Software-Defined Secure Networks. Sergei Gotchev April 2016

Similar documents
Beyond Firewalls: The Future Of Network Security

Juniper Sky Advanced Threat Prevention

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Build a Software-Defined Network to Defend your Business

Software-Define Secure Networks The Future of Network Security for Digital Learning

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Infrastructure Trends in Education. New Mexico Technology in Education 2016 Conference

Stop Threats Faster. Vaishali Ghiya & Dwann Hall Juniper Networks

Software-Defined Secure Networks in Action

Cloud-Enable Your District s Network For Digital Learning

Security Everywhere Within Juniper Networks Mobile Cloud Architecture. Mobile World Congress 2017

Overview of the Juniper Networks Mobile Cloud Architecture

Policy Enforcer. Product Description. Data Sheet. Product Overview

Building a Software-Defined Secure Network for Healthcare

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Overview of the Juniper Mobile Cloud Architecture Laying the Foundation for a Next-gen Secure Distributed Telco Cloud. Mobile World Congress 2017

How Vectra Cognito enables the implementation of an adaptive security architecture

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Zero Trust Security with Software-Defined Secure Networks

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

Juniper Sky Advanced Threat Prevention

Reducing the Cost of Incident Response

JUNIPER SKY ADVANCED THREAT PREVENTION

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

SECURE HYBRID CLOUD Solution

WHITEPAPER. How to secure your Post-perimeter world

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Cisco Start. IT solutions designed to propel your business

Preparing your network for the next wave of innovation

Mitigating Branch Office Risks with SD-WAN

Security Everywhere within the Juniper Networks Mobile Cloud Architecture. White Paper

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Security Partner Activation Kit

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

align security instill confidence

AKAMAI CLOUD SECURITY SOLUTIONS

Security and Compliance for Office 365

2018 Edition. Security and Compliance for Office 365

Extending Enterprise Security to Public and Hybrid Clouds

A Unified Threat Defense: The Need for Security Convergence

Extending Enterprise Security to Multicloud and Public Cloud

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

Juniper Unite Cloud-Enabled Enterprise Reference Architecture

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

securing your network perimeter with SIEM

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

AT&T Endpoint Security

Software Defined Secure Networks

NEXT GENERATION SECURITY OPERATIONS CENTER

SECURING THE MULTICLOUD

Cisco ISE Plus SIEM and Threat Defense: Strengthen Security with Context

Outnumbered, but not outsmarted A 2-step solution to protect IoT and mobile devices

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Maximum Security with Minimum Impact : Going Beyond Next Gen

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

Spotlight Report. Information Security. Presented by. Group Partner

Five Essential Capabilities for Airtight Cloud Security

Help Your Security Team Sleep at Night

Building a Smart Segmentation Strategy

Rethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team

Business Strategy Theatre

SRX als NGFW. Michel Tepper Consultant

Not your Father s SIEM

The Network Will Define The Winners In The Cloud

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Traditional Security Solutions Have Reached Their Limit

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Coordinated Threat Control

Extending Enterprise Security to Public and Hybrid Clouds

Go mobile. Stay in control.

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Build Your Zero Trust Security Strategy With Microsegmentation

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Rethinking Security: The Need For A Security Delivery Platform

Transforming Security from Defense in Depth to Comprehensive Security Assurance

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Encryption Vision & Strategy

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Cisco ASA 5500 Series IPS Edition for the Enterprise

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Stopping Advanced Persistent Threats In Cloud and DataCenters

CloudSOC and Security.cloud for Microsoft Office 365

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

BUILDING A NEXT-GENERATION FIREWALL

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic

Cisco Connected Factory Accelerator Bundles

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

with Advanced Protection

Transcription:

Software-Defined Secure Networks Sergei Gotchev April 2016

Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average of 4000 nodes with 5 security vendors Risks posed by threats versus risks to business outcomes Metrics of success: total number of attacks stopped vs reduction of risk Attackers are always gaining, staying ahead 2

Threats are Everywhere Perimeter security isn t enough. Malware walks in with your employee! Stop Threats. Faster. Increasing sophistication Increasing variability Threats are already inside Keeping data secure throughout your network is key! 3

Most network security strategies focus on security at the perimeter only outside in. Is securing the perimeter really enough? Today s Enterprise: Perimeter security model Security layered on top of network Trust model: trust what s inside the network Inline Intrusion Prevention Unified Threat Management Inline Anti-Malware Visibility relies mostly on perimeter firewalls Application Security Data Loss Prevention Evolving threats requires adaptability

A Change in Mindset Stop talking about Network Security. Start talking about Secure Networks. Realize threats are everywhere. They are already inside. They walked in your front door Recognize perimeter security isn t enough Detection and Enforcement should be enabled anywhere Acknowledge security is everyone s problem horizontal and vertical 5

Everything on Your Network is a Potential Threat Normal and Abnormal Behavior Normal operation: call home beacons, energy utilization Aberrant behavior: bursting traffic, abnormal high data download rate Is this normal? How to mitigate risk?

The Software Defined Secure Network Operate network as single enforcement domain, every element becomes a policy enforcement point Policy Create and centrally manage policy in natural language Detection Gather and distribute threat intelligence, from multiple sources Enforcement Leverage cloud economics for real time analysis Adapt and enforce policy to the threat feed information, real time across the network. 7

Software-Defined Secure Network Policy, Detection & Enforcement Cloud-based Threat Defense Detection Enforcement Threat Intelligence Your Enterprise Network Detection Enforcement Dynamic and Adaptive Policy Engine Policy Bottoms Up and Top Down Approach Leverage entire network and ecosystem for threat intelligence and detection Utilize any point of the network as a point of enforcement Dynamically execute policy across all network elements including third party devices

Software-Defined Secure Network Detection Juniper Building Blocks Third Party Cloud Security Feeds SRX Series Security from the Cloud Physical Firewall Detection Security Director Enforcement Juniper Cloud Security Spotlight Secure Threat Intelligence Sky Advanced Threat Prevention Mgmt/UI: Policy, App Visibility, Threat Map, Events MX Series Routers Policy Policy Security Policy Controller Third Party Network Elements Comprehensive suite of products: Centralize and automate security Instant threat intelligence and detection Dynamically adapting policy, deployed in real-time Virtual Firewalls vsrx + csrx EX & QFX Series Switches Your Enterprise Network Detection Enforcement Consistent firewall capabilities physical and virtual

Where to Start Modernize Your Perimeter Juniper Cloud Security Spotlight Secure Threat Intelligence Sky Advanced Threat Prevention Upgrade your perimeter to make it adaptable Next Generation Firewall is Current Generation Firewall simplify and remove niche security appliances SRX Series Physical Firewall vsrx & csrx Virtual Firewalls Utilize Cloud Economics for Instant Intelligence that Leads to More Effective Detection Your Enterprise Network

Converse With Your Network Juniper Cloud Security Spotlight Secure Threat Intelligence Security Director Sky Advanced Threat Prevention Mgmt/UI: Policy, App Visibility, Threat Map, Events Deploy Policy Engine that Communicates with Your Network Analytics Capability Based on Network Data Customizable UI Provides Data Correlation Juniper Network Elements Your Enterprise Network Security Policy Controller Third Party Network Elements Utilize All Network Elements as Detection & Enforcement Points Future: Intent Based Policy Engine to Communicate Across Any Network Element

The Right Policy for the Right Job Software Defined Secure Network (SDSN) Policy Engine + Controller Shut down light bulb Or Kill illegitimate tunnel Different threat levels need different policies Aberrant lightbulb: quarantine and create new policy for correct behavior Compromised core switch? The right policy for the right level of threat Example 1 Example 2

Juniper s Security Vision From Network Security to Secure Networks Only one in the industry with building blocks for tomorrow s Software-Defined Secure Network Simplified Policy and Management across all network elements Adaptable Security Solution based on real time threat intelligence information Cost Effective Detection and Enforcement utilizing the entire network to protect you The Juniper Software-Defined Secure Network dynamically adapts to changing threat landscape so you don t have to!

Thank you