Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)

Similar presentations


Presentation on theme: "Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)"— Presentation transcript:

1 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)

2 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 2 Aligning IT with the Business is Essential  Challenges Control operational costs, maximize investments, simplify operations Manage threats, control access Assure service levels and application performance Mitigate IT risk  Opportunities Pursue opportunity, enable growth, respond to changes Innovate to deliver services that create competitive advantage Change the rules and win the game Stay in the game The CIO Dilemma $ Time Grow & Transform Transform Transform IT Budgets Run the Business Run the Business

3 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 3 Customer Challenges  IT “information” overload Flood of logged events from many “point” network and security devices Lack of expertise to manage disparate data silos & tools  Compliance mandates Industry specific regulations mandating security best practices Internal IT “risk” assessment programs  Evolving internal and external threats Insider abuse, theft of intellectual property Complex integrated attacks Dispersed Threats Industry Regulations IT Overload

4 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 4 Security Information & Event Management Introducing Junipers SIEM/NBAD Solution STRM – “Security Threat Response Manager”  STRM Key application features Log Management Provides long term collection, archival, search and reporting of event logs, flow logs and application data Security Information and Event Management (SIEM) Centralizes heterogeneous event monitoring, correlation and management Network Behavior Anomaly Detection (NBAD) Discovers aberrant network activities using network and application flow data Integrates Mission Critical Network & Security Data Silos Network Behavior Analysis Log Management STRM

5 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 5 STRM’s Key Value Proposition Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Compliance and Policy Safety Net Complements Juniper’s Enterprise Mgmt Portfolio Juniper’s STRM Appliance Enterprise Value

6 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 6 STRM Architecture  STRM – Real time network & security visibility  Data collection provides network, security, application, and identity awareness  Embedded intelligence & analytics simplifies security operations  Prioritized “offenses” separates the wheat from the chafe  Solution enables effective Threat, Compliance & Log Management

7 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 7 Reporting  220+ Out of the box report templates  Fully customizable reporting engine: creating, branding and scheduling delivery of reports  Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA  Reports based on control frameworks: NIST, ISO and CoBIT

8 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 8 STRM Key Benefits  Converged network security management console Integrates typically silo’d network & security data  Network, security, application, & identity awareness Unrivaled data management greatly improves ability to meet IT security control objectives  Advanced analytics & threat detection Detects threats that other solutions miss  Compliance-driven capabilities Enables IT best practices that support compliance initiatives  Scalable distributed log collection and archival Network security management scales to any sized organization

9 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 9 STRM Products STRM500 STRM2500 STRM5000 250EPS 15k F 500EPS 15kF 1000EPS 50 & 100k F 2500EPS 50 & 100k F 5000EPS 100 & 200k F STRM - FP 5000 + EPS 100 & 200k F STRM - EP Small Enterprise Small Medium Enterprise Large enterprises &Service Providers Events per sec Flows per Min

10 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 10 Thank You!

11 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 11


Download ppt "Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)"

Similar presentations


Ads by Google