Stop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks

Size: px
Start display at page:

Download "Stop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks"

Transcription

1 Stop Threats Faster Vaishali Ghiya & Dwann Hall Juniper Networks

2 This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted in this presentation. This presentation contains proprietary roadmap information and should not be discussed or shared without a signed non-disclosure agreement (NDA).

3 Software Defined Secure Networks Vaishali Ghiya Sr. Director, Security Sales

4 Data is the new Gold AS VALUE INCREASES SO DOES CYBERCRIME 80 % of black-hat hackers are affiliated with organized crime In IN131 s contained malware, the highest rate in five years Cybercrime will become a $2.1 TRILLION business By B identities were exposed in M New unique pieces of malware in K Ransomware attacks in 2016 Source: Symantec Internet Security Threat Report 2017, Verizon 2016 Data Breach Investigations Report

5 Today s Threats Are More Complex Than Ever Realize threats are everywhere. They are already inside. They walked in your front door Recognize perimeter security isn t enough. Malware walks in with the employee Detection and Enforcement should be enabled anywhere Acknowledge security is everyone s problem horizontal and vertical 5

6 Software Defined Secure Networks: Network As A Firewall Detection (Machine Learning) Sky Advanced Threat Prevention Cloud 1 2 DETECTION Sandbox w/deception ATP Static Analysis Centralized policy push POLICY Security Director + Policy Enforcer Policy Enforcement, Visibility, Automation DETECTION ENFORCEMENT SRX vsrx Physical Firewall Virtual Firewall Network as Third Party Elements* EX & QFX MX a Firewall Switches Routers* Multi-cloud 4 3 Enforcement

7 SDSN Threat Remediation Use Case Manual Threat Workflows Automated Threat Remediation Incident Response Net-Sec Operations Endpoint Security Feed Feed TKT Malware Found TKT Multiple Teams Threat Detection Enforcement Delays Vendor specific threat feeds Cohesive Threat Management System Automation across Network & Security Open API and 3 rd Party Threat Feed Collation

8 SDSN Simplified Scenario: Traveling Employee Arrivals Departures

9 SDSN Simplified Scenario: Sunnyvale HQ L2 VLAN!

10 SDSN Simplified Scenario: Sunnyvale HQ Sky Advanced Threat Prevention Cloud Sandbox w/deception Infected Laptop Address ATP MAC: 3A C4-69-b4 IP: Static Analysis Command & Control Server L2 VLAN Customer SRX

11 SDSN Simplified Scenario: Sunnyvale Campus DETECTION Sky Advanced Threat Prevention Cloud Sandbox w/deception ATP Static Analysis Third Party Threat Intel POLICY Security POLICYDirector + Policy Enforcer Policy Enforcement, Visibility, Automation Command & Control Server L2 VLAN DETECTION ENFORCEMENT SRX EX & QFX Switches Physical Firewall MX Routers* vsrx Virtual Firewall Third Party Elements* Quarantined

12 SDSN Simplified Scenario: San Francisco Campus DETECTION Sky Advanced Threat Prevention Cloud Sandbox w/deception ATP Static Analysis Third Party Threat Intel L2 VLAN POLICY Security Director + Policy Enforcer Policy Enforcement, Visibility, Automation Command & Control Server Infected Laptop Address MAC: 3A C4-69-b4 NEW IP: DETECTION ENFORCEMENT SRX Physical Firewall vsrx Virtual Firewall Quarantined EX & QFX Switches MX Routers* Third Party Elements*

13 SDSN Simplified: Network As a Firewall Detection (Machine Learning) Sky Advanced Threat Prevention Cloud 1 2 DETECTION Sandbox w/deception ATP Static Analysis Centralized policy push POLICY Security Director + Policy Enforcer Policy Enforcement, Visibility, Automation DETECTION ENFORCEMENT SRX vsrx Physical Firewall Virtual Firewall Network as Third Party Elements* EX & QFX MX a Firewall Switches Routers* Multi-cloud 4 3 Enforcement

14

15 SRX Product Line Evolution New hardware platforms & software innovations LOW END Small Data Center MIDRANGE SRX4200 Mid-sized Data Center SRX5400 Large Data Center SRX5600 5U, 480 Gb/s Very Large Data Center /SP SRX4600 SRX4800 8U, 960Gb/s HIGH END SRX U, 2Tbps 3U, 320 Gb/s 1U, 80 Gb/s 1U, 40 Gb/s Branch Refresh SRX300/320/ 340/345 SRX550 Compact Campus SRX1500 1U, 5 Gb/s SRX4100 1U, 20 Gb/s vsrx Virtual SRX 4 Gb/s (2 vcpu) 20 Gb/s (upto 10 vcpu) BRANCH & SECURE ROUTER SMALL CAMPUS ENTERPRISE EDGE/SMALL DATA CENTER NDA: Juniper Networks Company Confidential DATA CENTER All performance estimates are IMIX

16 SRX 4100 & SRX 4200 High Performance Midrange Platform Small RU footprint 1U, 2 SKUs with 20G and 40G Throughput Low power consumption 8 ports of 10G Platform Based on off-the-shelf hardware components X86 CPU for advanced security services Performance Targets Significant improvement in price/performance Excellent FW/NAT IMIX performance for Midrange Firewall (20Gbps to 40Gbps) Excellent NGFW performance (5 Gbps to 10 Gbps) Dramatically improved throughput, session & connections per second scale Juniper Confidential Subject to Change

17 Security Director: Application Visibility Interactive/Graphical Summary of Applications. 2. Data from different angles. 3. Who is using what 4. Perform correcting and troubleshooting actions - identify, allow, block or limit usage 5. Toggle to launch to details Grid view

18 Security Director: Threat Map Map shows threat count by region 2. Easy to filter according to threat type, severity, and source/destination 3. Table has ability to filter map results and view related events - Table shows details of threat events according to filters 4. Ability to zoom into a region for filtered threat view details

19 Sky Advanced Threat Prevention Solution Overview Juniper Cloud Customer Sky Advanced Threat Prevention Cloud Sandbox w/deception ATP Customer SRX Static Analysis 1. SRX extracts potentially malicious objects and files 2. SRX sends potentially malicious content to Advanced Threat Prevention cloud 3. Advanced Threat Prevention cloud performs static and dynamic analysis 4. Advanced Threat Prevention cloud provides malware results and C&C server data to the SRX 5. SRX blocks known malicious file downloads and outbound C&C traffic

20 Sky Advanced Threat Prevention Cloud Machine Learning Verdicts determined at every level Potentially malicious files Cache Inline Blocking Multiple Anti-Virus Static Analysis Cloud Infrastructure Behavioral Analysis Sandbox Deception Additive verdict determination ensures accuracy Over 50 deception techniques employed to trick malware into exposing itself

21 Juniper Advanced Threat Detection Lateral Spread Perimeter Malicious Internet SMART ANALYTICS Malicious Web Lateral threat migration indicates progression through cyber kill chain. Collectors capture that traffic too.

22 Hybrid Cloud: vsrx in Transit VPC for AWS vsrx differentiators VPC 1 VPC 2 VPC N High performance Integrated routing and security Higher scale of VPC support Transit VPC Transit VPC AZ 1 vsrx AZ 2 VPN over Direct Connect vsrx Internet Backup VPN Inter-VPC connectivity over VPN Security group securing VPC workloads Inter-VPC security (IDS/IPS, NextGen Firewall) on vsrx Redundancy through dynamic routing - BGP Fully automated VPN connections to new VPCs with zero touch

23 Juniper Security Services Overview Next Generation Firewall Services Unified Threat Management (Known Threats) Threat Intelligence Platform Cloud Based Advanced Anti-Malware (Zero Day) Application Control & Visibility Anti-virus Botnets/C&C Sandboxing Intrusion Prevention Web/Content Filtering GEO-IP Evasive Malware User-based Firewall Anti-spam Custom Feeds, APT Rich Reporting, Analytics SRX Foundation Services Firewall NAT VPN Routing Management Reporting Analytics Automation

24 Advanced Policy Based Routing (AppRoute/APBR) Corporate HQ Enterprise App Server MPLS Applications N Branch Internet

25 Juniper Automation and Orchestration Solution SDN NorthStar Contrail MH API BASED THIRD PARTY JUNOS Space JUNOS SDK Network Director Security Director Puppet Chef Ansible OFF-BOX NETCONF Juniper Openstack Plug-in Juniper Cloudstack Plug-in OpenClos ON-BOX PY-EZ Ruby-EZ SLAX ZTP OPEN PLATFORM One JUNOS Software JUNOS SDK

26 26 Live Demo

27 Software Defined Secure Network Demo Aruba Enforcement on Cisco Switch Dwann A. Hall Sr. Security Solutions Specialist

28 Solution Components Product Junos Space 17.1R2 Description Network Management Platform Security Director 17.1R2 PE UI and SRX policy deployment Policy Enforcer 17.1R2 (PE) SRX with Sky ATP Aruba Clear Pass / Cisco ISE User intent policy for threat management, deployment with Juniper Switches as well as integration with Aruba Clear Pass and Cisco ISE for 3 rd party Switch enforcement Sky ATP for threat detection and feeds v/srx for malware file scanning and policy enforcement Integration w/ Network Access Control (Radius/802.1x) Juniper and (or) 3 rd party Switches Infected host tracking and enforcement (block/quarantine)

29 EX/QF X SDSN in a Third-Party Switched Network 2 SRX Cisco S/W 1 7 SKY ATP 6 EX/Cisco 3 Radius Access Server Juniper 3 rd Party Wireless 5 Policy Enforcer Policy Controller Connector Framework Connector API 3 rd Party SW Connector 4 Feed Collector Cloud Feed Server Remote Feed Server 1. End user authenticates to network via 802.1x or mac authentication 2. Sky detects End Point getting the infected 3. Policy Enforcer downloads the Infected Host Feed. 4. PE enforces the Infected Host policy with the 3 rd Party SW Connector calling the generic API 5. 3 rd Party Connector queries AAA Server for Endpoint details for Infected Host IP initiates CoA for the Infected Host mac. 6. CoA action could be block or quarantine vlan. 7. Enforcement happens on the NAC device End Point authenticated on. 8. Policy enforcer Communicated the end host details back to sky

30 Demo SDSN Enforcement via Aruba Clear Pass User vlan 10 Quarantine vlan 99

31 DEMO

32 Juniper SDSN Network as a Firewall Key Take Aways Deploy alongside your existing firewalls No changes required to existing firewalls Automates the threat remediation in a significantly reduced time Block or quarantine any infected host from connecting to the network Stop threats faster - minimize horizontal spread of malware Significantly reduce business impact

33

Software-Define Secure Networks The Future of Network Security for Digital Learning

Software-Define Secure Networks The Future of Network Security for Digital Learning Software-Define Secure Networks The Future of Network Security for Digital Learning SIGS, 5.Juli 2015 Klaus Ernst, Systems Engineer Juniper Networks Threat Landscape Feels like Treading Water 2017 IT Priorities

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention The evolution of malware threat mitigation Nguyễn Tiến Đức ntduc@juniper.net 1 Most network security strategies focus on security at the perimeter only outside in.

More information

Build a Software-Defined Network to Defend your Business

Build a Software-Defined Network to Defend your Business Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks

More information

Zero Trust Security with Software-Defined Secure Networks

Zero Trust Security with Software-Defined Secure Networks Zero Trust Security with Software-Defined Secure Networks Srinivas Nimmagadda and Pradeep Nair Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject

More information

SECURING THE MULTICLOUD

SECURING THE MULTICLOUD SECURING THE MULTICLOUD Bahul Harikumar and Ali Bidabadi Juniper Networks This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.

More information

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks Defending Against Unkown Automation is the Key Rajesh Kumar Juniper Networks When and not if you will get attacked! ON AVERAGE, ATTACKERS GO UNDETECTED FOR OVER 229 DAYS Root cause of Security Incidents

More information

Policy Enforcer. Product Description. Data Sheet. Product Overview

Policy Enforcer. Product Description. Data Sheet. Product Overview Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.

More information

Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce

Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger Director System Engineering, NCP Engineering Inc. Vaishali Ghiya Senior Director,

More information

Extending Enterprise Security to Multicloud and Public Cloud

Extending Enterprise Security to Multicloud and Public Cloud Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject

More information

Software-Defined Secure Networks. Sergei Gotchev April 2016

Software-Defined Secure Networks. Sergei Gotchev April 2016 Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average

More information

Software Defined Secure Networks

Software Defined Secure Networks Software Defined Secure Networks Seguridad Avanzada en Campus Complejos José Fidel Tomás fidel.tomas@juniper.net Security is in Transformation THREAT SOPHISTICATION Zero day attacks Advanced, persistent,

More information

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Software-Defined Secure Networks in Action

Software-Defined Secure Networks in Action Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated

More information

Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017

Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017 Security Everywhere Within Juniper Networks Mobile Cloud Architecture Mobile World Congress 2017 Agenda Challenges and Trends Use Cases and Solutions Products and Services Proof Points Juniper s Mobile

More information

JUNIPER SKY ADVANCED THREAT PREVENTION

JUNIPER SKY ADVANCED THREAT PREVENTION Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services

More information

Policy Enforcer. Policy Enforcer Connectors Guide. Modified: Copyright 2018, Juniper Networks, Inc.

Policy Enforcer. Policy Enforcer Connectors Guide. Modified: Copyright 2018, Juniper Networks, Inc. Policy Enforcer Policy Enforcer Connectors Guide Modified: 2018-05-31 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper

More information

Digital Transformation

Digital Transformation Digital Transformation Content Consumer Pankaj Kitchlu CTO, Juniper Network (India-SAARC) Legal Statement Regarding Current Products and Intentions This statement of product direction sets forth Juniper

More information

Overview of the Juniper Networks Mobile Cloud Architecture

Overview of the Juniper Networks Mobile Cloud Architecture Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud

Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud Juniper SD-WAN Alexandre Cezar Consulting Systems Engineer, Security/Cloud acezar@juniper.net MARKET DYNAMICS Branch/WAN Evolution: PMO FMO Bring Agility and Enhanced Customer Experience Utilizing Cloud

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Configuration Example March 2018 2018 Juniper Networks, Inc. Juniper Networks, Inc. 1133

More information

Juniper Unite Cloud-Enabled Enterprise Reference Architecture

Juniper Unite Cloud-Enabled Enterprise Reference Architecture Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.

More information

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017 Overview of the Juniper Mobile Cloud Laying the Foundation for a Next-gen Secure Telco Cloud Mobile World Congress 2017 Summary Mobile Challenges and Trends through 2020 Business Drivers Enable new revenue

More information

FUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY

FUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY FUNDAMENTALS FOR RELOADED MPLS-VPN CONNECTIVITY Tony Sarathchandra Director, Product Management Dec 12 th, 2017 This statement of direction sets forth Juniper Networks current intention and is subject

More information

Cloud-Enable Your District s Network For Digital Learning

Cloud-Enable Your District s Network For Digital Learning Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission

More information

CAMPUS AND BRANCH RECAP. Ralph Wanders Consulting Systems Engineer

CAMPUS AND BRANCH RECAP. Ralph Wanders Consulting Systems Engineer CAMPUS AND BRANCH RECAP Ralph Wanders Consulting Systems Engineer THE NEW CAMPUS & BRANCH ARCHITECTURE IS SIMPLY CONNECTED.. BYOD, Explosion of Apps Coordinated Security Simply Connected Performance at

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid

More information

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant Smart and Secured Infrastructure Rajesh Kumar Technical Consultant IoT Use Cases Smart Cities Connected Vehicles / V2X / ITS Industrial Internet / IIoT / Industry 4.0 Enterprise IoT / Smart Buildings Technical

More information

INTERCONNECTING MULTICLOUD WITH VMX

INTERCONNECTING MULTICLOUD WITH VMX INTERCONNECTING MULTICLOUD WITH VMX Julie Zhao Senior Product Manager This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases

More information

Extending Enterprise Security to Public and Hybrid Clouds

Extending Enterprise Security to Public and Hybrid Clouds Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are migrating toward public or hybrid clouds much faster than expected, creating

More information

JN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.

JN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min. JN0-210.juniper Number: JN0-210 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which protocol does Juniper Networks recommend to provide real-time updates of the network topology to the NorthStar

More information

Extending Enterprise Security to Public and Hybrid Clouds

Extending Enterprise Security to Public and Hybrid Clouds Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are increasingly migrating to public or hybrid deployments, creating an immediate

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

CONTRAIL SECURITY. Contrail Cloud Networking & Security

CONTRAIL SECURITY. Contrail Cloud Networking & Security CONTRAIL SECURITY Aniket Daptari Sr. Product Manager Contrail Cloud Networking & Security Scott Sneddon Senior Director Cloud and SDN This statement of direction sets forth Juniper Networks current intention

More information

METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER

METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

Evolved Campus Core: An EVPN Framework for Campus Networks. Vincent Celindro JNCIE #69 / CCIE #8630

Evolved Campus Core: An EVPN Framework for Campus Networks. Vincent Celindro JNCIE #69 / CCIE #8630 Evolved Campus Core: An EVPN Framework for Campus Networks Vincent Celindro JNCIE #69 / CCIE #8630 This statement of direction sets forth Juniper Networks current intention and is subject to change at

More information

Juniper Networks Switching: EX & QFX Series

Juniper Networks Switching: EX & QFX Series Sales Guide straight to the point Juniper Networks Switching: EX & QFX Series Juniper Sales team: juniper@westconsecurity.be tel. +32 2 461 01 703 Juniper Product Manager: bart.degroote@westconsecurity.be

More information

OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT

OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT sdn-and-nfv-technical---georgia-tech---sep-2013---v2 Bruno Rijsman, Distinguished Engineer 24 September 2013 Use Cases 2 Copyright 2013 Juniper Networks,

More information

Building a Software-Defined Secure Network for Healthcare

Building a Software-Defined Secure Network for Healthcare Building a Software-Defined Secure Network for Healthcare Detect, adapt, and enforce security policies faster with network-wide visibility, orchestration, and control Challenge Enable digital transformation

More information

Improve application deployment by 400% with your own private cloud

Improve application deployment by 400% with your own private cloud Improve application deployment by 400% with your own private cloud Increase Business Agility and Revenue Andy Leung Senior Consulting Manager, Center of Excellence THE NATURAL DESIRE FOR CUSTOMIZATION

More information

Security Automation Connecting Your Silos

Security Automation Connecting Your Silos Security Automation Connecting Your Silos Lisa Lorenzin Principal Solutions Architect Juniper Network What We Have 9/29/2014 Copyright 2014 Trusted Computing Group 2 Drowning in Information 9/29/2014 Copyright

More information

Beyond Firewalls: The Future Of Network Security

Beyond Firewalls: The Future Of Network Security Beyond Firewalls: The Future Of Network Security XChange University: IT Security Jennifer Blatnik 20 August 2016 Security Trends Today Network security landscape has expanded CISOs Treading Water Pouring

More information

Juniper Sky Enterprise

Juniper Sky Enterprise Juniper Sky Enterprise Product Overview Network complexity is growing exponentially. Traffic levels continue to rise thanks to the proliferation of mobile and Internet of Things (IoT) devices being connected

More information

Security Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper

Security Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper Security Everywhere within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Security Bundle, JSEC & AJSEC

Junos Security Bundle, JSEC & AJSEC Junos Security Bundle, JSEC & AJSEC COURSE OVERVIEW: This bundle combines JSEC & AJSEC at a discounted rate. Please Contact SLI to purchase this bundle. This five-day course covers the configuration, operation,

More information

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

Software Defined Broadband Networks. Jon Mischel Director, Product Management

Software Defined Broadband Networks. Jon Mischel Director, Product Management Software Defined Broadband Networks Jon Mischel Director, Product Management This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without notice.

More information

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2 Tuncay Seyran Security in a virtualized environment: same security risks + more TRADITIONAL SECURITY RISKS IMPACTING VIRTUAL ENVIRONMENTS

More information

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them

More information

Journey to Secure and Automated Multi-cloud

Journey to Secure and Automated Multi-cloud Journey to Secure and Automated Multi-cloud 2018 Mark Hinckley WW SE and Partner Enablement Juniper Networks Agenda Evolution of Value [Chain] Rise of Enterprise Multicloud Network as the Security Platform

More information

Securing the SMB Cloud Generation

Securing the SMB Cloud Generation Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product

More information

ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM

ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM ROLE OF NETWORK VIRTUALIZATION AND SOFTWARE DEFINED SECURITY IN MULTICLOUD ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM This statement of direction sets forth Juniper Networks current intention and

More information

Routing Applications State of the Art and Disruptions

Routing Applications State of the Art and Disruptions Routing Applications State of the Art and Disruptions Use cases, Innovations and Disruptions Sachin Natu, Sr. Director Product Management Disha Chopra, Sr. Manager Product Management This statement of

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years

More information

SECURE HYBRID CLOUD Solution

SECURE HYBRID CLOUD Solution SECURE HYBRID CLOUD Solution DEFEND YOUR GREATEST ASSETS MARKET SITUATION On premise data centers = Expensive The migration of physical data centers to the private and public cloud is happening. Quickly.

More information

Contrail Cloud Platform Architecture

Contrail Cloud Platform Architecture Contrail Cloud Platform Architecture Release 10.0 Modified: 2018-04-04 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper

More information

Contrail Cloud Platform Architecture

Contrail Cloud Platform Architecture Contrail Cloud Platform Architecture Release 13.0 Modified: 2018-08-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper

More information

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability

More information

Gladiator Incident Alert

Gladiator Incident Alert Gladiator Incident Alert Allen Eaves Sabastian Fazzino FINANCIAL PERFORMANCE RETAIL DELIVERY IMAGING PAYMENT SOLUTIONS INFORMATION SECURITY & RISK MANAGEMENT ONLINE & MOBILE 1 2016 Jack Henry & Associates,

More information

The Internet of Everything is changing Everything

The Internet of Everything is changing Everything The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device

More information

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager CYBER ATTACKS DON T DISCRIMINATE Michael Purcell, Systems Engineer Manager THREAT LANDSCAPE IS HUGE AND ORGANIZED $8 TRILLION Will be cost of fighting cybercrime in 2022 (JuniperResearch) 14.5 BILLION

More information

SDSN: Dynamic, Adaptive Multicloud Security

SDSN: Dynamic, Adaptive Multicloud Security SDSN: Dynamic, Adaptive Multicloud Security Evolving from firewall to user-intent for flexible in the cloud Challenge Legacy, which do not dynamically adapt to different workflows, must be individually

More information

Contrail SD-WAN Design & Architecture Guide

Contrail SD-WAN Design & Architecture Guide 2018 Juniper Networks, Inc. 1 Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. and/or its affiliates in the United States and other countries.

More information

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q&A Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13 Q. What is the Cisco Cloud Services Router 1000V? A. The Cisco Cloud Services Router 1000V (CSR 1000V) is a router in virtual

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Security Made Simple by Sophos

Security Made Simple by Sophos Security Made Simple by Sophos Indian businesses in the radar of cyber-threats Frequency of cyber-attacks Most targeted systems / IT assets -- KPMG Cybercrime Survey Report 2015 3 ON AN AVERAGE, HOW MUCH

More information

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ Threat Containment and Operations Yong Kwang Kek, Director of Presales SE, APJ 2018-07-19 1 1 2017 Infoblox Inc. All Rights 2013 Infoblox Inc. All Reserved. Rights Reserved. Three Aspects of Security #1

More information

CloudSOC and Security.cloud for Microsoft Office 365

CloudSOC and  Security.cloud for Microsoft Office 365 Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed

More information

Securing the Software-Defined Data Center

Securing the Software-Defined Data Center Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined

More information

Software-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager

Software-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager Software-Defined Secure Networks (SDSN) Using Third-Party Devices and Aruba ClearPass Policy Manager Modified: 2018-05-07 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any

More information

Cisco SD-WAN and DNA-C

Cisco SD-WAN and DNA-C Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent

More information

Več kot SDN - SDA arhitektura v uporabniških omrežjih

Več kot SDN - SDA arhitektura v uporabniških omrežjih Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements

More information

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Cisco Cloud Security. How to Protect Business to Support Digital Transformation Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,

More information

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017 Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope

More information

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Securing Dynamic Data Centers Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan & Afghanistan @WajahatRajab Modern Challenges By 2020, 60% of Digital Businesses will suffer Major Service

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist April 2018 New

More information

Juniper Solutions for Turnkey, Managed Cloud Services

Juniper Solutions for Turnkey, Managed Cloud Services Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take

More information

Security Partner Activation Kit

Security Partner Activation Kit Security Partner Activation Kit April 2015 One stop shop to find key Juniper Security resources and accelerate your security business SECURITY : QUICK START GUIDE What should I do first Step 1. Understand

More information

Cloud-Enable the Enterprise with Junos Fusion

Cloud-Enable the Enterprise with Junos Fusion Cloud-Enable the Enterprise with Junos Fusion Simple, smart, flexible solution for managing the corporate network as a single, logical device 1 Table of Contents Executive Summary... 3 Introduction...

More information

VMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder

VMWARE SOLUTIONS AND THE DATACENTER. Fredric Linder VMWARE SOLUTIONS AND THE DATACENTER Fredric Linder MORE THAN VSPHERE vsphere vcenter Core vcenter Operations Suite vcenter Operations Management Vmware Cloud vcloud Director Chargeback VMware IT Business

More information

Benefits of SD-WAN to the Distributed Enterprise

Benefits of SD-WAN to the Distributed Enterprise WHITE PAPER Benefits of SD-WAN to the Distributed Enterprise 1 B enefits of SD-WAN to the Distributed Enterprise Branch Networking Today More Bandwidth, More Complexity Branch or remote office network

More information

Innovation & GTM Engine

Innovation & GTM Engine Investor Day 2014 Innovation & GTM Engine Rami Rahim EVP, Juniper Development & Innovation Vince Molinaro EVP, Chief Customer Officer October 30, 2014 How and Why Our Technology Will Win Addressing Your

More information

Cisco Security Exposed Through the Cyber Kill Chain

Cisco Security Exposed Through the Cyber Kill Chain Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE

More information

WHITE PAPER. Applying Software-Defined Security to the Branch Office

WHITE PAPER. Applying Software-Defined Security to the Branch Office Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry

More information

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks

More information

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Cisco Cyber Range. Paul Qiu Senior Solutions Architect Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I

More information

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark

More information

Infrastructure Trends in Education. New Mexico Technology in Education 2016 Conference

Infrastructure Trends in Education. New Mexico Technology in Education 2016 Conference Infrastructure Trends in Education New Mexico Technology in Education 2016 Conference Table of Contents Infrastructure Trends in Education Juniper Networks Today Juniper Networks in Education Automating

More information

Learn more with Westcon. Switching: EX & QFX Series SALES GUIDE Your JUNIPER NETWORKS dedicated Sales Team

Learn more with Westcon. Switching: EX & QFX Series SALES GUIDE Your JUNIPER NETWORKS dedicated Sales Team Learn more with Westcon Switching: EX & QFX Series Your JUNIPER NETWORKS dedicated Sales Team Tel. +34 91 563 92 88 marketing.iberia@westcon.es www.westcon.es SALES GUIDE 2014 Juniper Networks - Connect

More information

Cybersecurity Roadmap: Global Healthcare Security Architecture

Cybersecurity Roadmap: Global Healthcare Security Architecture SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products

More information

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat WHITE PAPER Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat Executive Summary Unfortunately, it s a foregone conclusion that no organisation is 100 percent safe

More information

Mitigating Branch Office Risks with SD-WAN

Mitigating Branch Office Risks with SD-WAN WHITE PAPER Mitigating Branch Office Risks with SD-WAN 1 M itigating Branch Office Risks with SD-WAN Branch Security Overview The branch or remote office stands out as a point of vulnerability in an increasingly

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information