1 / 22

ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING

In the evolving landscape of cybersecurity threats, Juniper's innovative network security solutions offer dynamic and scalable protection for data centers, branches, and virtual environments. From new attack surfaces to advanced cloud resources, find out how Juniper's secure network can safeguard your enterprise.

kborden
Download Presentation

ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ABNER GERMANOWDIRECTORENTERPRISE MARKETING

  2. THE NEW NETWORK IS SECURE

  3. New Attack Surfaces Datacenter Consolidation New Devices Branch Locations

  4. New Targets New Devices Cloud Resources Virtual Machines

  5. Cyberattacks on Georgian Web Sites Are Reigniting a Washington Debate WASHINGTON – The cyberattacks in Georgia are re-energizing a debate over whether the laws of war apply in cyberspace. Among the biggest questions: When is a cyberattack an act of war? New THREATS DATACENTERS

  6. What is needed? SCALE Security services must scale dynamically as datacenters consolidate APPLICATION SECURITY Application visibility & Control IDENTITY Who is accessing my network, from where, and why? SIMPLIFY Automate security operations to simplify and reduce risk

  7. JUNIPER’S SOLUTION

  8. Every Customer and location Has a Unique Security Balance Connectivity Users and devices CapacityThroughput & response time Control Data separation & user experience

  9. Needs: • Low to moderate connections • Low to moderate capacity • Firewall • IPsec VPN • IPS • UTM: Anti-virus/spam/web security Needs: • High connections • High capacity • Firewall • IPsec VPN • IPS • Virtual Server Security

  10. THE LEGACY NETWORK L2/L3Switch L2/L3Switch SSL VPN Firewall IPSec VPN IPS L2/L3 Switch L2/L3 Switch L2 Switch

  11. CONSOLIDATE & VIRTUALIZE SECURITY APPLIANCES L2/L3Switch L2/L3Switch SSL VPN Firewall IPSec VPN IPS L2/L3 Switch L2/L3 Switch SRX5800 L2 Switch

  12. SECURITY APPLIANCE CONSOLIDATION RATIOS SEEN IN THE FIELD 10 2 to • Consolidate, then additional capacity and service add-ons.

  13. Security is Built-iN To provide Dynamic security at scale • Dynamic allocation of security services within a single platform • Scale to 120 Gbps/platform • Automated firewall changes based on user visibility and policy • Secure shifting traffic flows with a single platform MX Series EX8216 SRX5800 Servers Storage FC SAN

  14. Service offerings continue to grow YESTERDAY’S BOX IS TOMORROW’S FEATURE SRX5800 SRX5600 SRX3600 SRX650 SRX240 SRX210 SRX100

  15. Today’s AppSecurE Portfolio Server connection monitoring User App Identity AppDOS AppSecure Deep packet intelligence Bot/client classification Protocol analysis Threats Size SAP What application? What user? User location? User device? Joe Data AppTrack MORE TO COME… Protocol IP Addr Port (Malware) Discrete Data Analysis Business Analysis

  16. NEW SRX SERVICE: APPTRACK Unparalleled application visibility What application? What user? User location? User device? Deep packet intelligence Size SAP Joe Data Protocol IP Addr Port Discrete Data Analysis Business Analysis

  17. REDUCE COMPLEXITY WITH SECURITY DESIGN Security Design Rapid Device & Service Deployment POLICY ABSTRACTION VPN Deployment Logging Reporting Fast deployment of security services Reduced security risk & complexity

  18. RED CARPET • We have a large installed base of ScreenOS products • 1.3M units • $1.6B • Red Carpet Goal: migrate the installed base of ScreenOS customersto Junos OPPORTUNITY • Lots of happy customers • Junos portfolio sales into a receptive audience • SRX is a strong platform RISK • Any change opens the decision window

  19. RED CARPET PROGRAM SUMMARY 1 2 3 Enhanced usability and ScreenOS feature parity Documentation and tools to help the transition Web/social media/internal communications 4 5 Trainingdiscounts Flexible Incentives Program

  20. We continue to beat competitors DATACENTER SECURITY Juniper #1 at 43.7% share— up 9.2 points Y/Y BRANCH INTEGRATED SECURITY Juniper #2 at 21% share— up 5.4 points Y/Y ENDPOINT ACCESS CONTROL Juniper #1 at 31.7% share— up 3.4 points Y/Y TOTAL NETWORK SECURITY Juniper #2 at 12.6% share— up 2.3 points Y/Y Source: Infonetics

  21. Customer Spectrum Installed Base New Customers • Use the Red Carpet resources to determine migration timing • Get SreenOS experts trained on JUNOS • Offer SRX instead of new application specific hardware • Use SRX to consolidate the conga line of network devices • Position SRX to address datacenter consolidation & virtualization security challenges • Sell the value of a consistent platform

  22. The New Network For Secure data centers Delivers Big Advantages DYNAMIC SECURITY SECURITY TAILORED TO APPLICATION USAGE IDENTITY BASED ARCHITECTURE

More Related