Years Of Juniper: 1996-2006 Routing Security M Series
More informationJUNIPER SIMPLY CONNECTED WIRELESS LAN PROMOTION. Stallion Winter Seminar March 2013
JUNIPER SIMPLY CONNECTED WIRELESS LAN PROMOTION Stallion Winter Seminar March 2013 AGENDA 1 Market Trends 2 Why Juniper Networks for WLAN 3 WLAN Promotion Details 2 Copyright 2012 Juniper Networks, Inc.
More informationEXECUTING ON PLATFORM & SOFTWARE INNOVATION
EXECUTING ON PLATFORM & SOFTWARE INNOVATION Stefan Dyckerhoff EVP PLATFORM SYSTEMS DIVISION Bob Muglia EVP SOFTWARE SOLUTIONS DIVISION KEY ACCOMPLISHMENTS Continued momentum in the Enterprise Taking share
More informationPrepare Your Network for BYOD. Meraki Webinar Series
Prepare Your Network for BYOD Meraki Webinar Series 1 Agenda Introduction to Meraki and Cloud Networking BYOD objectives Taming BYOD: capacity, security & management Design considerations Live demos Product
More informationDeep Dive QFX5100 & Virtual Chassis Fabric Washid Lootfun Sr. System Engineer
Deep Dive QFX5100 & Virtual Chassis Fabric Washid Lootfun Sr. System Engineer wmlootfun@juniper.net 1 Copyright 2012 Juniper Networks, Inc. www.juniper.net QFX5100 product overview QFX5100 Series Low Latency
More informationTHE NETWORK AND THE CLOUD
THE NETWORK AND THE CLOUD BUILDING THE FOUNDATION FOR THE MODERN DATA CENTER Andy Ingram SVP Worldwide Data Centers 1 Copyright 2012 Juniper Networks, Inc. www.juniper.net Occam s Razor: When faced with
More informationIntroduction to Cloud Networking. Company and Product Overview
Introduction to Cloud Networking Company and Product Overview About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed - Founded in 2006 at MIT - tradition of innovation
More informationJuniper Networks Switching: EX & QFX Series
Sales Guide straight to the point Juniper Networks Switching: EX & QFX Series Juniper Sales team: juniper@westconsecurity.be tel. +32 2 461 01 703 Juniper Product Manager: bart.degroote@westconsecurity.be
More informationLearn more with Westcon. Switching: EX & QFX Series SALES GUIDE Your JUNIPER NETWORKS dedicated Sales Team
Learn more with Westcon Switching: EX & QFX Series Your JUNIPER NETWORKS dedicated Sales Team Tel. +34 91 563 92 88 marketing.iberia@westcon.es www.westcon.es SALES GUIDE 2014 Juniper Networks - Connect
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationIntroduction. Trusted by Thousands of Customers Worldwide. Recognized for Innovation
2013 Company Brochure Introduction 100% Cloud Managed Enterprise Networks Meraki s cloud managed edge and branch networking solutions bring simplicity to enterprise-class networks. With wireless, switching,
More informationWireless LAN Solutions
Wireless LAN Solutions Juniper Networks delivers wireless solutions for enterprises of all sizes and types from small retail installations to the largest campuses Your JUNIPER NETWORKS dedicated Sales
More informationJUNIPER NETWORKS VIRTUAL CHASSIS FABRIC TECHNOLOGY
White Paper JUNIPER NETWORKS VIRTUAL CHASSIS FABRIC TECHNOLOGY A Fast, Flat Network for Medium-Sized and Large Data Centers Copyright 2014, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationSD-WAN Transform Your Agency
Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is
More informationBUILD A BUSINESS CASE
BUILD A BUSINESS CASE NOW S THE TIME TO INVEST IN NETWORK ARCHITECTURES THAT MAXIMIZE VIRTUALIZATION AND CLOUD COMPUTING table of contents.... 1.... 2.... 3.... 5 A TechTarget White Paper Business and
More informationMODERNIZE YOUR DATA CENTER. With Cisco Nexus Switches
MODERNIZE YOUR DATA CENTER With Cisco Nexus Switches TABLE OF CONTENTS TABLE OF CONTENTS Data Center Needs are Changing Cisco Nexus Switches Lead the Transition to a Next Generation Data Center Outcomes
More informationEX2200 & EX2300 Sales Guide. March 2017
EX2200 & EX2300 Sales Guide March 2017 Campus Challenges & Trends Campus Trends & Challenges Shift to Cloud Cloud applications are accessed 24/7 from any device Be in control of who is accessing your applications
More informationNetworking Drivers & Trends
NSA Series Overview Agenda Networking Drivers & Trends New Risks & Challenges Current Solutions Introducing SonicWALL S NSA Series Product Specs Competition Launch Notes Networking Drivers & Trends Business
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationJuniper Virtual Chassis Technology: A Short Tutorial
Juniper Virtual Chassis Technology: A Short Tutorial Victor Lama Fabric Specialist LE Northeast Region August 2010 What if? What if your company could drastically minimize the complexity of managing your
More informationIntroducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN
Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity
More informationSelling the Total Converged Solution Module #1: Nortel Enterprise Networking Overview of the 4 Pillars and Why Nortel Tom Price Nortel HQ Sales
Selling the Total Converged Solution Module #1: Nortel Enterprise Networking Overview of the 4 Pillars and Why Nortel Tom Price Nortel HQ Sales Engineer 1 Nortel Value Proposition >Nortel has an End-to-End
More informationVIRTUAL CLUSTER SWITCHING SWITCHES AS A CLOUD FOR THE VIRTUAL DATA CENTER. Emil Kacperek Systems Engineer Brocade Communication Systems.
VIRTUAL CLUSTER SWITCHING SWITCHES AS A CLOUD FOR THE VIRTUAL DATA CENTER Emil Kacperek Systems Engineer Brocade Communication Systems Mar, 2011 2010 Brocade Communications Systems, Inc. Company Proprietary
More informationJUNIPER STRATEGY TO CONVERGE WIRELESS AND FIXED ETHERNET IN A CAMPUS INFRASTRUCTURE. PHAL NANDA Sept 2012
JUNIPER STRATEGY TO CONVERGE WIRELESS AND FIXED ETHERNET IN A CAMPUS INFRASTRUCTURE PHAL NANDA Sept 2012 TODAY S NETWORKS & CHALLENGES 2 Copyright 2012 Juniper Networks, Inc. www.juniper.net MAJOR MARKET
More informationCommunity College LAN Deployment Guide
LAN Design The community college LAN design is a multi-campus design, where a campus consists of multiple buildings and services at each location, as shown in Figure 1. Figure 1 Community College LAN Design
More informationCommunity College LAN Design Considerations
CHAPTER 3 LAN Design The community college LAN design is a multi-campus design, where a campus consists of multiple buildings and services at each location, as shown in Figure 3-1. 3-1 LAN Design Chapter
More informationCloud-Enable the Enterprise with Junos Fusion
Cloud-Enable the Enterprise with Junos Fusion Simple, smart, flexible solution for managing the corporate network as a single, logical device 1 Table of Contents Executive Summary... 3 Introduction...
More informationCiprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.
Ciprian Stroe Senior Presales Consultant, CCIE#45766 2015 Cisco and/or its affiliates. All rights reserved. Complete cloud-managed networking solution Wireless, switching, security, MDM Integrated hardware,
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationSwitchX Virtual Protocol Interconnect (VPI) Switch Architecture
SwitchX Virtual Protocol Interconnect (VPI) Switch Architecture 2012 MELLANOX TECHNOLOGIES 1 SwitchX - Virtual Protocol Interconnect Solutions Server / Compute Switch / Gateway Virtual Protocol Interconnect
More informationBUILDING A MISSION CRITICAL WIRELESS NETWORK TO SUPPORT THE GROWING DEVICE PROLIFERATION Maxime Deparisse 07/09/2012
BUILDING A MISSION CRITICAL WIRELESS NETWORK TO SUPPORT THE GROWING DEVICE PROLIFERATION Maxime Deparisse 07/09/2012 AGENDA Old WLAN Network Model High availability WLAN model High Performance WLAN Network
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationNetwork Configuration Example
Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationOverview of the Juniper Networks Mobile Cloud Architecture
Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,
More informationBROCADE ARUBA PARTNERSHIP ANNOUNCEMENT FREQUENTLY ASKED QUESTIONS
FAQ BROCADE ARUBA PARTNERSHIP ANNOUNCEMENT FREQUENTLY ASKED QUESTIONS Introduction This document answers frequently asked questions about the Brocade Aruba strategic relationship announcement to deliver
More informationTHE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY
THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY DATA CENTER WEB APPS NEED MORE THAN IP-BASED DEFENSES AND NEXT-GENERATION FIREWALLS table of contents.... 2.... 4.... 5 A TechTarget White Paper Does
More informationThe Next Opportunity in the Data Centre
The Next Opportunity in the Data Centre Application Centric Infrastructure Soni Jiandani Senior Vice President, Cisco THE NETWORK IS THE INFORMATION BROKER FOR ALL APPLICATIONS Applications Are Changing
More informationMeraki MX Family. Overview
DATASHEET Meraki MX Family Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure, and easy to manage. The world s
More informationThe Cisco BYOD Smart Solution
1 Security, Flexibility, and Performance for Any Workspace 2 Today, organizations have various devices on their networks. To manage the proliferation of personal devices, bring your own device (BYOD) policies
More informationJuniper Networks M Series and J Series Routers
PRODUCT CATEGORY BROCHURE Juniper Networks M Series and J Series Routers Juniper Networks Enterprise Routers New Levels of Security, Availability, Predictable Performance, and Operations Agility for Today
More informationJuniper Solutions for Turnkey, Managed Cloud Services
Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge
More informationBROCADE CAMPUS. Bill Ryan. August 23, Brocade Communications Systems, Inc. Proprietary Information
BROCADE CAMPUS NETWORKING OVERVIEW Bill Ryan Sr. Product Manager, Campus Networking August 23, 2012 2012 Brocade Communications Systems, Inc. Proprietary Information 1 Legal Disclaimer All or some of the
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationDell EMC Networking: the Modern Infrastructure Platform
Dell EMC Networking: the Modern Infrastructure Platform From Core to Edge to Campus. Fabio Bellini Network Sales Engineer CIO challenge: next-gen infrastructures are needed Traditional Open-Networking
More informationNETWORK ARCHITECTURES AND CONVERGED CLOUD COMPUTING. Wim van Laarhoven September 2010
NETWORK ARCHITECTURES AND CONVERGED NETWORKS FABRICS FOR CLOUD COMPUTING Wim van Laarhoven Wim.vanlaarhoven@brocade.com +31653794500 16 September 2010 Legal Disclaimer All or some of the products detailed
More informationMeraki 2014 Solution Brochure
Meraki 2014 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.
More informationBYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013
BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers
More informationEvolution with End-to-End Data Center Virtualization
Evolution with End-to-End Data Center Virtualization Yves Louis DC Virtualisation Technical Solution Architect Agenda Data Center Virtualization Overview Front-End Data Center Virtualization Core Layer
More informationSOLUTION BROCHURE. Mobility Changes Everything
SOLUTION BROCHURE Simply Connected The New Campus Network Mobility Changes Everything Simply Connected Vision The challenge of the new business network is expectations: Expectations of solving long-standing
More informationImprove application deployment by 400% with your own private cloud
Improve application deployment by 400% with your own private cloud Increase Business Agility and Revenue Andy Leung Senior Consulting Manager, Center of Excellence THE NATURAL DESIRE FOR CUSTOMIZATION
More informationJuniper Unite Cloud-Enabled Enterprise Reference Architecture
Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationFIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?
WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take
More informationCampus network: Looking at the big picture
Outline Politecnico di Torino architecture and management Marcello Maggiora, Antonio Lantieri, Marco Ricca Building blocks Core, Distribution, Access, Edge network architecture Core network Distribution
More informationStop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks
Stop Threats Faster Vaishali Ghiya & Dwann Hall Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases
More informationFirewalls for Secure Unified Communications
Firewalls for Secure Unified Communications Positioning Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Firewall protection for call control
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationALWAYS ON ENTERPRISE. Juniper WLAN/LAN offering the ON enterprise foundation. Alain Levens ADVANCED TECHNOLOGY TECH-LEAD SPECIALIST FEBRUARY, 2014
ALWAYS ON ENTERPRISE Juniper WLAN/LAN offering the ON enterprise foundation Alain Levens ADVANCED TECHNOLOGY TECH-LEAD SPECIALIST FEBRUARY, 2014 TRENDS AND CHALLENGES BYOD, M2M explosion, casual to critical
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationWhy EXTREME NETWORKS. NES Communications Partner event 2018
Why EXTREME NETWORKS NES Communications Partner event 2018 Michal Zlesák Sales Director / Central&South Eastern Europe&Israel mizlesak@extremenetworks.com Today s Challenges Digital Transformation Cyber
More informationUnified Access Network Design and Considerations
CHAPTER 2 Unified Network Design and Considerations Cisco Borderless Network Architecture The Unified Solution uses at its foundation the Cisco Borderless Network architecture and the Cisco Borderless
More informationSRX als NGFW. Michel Tepper Consultant
SRX als NGFW Michel Tepper Consultant Firewall Security Challenges Organizations are looking for ways to protect their assets amidst today s ever-increasing threat landscape. The latest generation of web-based
More informationNetworking Update. August 2017
Networking Update August 2017 Disclaimer This statement of product direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases are contingent
More informationTotal Threat Protection. Whitepaper
Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in
More informationCato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.
Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces
More informationFeature Comparison Summary
Feature Comparison Summary, and The cloud-ready operating system Thanks to cloud technology, the rate of change is faster than ever before, putting more pressure on IT. Organizations demand increased security,
More informationInnovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief
Innovative. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Technology Brief Comparison of SD WAN SD-WAN Overview By the end of 2019, 30% of enterprises will use SD-WAN products in
More informationResilient WAN and Security for Distributed Networks with Cisco Meraki MX
Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief
More informationThe Economic Benefits of a Cooperative Control Wireless LAN Architecture
White Paper The Economic Benefits of a Cooperative Control Wireless LAN Architecture Aerohive Networks, Inc. 3150-C Coronado Avenue Santa Clara, California 95054 Phone: 408.988.9918 Toll Free: 1.866.918.9918
More informationOmniSwitch 6850E Stackable LAN Switch
1 OmniSwitch 6850E Stackable LAN Switch Sales Presentation 1 Presentation Title Month Year OmniSwitch 6850E Product Family The OmniSwitch 6850E series: Is the latest Alcatel-Lucent s line of layer-3 GigE
More informationIBM Ethernet Switch J48E
IBM Ethernet Switch J48E The IBM J48E Ethernet Switches with Virtual Chassis technology combine the high availability (HA) and carrier-class reliability of modular systems with the economics and flexibility
More informationBrocade Ethernet Fabrics
Brocade Ethernet Fabrics Brocade 9 June 2015 On-Demand Data Center Network Technologies Strategic focus areas FIBRE CHANNEL FABRICS ETHERNET FABRICS CORE ROUTING SDN NFV CLOUD ORCHESTRATION 2015 Brocade
More informationExam Questions
Exam Questions 300-160 DCID Designing Cisco Data Center Infrastructure https://www.2passeasy.com/dumps/300-160/ 1. Which three components are needed to implement Cisco VM-FEX on the Cisco UCS platform?
More informationEthernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade
Ethernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade fkoelmel@broc 10/28/2013 2 2012 Brocade Communications Systems, Inc. Proprietary Information ETHERNET FABRICS
More informationBT Connect Networks that think Optical Connect UK
BT Connect Networks that think Optical Connect UK Fast, reliable, secure and affordable Connecting the heart of your organisation Your organisation and its people rely on its applications email, databases,
More informationJUNIPER PRODUCT UPDATE. Jukka Piirainen Stallion Winter Seminar
JUNIPER PRODUCT UPDATE Jukka Piirainen Stallion Winter Seminar 13.2.2010 SETTING THE AGENDA FOR THE NEXT DECADE JUNIPER NETWORKS IS TRANSFORMING THE EXPERIENCE AND ECONOMICS OF NETWORKING 2 Copyright 2010
More informationPCI Express x8 Single Port SFP+ 10 Gigabit Server Adapter (Intel 82599ES Based) Single-Port 10 Gigabit SFP+ Ethernet Server Adapters Provide Ultimate
NIC-PCIE-1SFP+-PLU PCI Express x8 Single Port SFP+ 10 Gigabit Server Adapter (Intel 82599ES Based) Single-Port 10 Gigabit SFP+ Ethernet Server Adapters Provide Ultimate Flexibility and Scalability in Virtual
More informationDeploying Data Center Switching Solutions
Deploying Data Center Switching Solutions Choose the Best Fit for Your Use Case 1 Table of Contents Executive Summary... 3 Introduction... 3 Multivector Scaling... 3 Low On-Chip Memory ASIC Platforms...4
More informationNetwork Virtualization Business Case
SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,
More informationQuestion No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.
Volume: 162 Questions Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.) A. easy management B. infrastructure
More informationMobile-First. Campus Switching. Introducing Aruba Aruba Inspiration Day. Dennis Ladefoged - Systems Engineer
Mobile-First Campus Switching Introducing Aruba 8400 @Arrow Aruba Inspiration Day Dennis Ladefoged - Systems Engineer MODERN DESIGN PHILOSOPHY: ARUBA S HERITAGE AND VISION BORN IN THE MOBILE-CLOUD AND
More informationThe Market Disruptor. Mark Pearce EMEA Director Channel Networking November 16 th Networking Solutions for the Future-Ready Enterprise
Dell EMC Networking The Market Disruptor Mark Pearce EMEA Director Channel Networking November 16 th 2016 Networking Solutions for the Future-Ready Enterprise DELL EMC Networking Innovations & Thought
More informationPT Unified Application Security Enforcement. ptsecurity.com
PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over
More informationTHE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017
THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R
More informationMeraki Solution Brochure
Meraki 2016 Solution Brochure Introduction 100% Cloud Managed IT Cisco Meraki cloud managed edge, branch, and enterprise-class campus IT solutions bring simplicity to organizations of every size. With
More informationCCNP Switch Questions/Answers Cisco Enterprise Campus Architecture
In its network design, a company lists this equipment: - Two Catalyst 4503 Layer 3 switches - One 5500 security appliance firewall - Two Catalyst 6509 switches - Two Lightweight Access Points - Two Catalyst
More information儲存網路, 與時俱進 JASON LIN SENIOR TECHNICAL CONSULTANT BROCADE, TAIWAN
儲存網路, 與時俱進 JASON LIN SENIOR TECHNICAL CONSULTANT BROCADE, TAIWAN 1 Your Trusted Network for the Modern Data Center HISTORY OF INNOVATION 18+ Year Partnership Joint Engineering, Roadmap, and Go-to-Market
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More information2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco AnyConnect as a Service György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security
More informationPolitecnico di Torino Network architecture and management. Outline 11/01/2016. Marcello Maggiora, Antonio Lantieri, Marco Ricca
Politecnico di Torino Network architecture and management Marcello Maggiora, Antonio Lantieri, Marco Ricca Outline Politecnico di Torino network: Overview Building blocks: Edge, Core, Distribution, Access
More informationJUNIPER NETWORKS AND AEROHIVE NETWORKS: CLOUD- ENABLED SOLUTIONS FOR THE ENTERPRISE
Solution Brief JUNIPER NETWORKS AND AEROHIVE NETWORKS: CLOUD- ENABLED SOLUTIONS FOR THE ENTERPRISE Cloud-managed wired and wireless solutions for today s multicloud enterprise Challenge Enterprises are
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More information