Zero Trust Security with Software-Defined Secure Networks
|
|
- Alisha Garrison
- 6 years ago
- Views:
Transcription
1 Zero Trust Security with Software-Defined Secure Networks Srinivas Nimmagadda and Pradeep Nair Juniper Networks
2 This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted in this presentation. This presentation contains proprietary roadmap information and should not be discussed or shared without a signed non-disclosure agreement (NDA).
3 Objectives Security Architectural Challenges Introduce SDSN SDSN for Campus & Branch SDSN for Multicloud Demo(s)
4 Security Challenge THREAT SOPHISTICATION Advanced, Persistent, Targeted Attacks Automated Workflows Insider Attacks CLOUD & IOT Application Agility and Scale (Cloud) Diversity and Scale (IOT) CURRENT SECURITY Perimeter Only Security Complex Rule Sets Manual Workflows
5 Software Defined Secure Network Detection Machine Learning & AI Malware Detection Intrusion Prevention, SIEM (JSA) Threat Feeds: Command & Control, GeoIP etc Policy User intent based policy model Robust visibility and management Enforcement Perimeter Firewalls, Switches & Routers SDN Platforms (Vmware NSX, Contrail) Public Cloud (AWS etc) Network as a Security Enforcement System
6 Network role in Security Firewall Switch Router SDN Stateful but perimeter oriented Closest to the End- Point, stateless Network Edge, and stateless Closest to Applications Content Inspection User & APP IPS, AV URL etc Remove/Quarantine from Network BGP Flowspec Blackhole Honeypot DDoS Dynamic network service chain
7 Zero Trust Security Model Perimeter Security Secure Network Perimeter Perimeter Outside (Untrusted) Outside (Untrusted) Internal (Trusted) Internal (Also Untrusted) Hyper-connected Network with Security at Perimeter Lateral Threat Propagation Secure Network Block Lateral Threat Propagation Complex Security Policies Limited Visibility User Intent Based Policies Comprehensive Visibility
8 SDSN Campus Threat Remediation
9 SDSN Threat Management Manual Threat Workflows Threat Management Automation Feed Feed Incident Response Malware Found Net-Sec Operations TKT Endpoint Security TKT CnC & Geo IP Feeds Sky Advanced Threat Prevention SDSN Policy Enforcer Custom/3 rd Party Feeds JSA/SIEM Multiple Teams Vendor specific threat feeds Cohesive Threat Management System Open API and 3 rd Party Threat Feed Collation Threat Detection Enforcement Delays Automation across Network & Security
10 Physical Network Level Threat Remediation Real-time remediation of infected hosts SKY ATP SDSN Policy Enforcer Mobility of infected end points across different networks 3 rd Party Access Switch Radius messages Connector Framework N/W Connector Reduced time to remediate = Reduced exposure to attacks Threat remediation for IP-based IoT devices Radius Server THREAT DETECTION Malware: Zero-Day & Known Malware w/ SkyATP Command & Control: Botnet Traffic GeoIP: Geo specific security controls Custom Threat Feeds: Custom Blacklist, Whitelist, IPFilter, DDoS and other threat feeds ENFORCEMENT Juniper: SRX, vsrx, QFX and EX 3 rd Party: Access Switches with Forescout, Aruba Clearpass or Cisco ISE configured Wireless: WLCs with Radius(AAA) configured
11 SDSN for Multicloud
12 SDSN - Journey to Multicloud Threat Remediation Campus Malware Protection (New) DDoS Threat Feeds MX BGP Flowspec (1H 2018) JSA Integration User Intent Policy Sites & Policy Groups (New) Dynamic Policy Actions (New) Meta Data Policies Multicloud (New) VMware NSX (1H 2018) Contrail (1H 2018) AWS
13 Dynamic Policy Actions Evaluate this condition Take corresponding Actions NORMAL ACCESS POLICY SRC DEST CONDITION ACTIONS ENABLE ADDITIONAL LOGGING & IPS EMPLOYEES INTERNET VIDEO THREAT LEVEL = GREEN THREAT LEVEL = ORANGE PERMIT PERMIT LOG IPS DISABLE SERVICE ACCESS THREAT LEVEL = RED DENY Benefits: 1. Security policy that dynamically adapts to ever changing security environment 2. No need to hire developers, but still achieve agility with DevOps model 3. OpEx savings
14 Application Evolution Physical DC Virtual DC Private Cloud Multicloud Separate Application, Server, Network, Security and Storage teams 2-6 weeks to provision Ticket oriented workflows Virtualization Few minutes to provision Compute, but weeks to provision Network & Security Shorter lifespan of apps Containerization & microservices Scale and average life span Automation Consistent Policy across domains Compliance and Monitoring DevOps
15 Repeat for each application Repeat 2-6 WEEKS IT Operational Models Changing Traditional IT (Waterfall) Model Cloud Operational Model DEVELOPMENT TEAM Builds the application(s) CLOUD (SECURITY) TEAM Blue Prints and Templates for ALL Applications based on meta-data SERVER TEAM: Procure Servers NETWORK TEAM: Provision Network SECURITY TEAM: Secure Application STORAGE TEAM: Provision Storage DEVELOPMENT TEAM Builds the application(s) OPERATIONS TEAM Launch and Operate Apps & Infra DEV/OPS TEAM Launch and Operate Apps & Infra
16 META DATA BASED POLICIES Security Team DevOps Team 1. DEFINE META DATA 2. CREATE RULES 3. ASSIGN META-DATA Attribute STAGE PCI Possible Values DEVTEST, STAGING, PROD TRUE, FALSE SRC DEST ACTIONS STAGE=DEVTEST STAGE=PROD <AND> PCI = TRUE DENY Name IP Address Foo META-DATA STAGE=DEVTEST PCI=FALSE <custom> <custom> Rules with DAG Benefits: 1. Better fit for cloud based policy workflows 2. Contextual picture about each end point in the network 3. Portable policy across different domains SRX Bar STAGE=PROD DAG Updates Do not require commit
17 VMware NSX Integration
18 VMware NSX Micro-Segmentation SRX Perimeter firewall DMZ VLAN vsrx for East-West traffic SRX Inside firewall App VLAN Finance HR IT Traffic between apps on same VLAN can now be firewalled DB VLAN Finance HR IT vsrx protects lateral movement of attacks inside the network Dynamic VM posture based security orchestration Services VLAN Finance HR IT Visibility for east-west traffic AD NTP DHCP DNS CERT
19 NSX Integration Initial vsrx Provisioning Cloud Admin NSX Manager 1 SD Policy Enforcer Security Admin 0 NSX deployed and SD/PE installed 1 SD Registers vsrx Service w/ NSX NSX provisions vsrx on all NSX hosts 3 VM VM vsrx VM VM vsrx 3 NSX provisions vsrx redirection rules DFW DFW DFW DFW vsrx vsrx vsrx vsrx 4 SD provisions licenses & default policy for vsrx NSX Virtual Switch ESXi Host-1 NSX Virtual Switch ESXi Host-2 Initial Provisioning Complete vsrx sees no traffic at this stage ToR Switch
20 NSX Integration Policy Management Cloud Admin 1 NSX Manager 3 SD Policy Enforcer Security Admin 0 NSX Security Groups = VM groups 1 NSX admin creates traffic redirection to vsrx SRC=Any, DEST=PCI_SG, ACTION=REDIRECT-vSRX 4 2 NSX provisions traffic redirection policy for vsrx for all VMs 2 VM VM vsrx VM VM DFW DFW DFW DFW vsrx 3 NSX sends SG & SG members to PE PE creates Dynamic Address Groups for SD Security Admin can use NSX SGs in Policy Policy could be for N-S (Physical SRX) and E-W (NSX vsrx) vsrx vsrx vsrx vsrx NSX Virtual Switch NSX Virtual Switch ESXi Host-1 ESXi Host-2 4 SD pushes out policy to vsrx Ongoing synchronization of NSX SGs with PE & SD ToR Switch
21 VMCI channel VMCI channel Packet Flow Host to Host Traffic 1 Source VM on Host-1 sends traffic through vnic Kernel Space User Space ESXi Host-1 VM VM vsrx 4 DFW DFW Redirect Redirect NSX Virtual Switch Kernel Space User Space ESXi Host-2 VM VM vsrx 7 DFW DFW Redirect Redirect NSX Virtual Switch 2 NSX DFW processes the traffic 3 Redirect rules decide whether to forward traffic to vsrx 4 vsrx processes traffic 5 Physical Network transports traffic to destination host 6 Redirect rules decide whether to forward traffic to vsrx 5 7 vsrx processes traffic ToR Switch 8 DFW processes traffic 9 Destination VM receives traffic
22 Dynamic Threat Remediation Policy Enforcer 1. Perimeter SRX forwards relevant traffic to SKY ATP 2. SKY ATP identifies Malware and Infected Hosts, and passes this information to Policy Enforcer SKY ATP Infected Host Feed Security Director Assign Security TAG to infected hosts 3. Policy Enforcer 1. Pushes policy to SRX through SD related to infected host access 2. Tags infected VMs using NSX Manager SRX or vsrx DMZ VLAN
23 Why Juniper for NSX? Single Management Foot Print vcenter License Model For North-South Traffic (SRX/vSRX) and for East-West Traffic (vsrx on NSX) Visibility and reporting for N-S and E-W traffic vsrx requires least amount of resources (2 vcpu) and delivers high performance NGFW solution vcenter integration helps identify the VMs troubleshooting purposes Single License for: vsrx AppFW & IPS subscriptions Security Director Policy Enforcer Support
24 SDSN Contrail Integration SKY ATP Threat Mitigation Connect to Quarantine Virtual Network Block Access to PCI Network Security Group changes SRX Series Cluster Contrail Controller Green Virtual Network vrouter Red Virtual Network Micro Segmentation Security Policy in SD/PE for vsrx (L7, IPS etc) Contrail inventory and security TAG synchronization with vsrx VM G1 VM G2 VM G3 Quarantine Virtual Network VM R1 VM R2 VM R3
25 SDSN AWS Integration CHALLENGES Security Policy needs to support agile workloads SD Policy Enforcer Dept = HR Compliance for Amazon Virtual Private Cloud workloads Lateral threat propagation inside Amazon VPC SD Policy Based on Meta Data vsrx App = HRMS PCI = FALSE SDSN SOLUTION (how SDSN addresses above challenges) SD Inventory & Meta Data AWS Inventory & Meta Data Sync Dept = FIN App = PAYROLL PCI = TRUE Dept = IT App = CMDB PCI = False Instantiates and manages VPC specific virtual SRX instances Policy Enforcer supports meta-data based policies to support agile workloads Access Control (L3, L7 FW), IPS and Threat Policies based on meta-data AWS workload inventory and meta-data sync up with Security Director Amazon Virtual Private Cloud
26 DEMO
27 Change in Mindset Hardware defined Perimeter Manual enforcement Configuration driven Closed ecosystem Software/cloud defined Pervasive Automated Business driven Open framework
28 RESOURCES SECURITY SESSIONS Security NOW: Stop Threats Faster. (Business Solutions) Securing the Multicloud (Technology Focus) Extending Enterprise Security to Multicloud and Public Cloud (Technology Focus) SDSN Reference Material Google Juniper SDSN /en/productsservices/what-is/sdsn/
29 THANK YOU
Software-Define Secure Networks The Future of Network Security for Digital Learning
Software-Define Secure Networks The Future of Network Security for Digital Learning SIGS, 5.Juli 2015 Klaus Ernst, Systems Engineer Juniper Networks Threat Landscape Feels like Treading Water 2017 IT Priorities
More informationPolicy Enforcer. Product Description. Data Sheet. Product Overview
Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.
More informationSECURING THE MULTICLOUD
SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.
More informationJourney to Secure and Automated Multi-cloud
Journey to Secure and Automated Multi-cloud 2018 Mark Hinckley WW SE and Partner Enablement Juniper Networks Agenda Evolution of Value [Chain] Rise of Enterprise Multicloud Network as the Security Platform
More informationBuild a Software-Defined Network to Defend your Business
Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks
More informationStop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks
Stop Threats Faster Vaishali Ghiya & Dwann Hall Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases
More informationSoftware-Defined Secure Networks in Action
Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated
More informationSecurity Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017
Security Everywhere Within Juniper Networks Mobile Cloud Architecture Mobile World Congress 2017 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points Juniper s Mobile
More informationSoftware Defined Secure Networks
Software Defined Secure Networks Seguridad Avanzada en Campus Complejos José Fidel Tomás fidel.tomas@juniper.net Security is in Transformation THREAT SOPHISTICATION Zero day attacks Advanced, persistent,
More informationDefending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks
Defending Against Unkown Automation is the Key Rajesh Kumar Juniper Networks When and not if you will get attacked! ON AVERAGE, ATTACKERS GO UNDETECTED FOR OVER 229 DAYS Root cause of Security Incidents
More informationExtending Enterprise Security to Multicloud and Public Cloud
Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject
More informationCONTRAIL SECURITY. Contrail Cloud Networking & Security
CONTRAIL SECURITY Aniket Daptari Sr. Product Manager Contrail Cloud Networking & Security Scott Sneddon Senior Director Cloud and SDN This statement of direction sets forth Juniper Networks current intention
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention The evolution of malware threat mitigation Nguyễn Tiến Đức ntduc@juniper.net 1 Most network security strategies focus on security at the perimeter only outside in.
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationPolicy Enforcer. Policy Enforcer Connectors Guide. Modified: Copyright 2018, Juniper Networks, Inc.
Policy Enforcer Policy Enforcer Connectors Guide Modified: 2018-05-31 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper
More informationANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM
ROLE OF NETWORK VIRTUALIZATION AND SOFTWARE DEFINED SECURITY IN MULTICLOUD ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM This statement of direction sets forth Juniper Networks current intention and
More informationSDSN: Dynamic, Adaptive Multicloud Security
SDSN: Dynamic, Adaptive Multicloud Security Evolving from firewall to user-intent for flexible in the cloud Challenge Legacy, which do not dynamically adapt to different workflows, must be individually
More informationIntegrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation
Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Configuration Example March 2018 2018 Juniper Networks, Inc. Juniper Networks, Inc. 1133
More informationSoftware-Defined Secure Networks. Sergei Gotchev April 2016
Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average
More informationWHITE PAPER OCTOBER VMWARE NSX WITH CHECK POINT vsec. Enhancing Micro-Segmentation Security
WHITE PAPER OCTOBER 2017 VMWARE NSX WITH CHECK POINT vsec Enhancing Micro-Segmentation Security Table of Contents Executive Summary 3 VMware NSX Network Virtualization Overview 5 East-West Versus North-South
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationAWS Reference Design Document
AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationSECURE HYBRID CLOUD Solution
SECURE HYBRID CLOUD Solution DEFEND YOUR GREATEST ASSETS MARKET SITUATION On premise data centers = Expensive The migration of physical data centers to the private and public cloud is happening. Quickly.
More informationRemote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce
Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger Director System Engineering, NCP Engineering Inc. Vaishali Ghiya Senior Director,
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationJUNIPER SKY ADVANCED THREAT PREVENTION
Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation
More informationAGENDA Introduction Pivotal Cloud Foundry NSX-V integration with Cloud Foundry New Features in Cloud Foundry Networking NSX-T with Cloud Fou
NET1523BE INTEGRATING NSX AND CLOUD FOUNDRY Usha Ramachandran Staff Product Manager, Pivotal Sai Chaitanya Product Line Manager, VMware VMworld 2017 Content: Not for publication #VMworld AGENDA 1 2 3 4
More informationSoftware-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager
Software-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager Modified: 2018-05-07 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000
More informationOverview of the Juniper Networks Mobile Cloud Architecture
Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationIntelligent Edge Protection
Intelligent Edge Protection Sicherheit im Zeitalter von IoT und Mobility September 26, 2017 Flexible consumption Beacons, sensors and geo-positioning Driven by agile DevOps Mobile users, apps and devices
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services
More informationPresenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe
Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto
More informationCONTAINERS AND MICROSERVICES WITH CONTRAIL
CONTAINERS AND MICROSERVICES WITH CONTRAIL Scott Sneddon Sree Sarva DP Ayyadevara Sr. Director Sr. Director Director Cloud and SDN Contrail Solutions Product Line Management This statement of direction
More informationSecurity Considerations for Cloud Readiness
Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution
More informationSecuring the Software-Defined Data Center
Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationTransforming the Network for the Digital Business
Transforming the Network for the Digital Business Driven by Software Defined Platforms Hugo Padilla Prad Enterprise Networks Digital Acceleration Team CCIE Emeritus #12444 Cisco Forum Kiev, November 14
More informationJuniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud
Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud acezar@juniper.net MARKET DYNAMICS Branch/WAN Evolution: PMO FMO Bring Agility and Enhanced Customer Experience Utilizing Cloud
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET3282BE The NSX Practical Path Brian Lazear, Sr. Director, NSX Product Management Brian Muita, CTO, Node Africa #VMworld #NET3282BE Disclaimer This presentation may contain product features that are
More information5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS
5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS INTRODUCTION The modern data center is rapidly evolving. Virtualization is paving the way to the private cloud, enabling applications
More informationSecurity Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper
Security Everywhere within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationSmart and Secured Infrastructure. Rajesh Kumar Technical Consultant
Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical
More informationSegmentation. Threat Defense. Visibility
Segmentation Threat Defense Visibility Establish boundaries: network, compute, virtual Enforce policy by functions, devices, organizations, compliance Control and prevent unauthorized access to networks,
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2103BU NSX and VMware Cloud on AWS: Deep Dive Ray Budavari, Senior Staff Technical Product Manager NSX @rbudavari #VMworld #LHC2103BU Disclaimer This presentation may contain product features that are
More informationMETAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER
METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH
More informationInfoblox as Part of the Ecosystem
Infoblox Core Exchange Infoblox Core Exchange is a highly-interconnected set of ecosystem integrations that extend security, increase agility, and provide situational awareness for more efficient operations,
More informationVM-SERIES FOR VMWARE VM VM
SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationBuilding a Software-Defined Secure Network for Healthcare
Building a Software-Defined Secure Network for Healthcare Detect, adapt, and enforce security policies faster with network-wide visibility, orchestration, and control Challenge Enable digital transformation
More informationVMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder
VMWARE SOLUTIONS AND THE DATACENTER Fredric Linder MORE THAN VSPHERE vsphere vcenter Core vcenter Operations Suite vcenter Operations Management Vmware Cloud vcloud Director Chargeback VMware IT Business
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationTransforming Security Part 2: From the Device to the Data Center
SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation
More informationCHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING
www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth
More informationVMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no
LHC3296BUS OVH: Shields Up! Building a True Security Barrier in the Cloud Chris Romano, Principal Systems Engineer #VMworld #LHC3296BUS VMworld disclaimer This presentation may contain product features
More informationCisco Tetration Analytics Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH
Cisco Tetration Analytics Demo Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH Agenda Introduction Theory Demonstration Innovation Through Engineering
More informationJN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.
JN0-210.juniper Number: JN0-210 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which protocol does Juniper Networks recommend to provide real-time updates of the network topology to the NorthStar
More informationSecurity Automation Connecting Your Silos
Security Automation Connecting Your Silos Lisa Lorenzin Principal Solutions Architect Juniper Network What We Have 9/29/2014 Copyright 2014 Trusted Computing Group 2 Drowning in Information 9/29/2014 Copyright
More informationAgenda Basecamp The Journey So Far Enhancements Into the Fear Zone Climbing The VM-Series Performance Peak New VM-Series Models and Licensing Best Pra
SAI3317BES What s New in Palo Alto Networks VM-Series Integration with VMware NSX A Deep Dive VMworld 2017 Sudeep - Product Line Manager Sai - Product Marketing Content: Not for publication Agenda Basecamp
More informationExploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer
Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide
More informationNITA Based Offers and Services
NITA Based Offers and Services Jessica Garrison, @networkjessica, jgarrison@juniper.net Global Architect, Professional Services Network Automation Team This statement of direction sets forth Juniper Networks
More informationProduct Guide Revision B. McAfee Cloud Workload Security 5.0.0
Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationMcAfee Cloud Workload Security Product Guide
Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,
More informationExtending Enterprise Security to Public and Hybrid Clouds
Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are migrating toward public or hybrid clouds much faster than expected, creating
More informationEvolved Campus Core: An EVPN Framework for Campus Networks. Vincent Celindro JNCIE #69 / CCIE #8630
Evolved Campus Core: An EVPN Framework for Campus Networks Vincent Celindro JNCIE #69 / CCIE #8630 This statement of direction sets forth Juniper Networks current intention and is subject to change at
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationOpen Security Controller - Security Orchestration for OpenStack
SESSION ID: CSV-W02 Open Security Controller - Security Orchestration for OpenStack Tarun Viswanathan Platform Solution Architect Intel Manish Dave Platform Architect Intel Notices and Disclaimers Intel
More informationPROTECT WORKLOADS IN THE HYBRID CLOUD
PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationNetwork Virtualization Business Case
SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,
More informationGetting Started Guide. VMware NSX Cloud services
VMware NSX Cloud services You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback
More informationOverview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017
Overview of the Juniper Mobile Cloud Laying the Foundation for a Next-gen Secure Telco Cloud Mobile World Congress 2017 Summary Mobile Challenges and Trends through 2020 Business Drivers Enable new revenue
More informationINTRODUCTION TO J-EDI: THE JUNIPER EVENT- DRIVEN INFRASTRUCTURE
INTRODUCTION TO J-EDI: THE JUNIPER EVENT- DRIVEN INFRASTRUCTURE Nathan Embery Senior Consulting Engineer This statement of direction sets forth Juniper Networks current intention and is subject to change
More informationJuniper Unite Cloud-Enabled Enterprise Reference Architecture
Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.
More informationVeč kot SDN - SDA arhitektura v uporabniških omrežjih
Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements
More informationJunos Security Bundle, JSEC & AJSEC
Junos Security Bundle, JSEC & AJSEC COURSE OVERVIEW: This bundle combines JSEC & AJSEC at a discounted rate. Please Contact SLI to purchase this bundle. This five-day course covers the configuration, operation,
More informationWhere is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations
Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment
More informationCTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud
CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud Khalid Raza CTO & Co-Founder Viptela khalid@viptela.com Danny Johnson Director, Product Marketing Verizon daniel.johnson@verizonwireless.com
More informationPSOACI Tetration Overview. Mike Herbert
Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion
More informationData Center Security. Fuat KILIÇ Consulting Systems
Data Center Security Fuat KILIÇ Consulting Systems Engineer @Security Data Center Evolution WHERE ARE YOU NOW? WHERE DO YOU WANT TO BE? Traditional Data Center Virtualized Data Center (VDC) Virtualized
More informationATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response
More informationStop Threats Before They Stop You
Stop Threats Before They Stop You Gain visibility and control as you speed time to containment of infected endpoints Andrew Peters, Sr. Manager, Security Technology Group Agenda Situation System Parts
More informationVMware Cloud Provider Platform
VMware Cloud Provider Platform Enabling your journey to multicloud Winston Benjamin Systems Engineer Cloud Provider Program Disclaimer This presentation may contain product features that are currently
More informationExtending Enterprise Security to Public and Hybrid Clouds
Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are increasingly migrating to public or hybrid deployments, creating an immediate
More informationHybrid Cloud Solutions
Hybrid Cloud Solutions with Cisco and Microsoft Innovation Rob Tappenden, Technical Solution Architect rtappend@cisco.com March 2016 Today s industry and business challenges Industry Evolution & Data Centres
More informationFirefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran
Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2 Tuncay Seyran Security in a virtualized environment: same security risks + more TRADITIONAL SECURITY RISKS IMPACTING VIRTUAL ENVIRONMENTS
More informationPaloalto Networks PCNSA EXAM
Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationQualys Cloud Platform
Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new
More informationKubernetes Integration Guide
Kubernetes Integration Guide Cloud-Native Security www.aporeto.com Aporeto Kubernetes Integration Guide The purpose of this document is to describe the features of Aporeto that secure application services
More information