We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKhalil Goodman
Modified over 2 years ago
| Copyright © 2009 Juniper Networks, Inc. | 1 ICE (In Case of Emergency) for SA Series SSL VPN Appliances Overview
| Copyright © 2009 Juniper Networks, Inc. | 2 Definition of Business Continuity: Staying Operational during Disruptions Natural Disasters – Fire, Floods, Hurricanes/Typhoons –Hurricane Katrina, Earthquake in Italy Pandemic Planning –Swine Flu, SARS, Bird Flu Business Disruptions – Transit strikes, oil spikes, terrorist –NYC Transit Strike impacting millions of commuters Other – Office relocation Broadly speaking a business disruption is any event that can interrupt the normal flow of work processes
| Copyright © 2009 Juniper Networks, Inc. | 3 Recent Unplanned Events - Impacting the Global Business Asia Quake Disaster (Dec 04) Hurricane Katrina (Aug 05) Pakistani Earthquake (Oct 05) Bird Flu Outbreaks? MTA Strike in NYC (Dec 05) Hurricane Stan- S.A. (Oct 05) Bird Flu Outbreaks? Pandemic Swine Flu Avian/Bird Flu SARS Natural Earthquakes Hurricanes Other Terror attacks Winter Storms Disastrous Events Social Distancing Geographical isolation Quarantines Maintain productivity Sustain partnerships Continue to deliver exceptional service to customers and partners with online collaboration Meet government mandates for Disaster Recovery and compliance Business Continuity Challenges
| Copyright © 2009 Juniper Networks, Inc. | 4 Challenges Faced during Business Disruption Need to maintain productivity of users Must sustain partnerships with suppliers & business partners Continue to deliver exceptional service to customers and partners with online collaboration Meet government mandates for disaster recovery and compliance –Continuity of Operations Plan
| Copyright © 2009 Juniper Networks, Inc. | 5 The Solution: Juniper Networks Secure Access SSL VPN VoIP Teleworker Business Partner or Customer Wireless User Airport Kiosk User Mobile User – Cafe Secure SSL access to remote users from any device or location Easy access from Web-browsers – no client software to manage Dynamic, granular access control to manage users and resources Single comprehensive solution to access various application types from various devices available SA6500
| Copyright © 2009 Juniper Networks, Inc. | 6 Juniper Networks ICE for Business Continuity Juniper Networks ICE delivers –Proven market-leading SSL VPN –Easy deployments –Instant activation –Investment protection –Affordable risk protection Peak Demand Number of Remote Users Time Average usage Unplanned event What will you do when your non- remote users need access? Meeting the peak in demand for remote access in the event of a disaster
| Copyright © 2009 Juniper Networks, Inc. | 7 What is ICE (In Case of Emergency) in Details? Software license that enables temporary bursting capabilities for emergency situations in which a large number of employees must log in for a short period of time One time purchase that can be activated up to 8 weeks; does not have to renewed every year Available to use with SA4500 or SA6500 –SA4500 Targeted to mid-to-large sized enterprises Supports up to 1000 concurrent users –SA6500 Targeted to large enterprises and service providers Supports up to 10,000 concurrent users on a single unit; up to 30,000 concurrent users on a four-unit cluster –Available on SA4500 FIPS and SA6500 FIPS models, too Federal Information Processing Standards (FIPS)-compliant models with a certified hardware security module targeted for US government agencies –In clustered configurations for high-availability, a separate ICE license must be ordered for the clustered SA devices
| Copyright © 2009 Juniper Networks, Inc. | 8 How Does ICE Work? 1)Turn on the ICE license on the SA via the admin console 2)Once turned on, its activated to meet additional capacity of remote access demand for up to 8 weeks 3)Each time it is deactivated, the timer will freeze and will start from the same point the next time you activate it 4)Once 8 weeks is reached, you can either buy a new user license (if greater user support is needed permanently) or a new ICE license to extend the time
| Copyright © 2009 Juniper Networks, Inc. | 9 Instant Online Collaboration During Emergencies - Secure Meeting Included with ICE License Easy to Use Web Conferencing –Share desktop/applications –Group and private chat –No training required Easy to Deploy and Maintain –No pre-installed software required –Web-based, cross platform –Personalized meeting URLs for users https://meeting.company.com/ meeting/johndoe https://meeting.company.com/ meeting/johndoe Affordable – No usage/service fees Secure –Fully encrypted/secured traffic using SSL –No peer-to-peer backdoor –User credentials protected –Policy flexibility to meet authentication requirements Instant or scheduled online collaboration
| Copyright © 2009 Juniper Networks, Inc. | 10 Customer Example – Blood Systems, Inc. One of the countrys oldest and largest blood service providers Relies heavily on keeping their employees across 84 locations in close contact in order to provide critical care services Have to provide employees access to the applications they need, under ordinary circumstances or in extraordinary situations like a natural disaster or pandemic Purchased an SA with ICE license to meet immediate expansion of remote access connectivity in the event of a disaster To view the full case study, please visit: –http://www.juniper.net/us/en/local/pdf/case-studies/ en.pdfhttp://www.juniper.net/us/en/local/pdf/case-studies/ en.pdf
| Copyright © 2009 Juniper Networks, Inc. | 11 ICE Summary Productivity Issues in Disaster Scenarios Secure Access meets those needs with ICE Geographic isolation of employees – cant reach the office Anywhere, anytime, any device secure remote access No access to managed laptop – must use home PC or mobile device Broad cross platform support Easy to use and deploy No pre-installed client Employees login in same way, regardless of device No communication to partners & customers to sustain business Secure granular remote access (user to application control) No means of meeting/collaborating - restricted travel Secure online Web conferencing (Secure Meeting) Abnormally large number of remote access users Secure Access scales to meet the needs of any size deployment
| Copyright © 2009 Juniper Networks, Inc. | 12 Why Juniper for SSL VPN? Core Competence in SSL-based Access –Proven in tens of thousands of customer deployments! –Market leadership/industry Awards –Product maturity Single Platform for All Enterprise Remote Access Needs –Support for complex Web content, Files, Telnet/SSH using only a browser –Client/Server applications –Adaptive dual transport method for network-layer access End-to-End Security –Robust host checking capabilities –Dynamic Access Privilege Management –3 rd party security audits Performance, Scalability & HA –Differentiated hardware platforms –Global & local stateful clustering –Compression, SSL acceleration, GBIC connectors, dual hot-swappable hard disks, power supplies, and fans Ease of Administration –Centralized management –Granular role-based delegation –Extensive integration with existing directories –Native automatic endpoint remediation and password management integration
| Copyright © 2009 Juniper Networks, Inc. | 13 THANK YOU
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Summer is ICE Season! How this is the perfect time to sell the ICE.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
SafeNet Protects Data at Rest SafeNet provides the most secure and cost-effective data at rest protection for database, disk, file, and removable media.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
1/4/2014 Enterprise to Cloud Mobilize, Secure & Accelerate your Business Customer Date `
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Hosted Exchange 2007 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses.
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID The spoken words remain IP and Video Telephony Recording from TC & C Anthony.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Which server is right for you? Get in Contact with us
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
Check Point Virtual Gateway Protects Microsoft Azure Cloud Infrastructure with a Full Range of Security Defenses and Threat Prevention Solutions MICROSOFT.
What Is Desktop Virtualization? How Does Application Virtualization Help? How does V3 Systems help? Getting Started AGENDA.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
Barracuda Networks Steve Scheidegger Commercial Account Manager
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Charles James Director Microsoft Alliance EMEA Polycom Microsoft UC Innovation Partner of the Year.
TOP 5 Reasons to Migrate IPSec VPN to SSL VPN. 1)Reduce remote access costs by eliminating client software installation, configuration, and maintenance;
Gain High Availability Performance and Scale of Applications Running on Windows Azure with KEMP Technologies’ Virtual LoadMaster COMPANY PROFILE: KEMP.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
© 2017 SlidePlayer.com Inc. All rights reserved.