Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Similar documents
1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

CA Top Secret r14 for z/os

Data Protection: Your Choice Is Simple PARTNER LOGO

Building Your Security Operations Center and Taking it to the Next Level

n Explore virtualization concepts n Become familiar with cloud concepts

STRATEGIC. alliances & Services

Continuity Logic Frontline Live

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

Intelligent Systems in Retail. Powered by Windows Embedded

CA InterTest for CICS r8.5

Contain known and unknown malware with leading Cisco Advanced Malware Protection (AMP) and sandboxing.

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Contain known and unknown malware with leading Cisco Advanced Malware Protection (AMP) and sandboxing.

OnApp Cloud. The complete platform for cloud service providers. 114 Cores. 286 Cores / 400 Cores

OpenText RightFax Fax Server

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Expect. Unexpected Start with a plan, not a disaster. the. Order by phone Order online zones.com/bizcont. Document Management

IS-IS in Detail. ISP Workshops

YSoft SafeQ. Accounting Software and Terminals. Applications YSoft SafeQ

How Asigra Cloud Backup Protects Your Network

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

OnApp Cloud. The complete cloud management platform

Motivation for this class

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

Windows Server 2008 R2 networking

Going Mobile with. SYSPRO Espresso

PayMobile. Features Overview

USER GUIDE FOR VENDOR LISTING DATASHEET

CS644 Advanced Networks

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Optimizing Out-of-band Management

Cyber Risk Mitigation for Smart Cities

User Guide. Using Caliber Datamart

BE Software Upgrades to ITALYCS 5. It s in the. Software

Air Force Data Reference Architecture and Platform

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

IT administrators face a variety of challenges

1 Enterprise Modeler

Transitioning to BGP

Architectural styles for software systems The client-server style

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework

Bike MS: 2013 Participant Center guide

Bike MS: 2014 Participant Center guide

Demystifying IaaS Adoption for Enterprise Applications

Complete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel.

CAEN Tools for Discovery

BEA WebLogic Collaborate

Avid Interplay Bundle

How Deutsche Telekom protects customer data

Web OS Switch Software

Addressing SaaS Security

Schlage Control, LE, NDE and CTE solutions. featuring ENGAGE web and mobile applications

SCAN INSPECT TRACK SOLVE

BAAN IV. BAAN IV Installation Manual for DB2 on Windows NT

G2 T. Specification Sheet G2T-001 G2T Touchscreen Mainframes Accepts G2 Plug-in Modules Four Sizes: 2RU, 3RU, 6RU and 8RU

The Software Delivery Experts. Agile, DevOps & QA Conference

WebCase Version 1.9b E v a l u a t i o n R E p o R t May 2012

Firewall and IDS. TELE3119: Week8

Panel for Adobe Premiere Pro CC Partner Solution

BEA WebLogic Commerce Server. Registration and User Processing Package

BIKE MS: 2015 PARTICIPANT CENTER GUIDE

OPC Server ECL Comfort 210/310 OPC Server

Serverless Computing: A Compelling Opportunity for Today s Digital Enterprise

Learn more with Westcon. Switching: EX & QFX Series SALES GUIDE Your JUNIPER NETWORKS dedicated Sales Team

Data Warehousing. Paper

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.

JavaFX. JavaFX 2.2 Installation Guide Release 2.2 E August 2012 Installation instructions by operating system for JavaFX 2.

CORD Test Project in Okinawa Open Laboratory

Making Software Inclusive and Accessible

G2 T Made in the USA. Specification Sheet G2T-001 G2T Mainframes with Touchscreen Accepts G2 Plug-in Modules Four Sizes: 2RU, 3RU, 6RU and 8RU

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information

Baan Tools User Management

Device-as-a-Service Model: Key to Workplace Transformation in the High Tech Industry

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Oracle Process Manufacturing

Oracle Process Manufacturing

User s Guide. OMEGAMON XE for WebSphere MQ Integrator. Version 110 GC July 2002

Isn t It Time You Got Faster, Quicker?

In today s information technology culture, the term server is thrown around

System and Software Architecture Description (SSAD)

Project Management Best Practice Training and Certifications. Clement Pereira Head of elearning SPOCE Project Management Ltd.

THE FUTURE IS EFFICIENT

1&1 Next Level Hosting

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

ENTERPRISE ARCHITECTURE TRAINING COURSES to-tonex ( ) International: Fax:

Amplifying Mission Value through Cloud Computing

BEA Tuxedo. Introducing the BEA Tuxedo System

Τεχνολογία Λογισμικού

GAAFR. Supplement. Now Available. Covering: pronouncements: Statement Nos. 67, 68, 69, and 70

IS-IS for IPv6. ISP Workshops

Strengthening Privacy Protection with the European General Data Protection Regulation

Anti Fraud Services Founding Member Associate Member of..

The Threat Hunting Route to Predictive Cyber Security

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

MOTIF XF Extension Owner s Manual

SRx. HD/SD Dual Input Diversity COFDM Receiver. Features. Options. Accessories. Applications

Oracle Process Manufacturing

Transcription:

Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE

Juiper Networks: Coectivity Security for Coectivity - Use the same eterprise etwork ifrastructure to securely coect remote ad local users ad devices - Eable BYOD iitiatives - Icrease Employee Satisfactio ad Productivity MAG2600 Wire ad Wireless User ad Device Local ad Remote C orporate ad Persoal For small to medium sized busiess customers MAG4610 Applicatio acceleratio for SMBs through medium to large sized eterprises MAG4611 Products : MAG Series Juos Pulse Gateways Deliver SSL VPN coectivity ad/or etwork access cotrol (UAC) through a sigle coverged gateway. è Idustry s oly uified remote ad local access security solutio è Available as virtual appliace to add flexibility è Dyamic policy-drive security eforcemet across etire etwork è Eforce device security posture to esure policy compliace è Broad coverage to support eterprise BYOD iitiatives MAG Series are replacig SA ad IC Series 2 ) More o UAC For SMBs through medium to large sized eterprises MAG6610 Modular chassis for eterprise customers MAG6611 Modular chassis for the complex eeds of large eterprise customers ad govermet agecies

Juiper Networks: Coectivity ISG Series Itegrated Security Gateways Network security firewall desiged to deliver scalable etwork ad applicatio access cotrol ad etwork security for large eterprise, carrier ad data ceter etworks. è Predictable performace: ASIC-based architecture provides liear performace for all packet sizes at multi-gigabit speeds è System ad etwork resiliecy: Hardware compoet redudacy, multiple high availability optios ad route based VPNs offer reliability ad resiliecy è Network security: embedded web filterig, ati-spam, IPS, ICAP ativirus redirect ad optioal itegrated IDP. è Network segmetatio: Security zoes, virtual systems, virtual LANS ad virtual routers allow admiistrators to deploy security policies to isolate guests ad regioal servers or databases. è Certificatios: FIPS, ICSA, Robust IPv6 ISG1000 Multi-gigabit performace firewall ISG2000 Multi-gigabit performace firewall which also eables IDP itegratio 3

Juiper Networks: Coectivity SRX Series Security gateways that provide essetial Firewall, IDP ad reach Routig capabilities è Scalable performace eables additioal services without degradatio è System ad etwork resiliecy esures carrier-class reliability è Network segmetatio allows admiistrators to tailor security ad policies SRX Series for the Brach SRX100 For securig small distributed eterprise locatios SRX110 For securig small brach departmets SRX210 è Iterface flexibility meets the eeds of ay etwork è Comprehesive threat protectio M Watch the demo SRX Series for the Data Ceter SRX1400 For securig small- to mid-size data ceters SRX3400 For securig small ad midsize server farms ad hostig sites For small distributed eterprise locatios SRX220 For small to medium distributed eterprise locatios SRX240 For brach distributed eterprise locatios SRX550 SRX3600 For securig medium to large eterprise data ceters ad hosted or co-located data ceters SRX5600 For securig large eterprise data ceters or service provider ifrastructures For medium ad large brach locatios SRX650 For securig regioal distributed eterprise locatios 4 SRX5800 For security large eterprise data ceters, hosted or co-located data ceters, ad service provider ifrastructures

Juiper Networks: Coectivity Uified Access Cotrol (UAC) A stadards-based, scalable, graular access cotrol solutio that creates ad propagates dyamic policies based o user idetity ad role, device type ad itegrity, ad locatio. UAC is comprised of Juos Pulse, Juos Pulse Access Cotrol Service, MAG Series Juos Pulse Gateways ad IC Series. è Vedor-agostic access cotrol è Simple guest user access cotrol è Applicatio-specific policy rules ca be graularly eforced for è Sessio federatio UAC ad SSL/VPN for sessio trasparecy è Dyamically addresses umaageable edpoit devices (priters ) etwork, cloud, applicatio ad data Juos Pulse Juos Pulse is a itegrated, multiservice edpoit solutio for mobile ad omobile devices that serves as a eablig Data Ceter for security, coectivity, access cotrol, collaboratio ad acceleratio services. è Eables mobile ad remote etwork access, etwork security, ad applicatio acceleratio, icreasig visibility ad maageability while eablig secure access to etwork resources based o user idetity ad role è Reduces the cost ad time associated with deploymet è Uses idustry ad ope stadards è Serves as a Data Ceter for itegratio of select third-party, best-i-class security, access ad coectivity applicatios è Delivers a value-added services Data Ceter for service providers Services curretly supported ad delivered through Juos Pulse iclude: Juos Pulse Mobile Security Suite Protects smartphoes, tablets ad other mobile devices from viruses, malware, loss or theft, physical compromise ad other threats. It also delivers robust remote device moitorig, cotrol ad maagemet. Juos Pulse Secure Access Service Eables orgaizatios to easily ad securely federate user idetity with third-party web applicatios, deliverig seamless user autheticatio ad access to cloud-based applicatios. Juos Pulse Applicatio Acceleratio Service M Watch the video Eables dyamically provisioed, pervasive, locatio-agostic applicatio acceleratio. It also provides a easy, affordable solutio for small offices where a dedicated applicatio acceleratio appliace is ot ecoomically feasible. 5

Juiper Networks: Data Ceter Security for Data Ceter - Guaratee cosistet security ad policy applicatios across the etire data ceter - Eable better busiess agility without affectig performace. Traditioal Data Ceter Virtualized Data Ceter Hostig Cloud Products : SRX Series for the DataCeter ) See page 4 M Watch the video Uified Access Cotrol (UAC) ) See page 5 vgw Virtual Gateway Security A solutio for virtualized data ceters ad clouds moitors ad protects them while maitaiig maximum capacity ad performace. Its hypervisorbased stateful firewall itegrates itrusio detectio (IDS), virtualizatio-specific ativirus (AV) protectio ad compliace tools, with maagemet scale. è Visibility : a complete view of etwork traffic flowig betwee VMs ad a complete VM ad VM group ivetory. è Protectio: stateful firewall provides layers of defeses ad automated security through access cotrol over all traffic usig policies that defie which ports, protocols, destiatio ad VMs, should be blocked. ècompliace: moitors for ad eforces corporate ad regulatory policies, icludig segregatio of duties, busiess-warrated access, ad ideal/desired images ad cofiguratios 6

Juiper Networks: Data Ceter STRM Series Combies etwork performace ad security maagemet ito a sigle solutio for eterprise ad service provider customers, i additio to itegrated log, threat ad compliace maagemet for both Juiper ad o-juiper products. è Itegrated log maagemet, security iformatio ad evet maagemet (SIEM) è Network, security, applicatio ad idetity awareess è Advaced threat ad security icidet detectio è Scalable distributed log collectio ad archive è Compliace-drive reportig capabilities STRM500 Security Threat Respose Maager is a plug-i etwork security maagemet solutio ideal for small, medium-size ad large eterprises. This etwork security maagemet solutio ca also be deployed for collectio of etwork flows STRM2500 Security Threat Respose Maager is a eterprise appliace, deliverig scalable etwork security maagemet. This etwork security maagemet solutio is ideal for medium-size to large compaies which will require additioal flow ad evet moitorig capacity i the future STRM5000 Security Threat Respose Maager is a eterprise ad carrier-class appliace providig global deploymet of scalable etwork security maagemet solutios for medium-size ad large compaies. This etwork security maagemet solutio is ideal for global flow ad evet moitorig 7

Juiper Networks: Applicatios ad Cotet Security for Applicatios ad Cotet - Protect critical Web-based applicatios agaist attacks - Maitai user-cetric, policy-drive, applicatio-aware, visibility ad cotrol Legacy, Web ad Cloud Apps Locatio Idepedet Applicatio visibility ad cotrol, Cotet Protectio Products : IDP Series Protects agaist Network ad Applicatio-level attacks è Stateful Sigature Detectio to miimize false positives è Protocol Aomaly Detectio to Proactively protect etwork from udiscovered vulerabilities è Traffic Aomaly Detectio to protect agaist DDOS Attacks è VLAN-Aware Rules to apply uique policies based o departmet, customer ad compliace requiremets è IDP Reporter, Pre-cofigured real-time reportig capability available i each IDP appliace IDP75 For small ad mid-size busiesses ad remote offices, providig a cost-effective method of esurig etwork applicatio security maagemet ad availability IDP250 For mid-size ad large eterprises offerig cotiual etwork itrusio detectio ad applicatio security maagemet for eterprise etworks ad etwork applicatios IDP800 For mid-size ad large eterprises ad service providers IDP8200 For large eterprise etworks ad service providers requirig the highest throughput, reliability, ad quality of service 8

Juiper Networks: Applicatios ad Cotet Juos WebApp Secure Web Itrusio Deceptio System that detects, tracks, profiles ad prevets hackers i real-time. Juos WebApp Secure,ulike sigature-based approaches, iserts radom variable detectio poits or tar traps, ito the code of outboud Web applicatio traffic to proactively idetify attackers before they ca do damage - without false positives. è Detectio by deceptio è Track the attacker ad record the attack è Uderstad how your website is attacked to better defed yourself è Stop attackers i their tracks è Simple maagemet M Watch the demo Juos WebApp Secure: MWS1000 A appliace that rus Juos WebApp Secure. It is a plug-i solutio that makes it easy to istall this web itrusio deceptio system that detects, tracks, profiles ad prevets hackers i real-time. Juos Spotlight Secure A ew cloud-based hacker device itelligece service that will idetify idividual attacker devices ad track them i a global database. It will create a persistet figerprit of attacker devices for precise idetificatio ad blockig of attackers. Juos DDoS Secure Cotiually moitors ad logs all i- ad out-boud web traffic. Juos DDoS Secure uses its CHARM algorithm to lear which IP addresses ca be trusted ad is able to respod itelligetly ad i real time by droppig suspect or ocompliat packets as soo as the optimum performace from critical resources begis to degrade. 9

Juiper Networks: Sales & Traiig at Westco Do ot forget o your Sales Order Demo Uits Subscriptio Boost your Juiper Sales close rate by offerig your ed user customers a evaluatio uit to prove products beefits ad features. Reewal Ed-user support cotact details: Cotact ame Osite address Phoe umber Email address Cotact your Sales Represetative at Westco Security Ed-user ame S/N or licese key Required term dates Need help for your quote? Cotact our Juiper Team: Tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk Get Traied o Juiper Security ASSOCIATE JNCIA-JUNOS j SPECIALIST JNCIS-SEC For course details ad schedule cotact your Westco Represetative Tel. 01753 797900 academy@westcosecurity.co.uk 10 j PROFESSIONNAL JNCIP-SEC j EXPERT JNCIE-SEC