Zero Trust Security with Software-Defined Secure Networks

Size: px
Start display at page:

Download "Zero Trust Security with Software-Defined Secure Networks"

Transcription

1 Zero Trust Security with Software-Defined Secure Networks Srinivas Nimmagadda and Pradeep Nair Juniper Networks

2 This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted in this presentation. This presentation contains proprietary roadmap information and should not be discussed or shared without a signed non-disclosure agreement (NDA).

3 Objectives Security Architectural Challenges Introduce SDSN SDSN for Campus & Branch SDSN for Multicloud Demo(s)

4 Security Challenge THREAT SOPHISTICATION Advanced, Persistent, Targeted Attacks Automated Workflows Insider Attacks CLOUD & IOT Application Agility and Scale (Cloud) Diversity and Scale (IOT) CURRENT SECURITY Perimeter Only Security Complex Rule Sets Manual Workflows

5 Software Defined Secure Network Detection Machine Learning & AI Malware Detection Intrusion Prevention, SIEM (JSA) Threat Feeds: Command & Control, GeoIP etc Policy User intent based policy model Robust visibility and management Enforcement Perimeter Firewalls, Switches & Routers SDN Platforms (Vmware NSX, Contrail) Public Cloud (AWS etc) Network as a Security Enforcement System

6 Network role in Security Firewall Switch Router SDN Stateful but perimeter oriented Closest to the End- Point, stateless Network Edge, and stateless Closest to Applications Content Inspection User & APP IPS, AV URL etc Remove/Quarantine from Network BGP Flowspec Blackhole Honeypot DDoS Dynamic network service chain

7 Zero Trust Security Model Perimeter Security Secure Network Perimeter Perimeter Outside (Untrusted) Outside (Untrusted) Internal (Trusted) Internal (Also Untrusted) Hyper-connected Network with Security at Perimeter Lateral Threat Propagation Secure Network Block Lateral Threat Propagation Complex Security Policies Limited Visibility User Intent Based Policies Comprehensive Visibility

8 SDSN Campus Threat Remediation

9 SDSN Threat Management Manual Threat Workflows Threat Management Automation Feed Feed Incident Response Malware Found Net-Sec Operations TKT Endpoint Security TKT CnC & Geo IP Feeds Sky Advanced Threat Prevention SDSN Policy Enforcer Custom/3 rd Party Feeds JSA/SIEM Multiple Teams Vendor specific threat feeds Cohesive Threat Management System Open API and 3 rd Party Threat Feed Collation Threat Detection Enforcement Delays Automation across Network & Security

10 Physical Network Level Threat Remediation Real-time remediation of infected hosts SKY ATP SDSN Policy Enforcer Mobility of infected end points across different networks 3 rd Party Access Switch Radius messages Connector Framework N/W Connector Reduced time to remediate = Reduced exposure to attacks Threat remediation for IP-based IoT devices Radius Server THREAT DETECTION Malware: Zero-Day & Known Malware w/ SkyATP Command & Control: Botnet Traffic GeoIP: Geo specific security controls Custom Threat Feeds: Custom Blacklist, Whitelist, IPFilter, DDoS and other threat feeds ENFORCEMENT Juniper: SRX, vsrx, QFX and EX 3 rd Party: Access Switches with Forescout, Aruba Clearpass or Cisco ISE configured Wireless: WLCs with Radius(AAA) configured

11 SDSN for Multicloud

12 SDSN - Journey to Multicloud Threat Remediation Campus Malware Protection (New) DDoS Threat Feeds MX BGP Flowspec (1H 2018) JSA Integration User Intent Policy Sites & Policy Groups (New) Dynamic Policy Actions (New) Meta Data Policies Multicloud (New) VMware NSX (1H 2018) Contrail (1H 2018) AWS

13 Dynamic Policy Actions Evaluate this condition Take corresponding Actions NORMAL ACCESS POLICY SRC DEST CONDITION ACTIONS ENABLE ADDITIONAL LOGGING & IPS EMPLOYEES INTERNET VIDEO THREAT LEVEL = GREEN THREAT LEVEL = ORANGE PERMIT PERMIT LOG IPS DISABLE SERVICE ACCESS THREAT LEVEL = RED DENY Benefits: 1. Security policy that dynamically adapts to ever changing security environment 2. No need to hire developers, but still achieve agility with DevOps model 3. OpEx savings

14 Application Evolution Physical DC Virtual DC Private Cloud Multicloud Separate Application, Server, Network, Security and Storage teams 2-6 weeks to provision Ticket oriented workflows Virtualization Few minutes to provision Compute, but weeks to provision Network & Security Shorter lifespan of apps Containerization & microservices Scale and average life span Automation Consistent Policy across domains Compliance and Monitoring DevOps

15 Repeat for each application Repeat 2-6 WEEKS IT Operational Models Changing Traditional IT (Waterfall) Model Cloud Operational Model DEVELOPMENT TEAM Builds the application(s) CLOUD (SECURITY) TEAM Blue Prints and Templates for ALL Applications based on meta-data SERVER TEAM: Procure Servers NETWORK TEAM: Provision Network SECURITY TEAM: Secure Application STORAGE TEAM: Provision Storage DEVELOPMENT TEAM Builds the application(s) OPERATIONS TEAM Launch and Operate Apps & Infra DEV/OPS TEAM Launch and Operate Apps & Infra

16 META DATA BASED POLICIES Security Team DevOps Team 1. DEFINE META DATA 2. CREATE RULES 3. ASSIGN META-DATA Attribute STAGE PCI Possible Values DEVTEST, STAGING, PROD TRUE, FALSE SRC DEST ACTIONS STAGE=DEVTEST STAGE=PROD <AND> PCI = TRUE DENY Name IP Address Foo META-DATA STAGE=DEVTEST PCI=FALSE <custom> <custom> Rules with DAG Benefits: 1. Better fit for cloud based policy workflows 2. Contextual picture about each end point in the network 3. Portable policy across different domains SRX Bar STAGE=PROD DAG Updates Do not require commit

17 VMware NSX Integration

18 VMware NSX Micro-Segmentation SRX Perimeter firewall DMZ VLAN vsrx for East-West traffic SRX Inside firewall App VLAN Finance HR IT Traffic between apps on same VLAN can now be firewalled DB VLAN Finance HR IT vsrx protects lateral movement of attacks inside the network Dynamic VM posture based security orchestration Services VLAN Finance HR IT Visibility for east-west traffic AD NTP DHCP DNS CERT

19 NSX Integration Initial vsrx Provisioning Cloud Admin NSX Manager 1 SD Policy Enforcer Security Admin 0 NSX deployed and SD/PE installed 1 SD Registers vsrx Service w/ NSX NSX provisions vsrx on all NSX hosts 3 VM VM vsrx VM VM vsrx 3 NSX provisions vsrx redirection rules DFW DFW DFW DFW vsrx vsrx vsrx vsrx 4 SD provisions licenses & default policy for vsrx NSX Virtual Switch ESXi Host-1 NSX Virtual Switch ESXi Host-2 Initial Provisioning Complete vsrx sees no traffic at this stage ToR Switch

20 NSX Integration Policy Management Cloud Admin 1 NSX Manager 3 SD Policy Enforcer Security Admin 0 NSX Security Groups = VM groups 1 NSX admin creates traffic redirection to vsrx SRC=Any, DEST=PCI_SG, ACTION=REDIRECT-vSRX 4 2 NSX provisions traffic redirection policy for vsrx for all VMs 2 VM VM vsrx VM VM DFW DFW DFW DFW vsrx 3 NSX sends SG & SG members to PE PE creates Dynamic Address Groups for SD Security Admin can use NSX SGs in Policy Policy could be for N-S (Physical SRX) and E-W (NSX vsrx) vsrx vsrx vsrx vsrx NSX Virtual Switch NSX Virtual Switch ESXi Host-1 ESXi Host-2 4 SD pushes out policy to vsrx Ongoing synchronization of NSX SGs with PE & SD ToR Switch

21 VMCI channel VMCI channel Packet Flow Host to Host Traffic 1 Source VM on Host-1 sends traffic through vnic Kernel Space User Space ESXi Host-1 VM VM vsrx 4 DFW DFW Redirect Redirect NSX Virtual Switch Kernel Space User Space ESXi Host-2 VM VM vsrx 7 DFW DFW Redirect Redirect NSX Virtual Switch 2 NSX DFW processes the traffic 3 Redirect rules decide whether to forward traffic to vsrx 4 vsrx processes traffic 5 Physical Network transports traffic to destination host 6 Redirect rules decide whether to forward traffic to vsrx 5 7 vsrx processes traffic ToR Switch 8 DFW processes traffic 9 Destination VM receives traffic

22 Dynamic Threat Remediation Policy Enforcer 1. Perimeter SRX forwards relevant traffic to SKY ATP 2. SKY ATP identifies Malware and Infected Hosts, and passes this information to Policy Enforcer SKY ATP Infected Host Feed Security Director Assign Security TAG to infected hosts 3. Policy Enforcer 1. Pushes policy to SRX through SD related to infected host access 2. Tags infected VMs using NSX Manager SRX or vsrx DMZ VLAN

23 Why Juniper for NSX? Single Management Foot Print vcenter License Model For North-South Traffic (SRX/vSRX) and for East-West Traffic (vsrx on NSX) Visibility and reporting for N-S and E-W traffic vsrx requires least amount of resources (2 vcpu) and delivers high performance NGFW solution vcenter integration helps identify the VMs troubleshooting purposes Single License for: vsrx AppFW & IPS subscriptions Security Director Policy Enforcer Support

24 SDSN Contrail Integration SKY ATP Threat Mitigation Connect to Quarantine Virtual Network Block Access to PCI Network Security Group changes SRX Series Cluster Contrail Controller Green Virtual Network vrouter Red Virtual Network Micro Segmentation Security Policy in SD/PE for vsrx (L7, IPS etc) Contrail inventory and security TAG synchronization with vsrx VM G1 VM G2 VM G3 Quarantine Virtual Network VM R1 VM R2 VM R3

25 SDSN AWS Integration CHALLENGES Security Policy needs to support agile workloads SD Policy Enforcer Dept = HR Compliance for Amazon Virtual Private Cloud workloads Lateral threat propagation inside Amazon VPC SD Policy Based on Meta Data vsrx App = HRMS PCI = FALSE SDSN SOLUTION (how SDSN addresses above challenges) SD Inventory & Meta Data AWS Inventory & Meta Data Sync Dept = FIN App = PAYROLL PCI = TRUE Dept = IT App = CMDB PCI = False Instantiates and manages VPC specific virtual SRX instances Policy Enforcer supports meta-data based policies to support agile workloads Access Control (L3, L7 FW), IPS and Threat Policies based on meta-data AWS workload inventory and meta-data sync up with Security Director Amazon Virtual Private Cloud

26 DEMO

27 Change in Mindset Hardware defined Perimeter Manual enforcement Configuration driven Closed ecosystem Software/cloud defined Pervasive Automated Business driven Open framework

28 RESOURCES SECURITY SESSIONS Security NOW: Stop Threats Faster. (Business Solutions) Securing the Multicloud (Technology Focus) Extending Enterprise Security to Multicloud and Public Cloud (Technology Focus) SDSN Reference Material Google Juniper SDSN /en/productsservices/what-is/sdsn/

29 THANK YOU

Software-Define Secure Networks The Future of Network Security for Digital Learning

Software-Define Secure Networks The Future of Network Security for Digital Learning Software-Define Secure Networks The Future of Network Security for Digital Learning SIGS, 5.Juli 2015 Klaus Ernst, Systems Engineer Juniper Networks Threat Landscape Feels like Treading Water 2017 IT Priorities

More information

Policy Enforcer. Product Description. Data Sheet. Product Overview

Policy Enforcer. Product Description. Data Sheet. Product Overview Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.

More information

SECURING THE MULTICLOUD

SECURING THE MULTICLOUD SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.

More information

Journey to Secure and Automated Multi-cloud

Journey to Secure and Automated Multi-cloud Journey to Secure and Automated Multi-cloud 2018 Mark Hinckley WW SE and Partner Enablement Juniper Networks Agenda Evolution of Value [Chain] Rise of Enterprise Multicloud Network as the Security Platform

More information

Build a Software-Defined Network to Defend your Business

Build a Software-Defined Network to Defend your Business Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks

More information

Stop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks

Stop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks Stop Threats Faster Vaishali Ghiya & Dwann Hall Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases

More information

Software-Defined Secure Networks in Action

Software-Defined Secure Networks in Action Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated

More information

Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017

Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017 Security Everywhere Within Juniper Networks Mobile Cloud Architecture Mobile World Congress 2017 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points Juniper s Mobile

More information

Software Defined Secure Networks

Software Defined Secure Networks Software Defined Secure Networks Seguridad Avanzada en Campus Complejos José Fidel Tomás fidel.tomas@juniper.net Security is in Transformation THREAT SOPHISTICATION Zero day attacks Advanced, persistent,

More information

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks Defending Against Unkown Automation is the Key Rajesh Kumar Juniper Networks When and not if you will get attacked! ON AVERAGE, ATTACKERS GO UNDETECTED FOR OVER 229 DAYS Root cause of Security Incidents

More information

Extending Enterprise Security to Multicloud and Public Cloud

Extending Enterprise Security to Multicloud and Public Cloud Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject

More information

CONTRAIL SECURITY. Contrail Cloud Networking & Security

CONTRAIL SECURITY. Contrail Cloud Networking & Security CONTRAIL SECURITY Aniket Daptari Sr. Product Manager Contrail Cloud Networking & Security Scott Sneddon Senior Director Cloud and SDN This statement of direction sets forth Juniper Networks current intention

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention The evolution of malware threat mitigation Nguyễn Tiến Đức ntduc@juniper.net 1 Most network security strategies focus on security at the perimeter only outside in.

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology

More information

Policy Enforcer. Policy Enforcer Connectors Guide. Modified: Copyright 2018, Juniper Networks, Inc.

Policy Enforcer. Policy Enforcer Connectors Guide. Modified: Copyright 2018, Juniper Networks, Inc. Policy Enforcer Policy Enforcer Connectors Guide Modified: 2018-05-31 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper

More information

ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM

ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM ROLE OF NETWORK VIRTUALIZATION AND SOFTWARE DEFINED SECURITY IN MULTICLOUD ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM This statement of direction sets forth Juniper Networks current intention and

More information

SDSN: Dynamic, Adaptive Multicloud Security

SDSN: Dynamic, Adaptive Multicloud Security SDSN: Dynamic, Adaptive Multicloud Security Evolving from firewall to user-intent for flexible in the cloud Challenge Legacy, which do not dynamically adapt to different workflows, must be individually

More information

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Configuration Example March 2018 2018 Juniper Networks, Inc. Juniper Networks, Inc. 1133

More information

Software-Defined Secure Networks. Sergei Gotchev April 2016

Software-Defined Secure Networks. Sergei Gotchev April 2016 Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average

More information

WHITE PAPER OCTOBER VMWARE NSX WITH CHECK POINT vsec. Enhancing Micro-Segmentation Security

WHITE PAPER OCTOBER VMWARE NSX WITH CHECK POINT vsec. Enhancing Micro-Segmentation Security WHITE PAPER OCTOBER 2017 VMWARE NSX WITH CHECK POINT vsec Enhancing Micro-Segmentation Security Table of Contents Executive Summary 3 VMware NSX Network Virtualization Overview 5 East-West Versus North-South

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

AWS Reference Design Document

AWS Reference Design Document AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South

More information

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

SECURE HYBRID CLOUD Solution

SECURE HYBRID CLOUD Solution SECURE HYBRID CLOUD Solution DEFEND YOUR GREATEST ASSETS MARKET SITUATION On premise data centers = Expensive The migration of physical data centers to the private and public cloud is happening. Quickly.

More information

Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce

Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger Director System Engineering, NCP Engineering Inc. Vaishali Ghiya Senior Director,

More information

2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco

More information

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug

More information

JUNIPER SKY ADVANCED THREAT PREVENTION

JUNIPER SKY ADVANCED THREAT PREVENTION Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme MMC1532BE Using VMware NSX Cloud for Enhanced Networking and Security for AWS Native Workloads Percy Wadia Amol Tipnis VMworld 2017 Content: Not for publication #VMworld #MMC1532BE Disclaimer This presentation

More information

AGENDA Introduction Pivotal Cloud Foundry NSX-V integration with Cloud Foundry New Features in Cloud Foundry Networking NSX-T with Cloud Fou

AGENDA Introduction Pivotal Cloud Foundry NSX-V integration with Cloud Foundry New Features in Cloud Foundry Networking NSX-T with Cloud Fou NET1523BE INTEGRATING NSX AND CLOUD FOUNDRY Usha Ramachandran Staff Product Manager, Pivotal Sai Chaitanya Product Line Manager, VMware VMworld 2017 Content: Not for publication #VMworld AGENDA 1 2 3 4

More information

Software-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager

Software-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager Software-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager Modified: 2018-05-07 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Overview of the Juniper Networks Mobile Cloud Architecture

Overview of the Juniper Networks Mobile Cloud Architecture Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product

More information

Intelligent Edge Protection

Intelligent Edge Protection Intelligent Edge Protection Sicherheit im Zeitalter von IoT und Mobility September 26, 2017 Flexible consumption Beacons, sensors and geo-positioning Driven by agile DevOps Mobile users, apps and devices

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services

More information

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto

More information

CONTAINERS AND MICROSERVICES WITH CONTRAIL

CONTAINERS AND MICROSERVICES WITH CONTRAIL CONTAINERS AND MICROSERVICES WITH CONTRAIL Scott Sneddon Sree Sarva DP Ayyadevara Sr. Director Sr. Director Director Cloud and SDN Contrail Solutions Product Line Management This statement of direction

More information

Security Considerations for Cloud Readiness

Security Considerations for Cloud Readiness Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution

More information

Securing the Software-Defined Data Center

Securing the Software-Defined Data Center Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined

More information

Disclaimer CONFIDENTIAL 2

Disclaimer CONFIDENTIAL 2 Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Cloud-Enable Your District s Network For Digital Learning

Cloud-Enable Your District s Network For Digital Learning Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission

More information

Transforming the Network for the Digital Business

Transforming the Network for the Digital Business Transforming the Network for the Digital Business Driven by Software Defined Platforms Hugo Padilla Prad Enterprise Networks Digital Acceleration Team CCIE Emeritus #12444 Cisco Forum Kiev, November 14

More information

Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud

Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud acezar@juniper.net MARKET DYNAMICS Branch/WAN Evolution: PMO FMO Bring Agility and Enhanced Customer Experience Utilizing Cloud

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET3282BE The NSX Practical Path Brian Lazear, Sr. Director, NSX Product Management Brian Muita, CTO, Node Africa #VMworld #NET3282BE Disclaimer This presentation may contain product features that are

More information

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS 5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS INTRODUCTION The modern data center is rapidly evolving. Virtualization is paving the way to the private cloud, enabling applications

More information

Security Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper

Security Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper Security Everywhere within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical

More information

Segmentation. Threat Defense. Visibility

Segmentation. Threat Defense. Visibility Segmentation Threat Defense Visibility Establish boundaries: network, compute, virtual Enforce policy by functions, devices, organizations, compliance Control and prevent unauthorized access to networks,

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme LHC2103BU NSX and VMware Cloud on AWS: Deep Dive Ray Budavari, Senior Staff Technical Product Manager NSX @rbudavari #VMworld #LHC2103BU Disclaimer This presentation may contain product features that are

More information

METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER

METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH

More information

Infoblox as Part of the Ecosystem

Infoblox as Part of the Ecosystem Infoblox Core Exchange Infoblox Core Exchange is a highly-interconnected set of ecosystem integrations that extend security, increase agility, and provide situational awareness for more efficient operations,

More information

VM-SERIES FOR VMWARE VM VM

VM-SERIES FOR VMWARE VM VM SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud

More information

Cisco Cloud Application Centric Infrastructure

Cisco Cloud Application Centric Infrastructure Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified

More information

Building a Software-Defined Secure Network for Healthcare

Building a Software-Defined Secure Network for Healthcare Building a Software-Defined Secure Network for Healthcare Detect, adapt, and enforce security policies faster with network-wide visibility, orchestration, and control Challenge Enable digital transformation

More information

VMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder

VMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder VMWARE SOLUTIONS AND THE DATACENTER Fredric Linder MORE THAN VSPHERE vsphere vcenter Core vcenter Operations Suite vcenter Operations Management Vmware Cloud vcloud Director Chargeback VMware IT Business

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

Transforming Security Part 2: From the Device to the Data Center

Transforming Security Part 2: From the Device to the Data Center SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation

More information

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING www.hcltech.com CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING Why Next-Gen Networks? The rapid and large scale adoption of new age disruptive digital technologies has resulted in astronomical growth

More information

VMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no

VMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no LHC3296BUS OVH: Shields Up! Building a True Security Barrier in the Cloud Chris Romano, Principal Systems Engineer #VMworld #LHC3296BUS VMworld disclaimer This presentation may contain product features

More information

Cisco Tetration Analytics Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH

Cisco Tetration Analytics Demo. Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH Cisco Tetration Analytics Demo Ing. Guenter Herold Area Manager Datacenter Cisco Austria GmbH Agenda Introduction Theory Demonstration Innovation Through Engineering

More information

JN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.

JN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min. JN0-210.juniper Number: JN0-210 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which protocol does Juniper Networks recommend to provide real-time updates of the network topology to the NorthStar

More information

Security Automation Connecting Your Silos

Security Automation Connecting Your Silos Security Automation Connecting Your Silos Lisa Lorenzin Principal Solutions Architect Juniper Network What We Have 9/29/2014 Copyright 2014 Trusted Computing Group 2 Drowning in Information 9/29/2014 Copyright

More information

Agenda Basecamp The Journey So Far Enhancements Into the Fear Zone Climbing The VM-Series Performance Peak New VM-Series Models and Licensing Best Pra

Agenda Basecamp The Journey So Far Enhancements Into the Fear Zone Climbing The VM-Series Performance Peak New VM-Series Models and Licensing Best Pra SAI3317BES What s New in Palo Alto Networks VM-Series Integration with VMware NSX A Deep Dive VMworld 2017 Sudeep - Product Line Manager Sai - Product Marketing Content: Not for publication Agenda Basecamp

More information

Exploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer

Exploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide

More information

NITA Based Offers and Services

NITA Based Offers and Services NITA Based Offers and Services Jessica Garrison, @networkjessica, jgarrison@juniper.net Global Architect, Professional Services Network Automation Team This statement of direction sets forth Juniper Networks

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Extending Enterprise Security to Public and Hybrid Clouds

Extending Enterprise Security to Public and Hybrid Clouds Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are migrating toward public or hybrid clouds much faster than expected, creating

More information

Evolved Campus Core: An EVPN Framework for Campus Networks. Vincent Celindro JNCIE #69 / CCIE #8630

Evolved Campus Core: An EVPN Framework for Campus Networks. Vincent Celindro JNCIE #69 / CCIE #8630 Evolved Campus Core: An EVPN Framework for Campus Networks Vincent Celindro JNCIE #69 / CCIE #8630 This statement of direction sets forth Juniper Networks current intention and is subject to change at

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Open Security Controller - Security Orchestration for OpenStack

Open Security Controller - Security Orchestration for OpenStack SESSION ID: CSV-W02 Open Security Controller - Security Orchestration for OpenStack Tarun Viswanathan Platform Solution Architect Intel Manish Dave Platform Architect Intel Notices and Disclaimers Intel

More information

PROTECT WORKLOADS IN THE HYBRID CLOUD

PROTECT WORKLOADS IN THE HYBRID CLOUD PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Network Virtualization Business Case

Network Virtualization Business Case SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,

More information

Getting Started Guide. VMware NSX Cloud services

Getting Started Guide. VMware NSX Cloud services VMware NSX Cloud services You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback

More information

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017 Overview of the Juniper Mobile Cloud Laying the Foundation for a Next-gen Secure Telco Cloud Mobile World Congress 2017 Summary Mobile Challenges and Trends through 2020 Business Drivers Enable new revenue

More information

INTRODUCTION TO J-EDI: THE JUNIPER EVENT- DRIVEN INFRASTRUCTURE

INTRODUCTION TO J-EDI: THE JUNIPER EVENT- DRIVEN INFRASTRUCTURE INTRODUCTION TO J-EDI: THE JUNIPER EVENT- DRIVEN INFRASTRUCTURE Nathan Embery Senior Consulting Engineer This statement of direction sets forth Juniper Networks current intention and is subject to change

More information

Juniper Unite Cloud-Enabled Enterprise Reference Architecture

Juniper Unite Cloud-Enabled Enterprise Reference Architecture Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.

More information

Več kot SDN - SDA arhitektura v uporabniških omrežjih

Več kot SDN - SDA arhitektura v uporabniških omrežjih Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements

More information

Junos Security Bundle, JSEC & AJSEC

Junos Security Bundle, JSEC & AJSEC Junos Security Bundle, JSEC & AJSEC COURSE OVERVIEW: This bundle combines JSEC & AJSEC at a discounted rate. Please Contact SLI to purchase this bundle. This five-day course covers the configuration, operation,

More information

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations

Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Where is the Network Edge? MEC Deployment Options, Business Case & SDN Considerations Ian Goetz, Chief Architect, Vodafone Global Account, Juniper Networks August, 2016 Market Trends & The Network Environment

More information

CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud

CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud Khalid Raza CTO & Co-Founder Viptela khalid@viptela.com Danny Johnson Director, Product Marketing Verizon daniel.johnson@verizonwireless.com

More information

PSOACI Tetration Overview. Mike Herbert

PSOACI Tetration Overview. Mike Herbert Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion

More information

Data Center Security. Fuat KILIÇ Consulting Systems

Data Center Security. Fuat KILIÇ Consulting Systems Data Center Security Fuat KILIÇ Consulting Systems Engineer @Security Data Center Evolution WHERE ARE YOU NOW? WHERE DO YOU WANT TO BE? Traditional Data Center Virtualized Data Center (VDC) Virtualized

More information

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response

More information

Stop Threats Before They Stop You

Stop Threats Before They Stop You Stop Threats Before They Stop You Gain visibility and control as you speed time to containment of infected endpoints Andrew Peters, Sr. Manager, Security Technology Group Agenda Situation System Parts

More information

VMware Cloud Provider Platform

VMware Cloud Provider Platform VMware Cloud Provider Platform Enabling your journey to multicloud Winston Benjamin Systems Engineer Cloud Provider Program Disclaimer This presentation may contain product features that are currently

More information

Extending Enterprise Security to Public and Hybrid Clouds

Extending Enterprise Security to Public and Hybrid Clouds Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are increasingly migrating to public or hybrid deployments, creating an immediate

More information

Hybrid Cloud Solutions

Hybrid Cloud Solutions Hybrid Cloud Solutions with Cisco and Microsoft Innovation Rob Tappenden, Technical Solution Architect rtappend@cisco.com March 2016 Today s industry and business challenges Industry Evolution & Data Centres

More information

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2 Tuncay Seyran Security in a virtualized environment: same security risks + more TRADITIONAL SECURITY RISKS IMPACTING VIRTUAL ENVIRONMENTS

More information

Paloalto Networks PCNSA EXAM

Paloalto Networks PCNSA EXAM Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:

More information

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End

More information

Qualys Cloud Platform

Qualys Cloud Platform Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new

More information

Kubernetes Integration Guide

Kubernetes Integration Guide Kubernetes Integration Guide Cloud-Native Security www.aporeto.com Aporeto Kubernetes Integration Guide The purpose of this document is to describe the features of Aporeto that secure application services

More information