We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKhalil Goodman
Modified over 2 years ago
| Copyright © 2009 Juniper Networks, Inc. | 1 ICE (In Case of Emergency) for SA Series SSL VPN Appliances Overview
| Copyright © 2009 Juniper Networks, Inc. | 2 Definition of Business Continuity: Staying Operational during Disruptions Natural Disasters – Fire, Floods, Hurricanes/Typhoons –Hurricane Katrina, Earthquake in Italy Pandemic Planning –Swine Flu, SARS, Bird Flu Business Disruptions – Transit strikes, oil spikes, terrorist –NYC Transit Strike impacting millions of commuters Other – Office relocation Broadly speaking a business disruption is any event that can interrupt the normal flow of work processes
| Copyright © 2009 Juniper Networks, Inc. | 3 Recent Unplanned Events - Impacting the Global Business Asia Quake Disaster (Dec 04) Hurricane Katrina (Aug 05) Pakistani Earthquake (Oct 05) Bird Flu Outbreaks? MTA Strike in NYC (Dec 05) Hurricane Stan- S.A. (Oct 05) Bird Flu Outbreaks? Pandemic Swine Flu Avian/Bird Flu SARS Natural Earthquakes Hurricanes Other Terror attacks Winter Storms Disastrous Events Social Distancing Geographical isolation Quarantines Maintain productivity Sustain partnerships Continue to deliver exceptional service to customers and partners with online collaboration Meet government mandates for Disaster Recovery and compliance Business Continuity Challenges
| Copyright © 2009 Juniper Networks, Inc. | 4 Challenges Faced during Business Disruption Need to maintain productivity of users Must sustain partnerships with suppliers & business partners Continue to deliver exceptional service to customers and partners with online collaboration Meet government mandates for disaster recovery and compliance –Continuity of Operations Plan
| Copyright © 2009 Juniper Networks, Inc. | 5 The Solution: Juniper Networks Secure Access SSL VPN VoIP Teleworker Business Partner or Customer Wireless User Airport Kiosk User Mobile User – Cafe Secure SSL access to remote users from any device or location Easy access from Web-browsers – no client software to manage Dynamic, granular access control to manage users and resources Single comprehensive solution to access various application types from various devices available SA6500
| Copyright © 2009 Juniper Networks, Inc. | 6 Juniper Networks ICE for Business Continuity Juniper Networks ICE delivers –Proven market-leading SSL VPN –Easy deployments –Instant activation –Investment protection –Affordable risk protection Peak Demand Number of Remote Users Time Average usage Unplanned event What will you do when your non- remote users need access? Meeting the peak in demand for remote access in the event of a disaster
| Copyright © 2009 Juniper Networks, Inc. | 7 What is ICE (In Case of Emergency) in Details? Software license that enables temporary bursting capabilities for emergency situations in which a large number of employees must log in for a short period of time One time purchase that can be activated up to 8 weeks; does not have to renewed every year Available to use with SA4500 or SA6500 –SA4500 Targeted to mid-to-large sized enterprises Supports up to 1000 concurrent users –SA6500 Targeted to large enterprises and service providers Supports up to 10,000 concurrent users on a single unit; up to 30,000 concurrent users on a four-unit cluster –Available on SA4500 FIPS and SA6500 FIPS models, too Federal Information Processing Standards (FIPS)-compliant models with a certified hardware security module targeted for US government agencies –In clustered configurations for high-availability, a separate ICE license must be ordered for the clustered SA devices
| Copyright © 2009 Juniper Networks, Inc. | 8 How Does ICE Work? 1)Turn on the ICE license on the SA via the admin console 2)Once turned on, its activated to meet additional capacity of remote access demand for up to 8 weeks 3)Each time it is deactivated, the timer will freeze and will start from the same point the next time you activate it 4)Once 8 weeks is reached, you can either buy a new user license (if greater user support is needed permanently) or a new ICE license to extend the time
| Copyright © 2009 Juniper Networks, Inc. | 9 Instant Online Collaboration During Emergencies - Secure Meeting Included with ICE License Easy to Use Web Conferencing –Share desktop/applications –Group and private chat –No training required Easy to Deploy and Maintain –No pre-installed software required –Web-based, cross platform –Personalized meeting URLs for users https://meeting.company.com/ meeting/johndoe https://meeting.company.com/ meeting/johndoe Affordable – No usage/service fees Secure –Fully encrypted/secured traffic using SSL –No peer-to-peer backdoor –User credentials protected –Policy flexibility to meet authentication requirements Instant or scheduled online collaboration
| Copyright © 2009 Juniper Networks, Inc. | 10 Customer Example – Blood Systems, Inc. One of the countrys oldest and largest blood service providers Relies heavily on keeping their employees across 84 locations in close contact in order to provide critical care services Have to provide employees access to the applications they need, under ordinary circumstances or in extraordinary situations like a natural disaster or pandemic Purchased an SA with ICE license to meet immediate expansion of remote access connectivity in the event of a disaster To view the full case study, please visit: –http://www.juniper.net/us/en/local/pdf/case-studies/ en.pdfhttp://www.juniper.net/us/en/local/pdf/case-studies/ en.pdf
| Copyright © 2009 Juniper Networks, Inc. | 11 ICE Summary Productivity Issues in Disaster Scenarios Secure Access meets those needs with ICE Geographic isolation of employees – cant reach the office Anywhere, anytime, any device secure remote access No access to managed laptop – must use home PC or mobile device Broad cross platform support Easy to use and deploy No pre-installed client Employees login in same way, regardless of device No communication to partners & customers to sustain business Secure granular remote access (user to application control) No means of meeting/collaborating - restricted travel Secure online Web conferencing (Secure Meeting) Abnormally large number of remote access users Secure Access scales to meet the needs of any size deployment
| Copyright © 2009 Juniper Networks, Inc. | 12 Why Juniper for SSL VPN? Core Competence in SSL-based Access –Proven in tens of thousands of customer deployments! –Market leadership/industry Awards –Product maturity Single Platform for All Enterprise Remote Access Needs –Support for complex Web content, Files, Telnet/SSH using only a browser –Client/Server applications –Adaptive dual transport method for network-layer access End-to-End Security –Robust host checking capabilities –Dynamic Access Privilege Management –3 rd party security audits Performance, Scalability & HA –Differentiated hardware platforms –Global & local stateful clustering –Compression, SSL acceleration, GBIC connectors, dual hot-swappable hard disks, power supplies, and fans Ease of Administration –Centralized management –Granular role-based delegation –Extensive integration with existing directories –Native automatic endpoint remediation and password management integration
| Copyright © 2009 Juniper Networks, Inc. | 13 THANK YOU
Avaya Unified Communications for Teleworkers. Agenda © 2009 Avaya Inc. All rights reserved.2 OverviewBusiness ValueSolution Overview.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
1 CREDANT Confidential. 1 NLIT CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses.
| Toll-free: How to have both Productivity and Security for Remote Access Solution in a HIPAA Environment Tom.
Trends in Endpoint Security by Richard Lau Trends in Endpoint Security by Richard Lau 29 September 2005.
1/4/2014 Enterprise to Cloud Mobilize, Secure & Accelerate your Business Customer Date `
Reduce Your IT Costs. Microsoft’s Core Infrastructure Solutions NEXT GENERATION DESKTOP EMPOWERING SERVICES Desktop Datacenter CLOUD COMPUTING.
Websense Confidential web security | data security | security © 2009 Websense, Inc. All rights reserved. Websense Confidential Websense Hosted Web.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Cisco Unified Communications Overview Donald A.Dindial
Branch Repeater 5.6, 5.7 & VPX Technical Presentation.
© 2012 VMware Inc. All rights reserved Confidential VMware Sales Byte Virtualization Expansion for Simplified Desktop Management.
Citrix Virtualization. 2 Citrix Systems NASDAQ 100 and S&P 500 company $909 million in 2005 revenue –25% YoY growth –~50% revenue from outside No. America.
1 Services. 2 Agenda Overview –Managing the Transitions of The Networked Learning Environment Blackboard Consulting –Who We Are and What We Do Blackboard.
© 2011 VMware Inc. All rights reserved VMware Sales Byte Net New Customer Improve Business Continuity and Disaster Recovery (BCDR) with Managed Virtualization.
VitalQIP ® Address Management Solutions, 2009 Alcatel-Lucent Sales Training – September 2009 VQ-SM-003W Alcatel-Lucent Educational Services.
SMS 2003 R2 and System Center Configuration Manager 2007 Technical Drilldown Martin Dey Director, Product Marketing Windows and Enterprise Management Division.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
© Tantalus Systems Corp. COMMUNICATIONS FOR THE SMART GRID SMART GRID IMPLICATIONS FOR CABLE OPERATORS Matt Haile Tantalus
1 © 2007 Avaya Inc. All rights reserved. Avaya IP Office Delivering Intelligent Communications to Small Businesses.
© ASSA ABLOY. All rights reserved. Data Connectors HID Global January 2010.
© 2013 VMware Inc. All rights reserved Addressing Windows XP Migrations VMware End-User Computing Peter von Oven Senior SE & Pre Sales Lead, End-User Computing,
© 2011 VMware Inc. All rights reserved Confidential Why Choose Horizon Suite Over Citrix? Cyndie Zikmund, EUC Competitive Marketing February, 2013.
PCTI Limited - A Unique Name For Quality Education CS-75 INTRANET ADMINISTRATION By: Vinay Aggarwal.
Securing a Virtualized Environment Stefano Alei Senior Systems Engineer.
Exchange 2010 Hosting Service How Hosted Exchange Works and Benefits Businesses.
Market-Leading IP Address Management Software Enhances Profitability and Productivity VitalQIP ® DNS/DHCP and IP Management Software.
Unified Communications What Works and What Doesnt Kim Hamilton Strategic Accounts Manager.
1 Unified Communications and Collaboration Campaign MM TI-BDM Deck User Guidance Purpose of this deck: –Show how Microsoft ® Unified Communications and.
Kunal Kodkani Senior Consultant Microsoft Corporation.
© 2016 SlidePlayer.com Inc. All rights reserved.