Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry,

Similar presentations


Presentation on theme: "1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry,"— Presentation transcript:

1 1 Copyright © 2012 Juniper Networks, Inc. Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry, Media & Local Gov

2 2 Copyright © 2012 Juniper Networks, Inc. AGENDA The Cloud Cut Cost on MPLS Secure the Virtualized World Thinking of the Cloud Network has Changed Cloud Ready Network MPLS vs Internet Service Provider Solutions for Enterprise The Physical Firewall is not Enough Security = Portfolio of Solutions

3 3 Copyright © 2012 Juniper Networks, Inc. Blank Slide THE CLOUD

4 4 Copyright © 2012 Juniper Networks, Inc. THINKING OF THE CLOUD?  Decreasing Cost Cloud  Increased Reliability  More Offering  Or already Connected

5 5 Copyright © 2012 Juniper Networks, Inc. ROLE OF NETWORK HAS CHANGED Is your network cloud Ready! Continuity Inefficient use of the Network Poor Network Visibility Inconsistent User Experience Security (BYOD) Legacy Three Tier Data Center Up to 75% of traffic EW

6 6 Copyright © 2012 Juniper Networks, Inc. THE CLOUD READY NETWORK MEANS 1.Continuity – 99,999% (or 100%-10 min) - BOTH Cloud and Your Network Infrastructure 2.Efficient use of Network – 2 Tier 3.Manageability / Visibility – Visibility on application level to optimize network / compliancy 4.Consistent Performance / Experience anywhere on any device

7 7 Copyright © 2012 Juniper Networks, Inc. EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Redundancy in FW (SRX) Carrier Grade Hardware (SRX/EX/MX) JUNOS – Proven Service Provider OS Continuity Virtual Chassis Pay as you Grow Extend VC over Distance Throughput / € Efficiency SRX – App Secure Central Management - Space Secure Analytics Application WLAN - BYOD Control UAC Users

8 8 Copyright © 2012 Juniper Networks, Inc. CLOUD ENABLES YOU TO  Move LAN away from commodity  Discuss Multiple Solutions  Technological Advantages become important  Advise on the applications which are not CLOUD ready! – another opportunity

9 9 Copyright © 2012 Juniper Networks, Inc. Blank Slide CUT COST ON MPLS

10 10 Copyright © 2012 Juniper Networks, Inc. MPLS VS INTERNET MPLS Uptime Bandwidth Utilization Managed with SLA’s Simplification NW INTERNET Improved SLA’s High Bandwidth Availability INTERNET Latency Complexity MPLS Expensive Security Partners not Flexible

11 11 Copyright © 2012 Juniper Networks, Inc. SIMILARITIES IN RFP’S / FEEDBACK MKB+ Improved Security: BYOD NGF Take back Control:Central Management – Visibility Limited Solutions / Lack of Flexibility

12 12 Copyright © 2012 Juniper Networks, Inc. Blank Slide EXAMPLE

13 13 Copyright © 2012 Juniper Networks, Inc. SP SOLUTIONS FOR THE ENTERPRISE 1.Even if customer decides to keep MPLS – SRX can be placed in network 2.Create Overlay Network as Contracts Run Out 3.Juniper’s Core = Service Provider Solutions 4.Complete and Proven Portfolio

14 14 Copyright © 2012 Juniper Networks, Inc. EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Best possible routing functionality on a firewall Carrier Grade Hardware JUNOS – Proven Service Provider OS SRX Central Granular Management Control Applications Simplified Roll Out SPACE Connect Any Device from Anywhere Riverbed MAG

15 15 Copyright © 2012 Juniper Networks, Inc. Blank Slide SECURE THE VIRTUALIZED WORLD

16 16 Copyright © 2012 Juniper Networks, Inc. MEGA TREND – SERVER VIRTUALIZATION Source: IDC Capital Savings

17 17 Copyright © 2012 Juniper Networks, Inc. FIREWALL / VIRTUAL - SECURITY Firewall Secure the Physical Network IPS NGF VGW Secures the VM Policy Enforcement on Migrating VM’s Synchronizes with SRX

18 18 Copyright © 2012 Juniper Networks, Inc. WHAT ABOUT VIRTUAL MACHINES? Physical Network Virtual Network Physical Security Is “Blind” to Traffic between Virtual Machines VM1VM2VM3 ESX/ESXi Host Firewall/IDS Sees/Protects All Traffic between Servers HYPERVISOR Virtual Switch

19 19 Copyright © 2012 Juniper Networks, Inc. Purpose Built Virtual Security VM1VM2VM3 VS ESX/ESXi Host Virtual Security Layer Traditional Security Agents VLANs & Physical Segmentation VM1VM2VM3 VS ESX/ESXi Host VM1VM2VM3 VS ESX/ESXi Host Regular Thick Agent for FW & AV HYPERVISOR APPROACHES TO SECURING VIRTUAL NETWORKS 123

20 20 Copyright © 2012 Juniper Networks, Inc. FIREWALL PERFORMANCE

21 21 Copyright © 2012 Juniper Networks, Inc. SECURE THE VM - EXAMPLES Cloud Service Provider Shipping Company CARE Prevent Customer Data Migration within VM’s Protect Customer Data To Proof SLA’s Protect VDI Users at Best Possible Performance Maintenance Tool VM’s Audit Tool Audit Tool for Electronic Client Records Protect Data Control Data on VM Level

22 22 Copyright © 2012 Juniper Networks, Inc. REAL LIFE drugs-through-antwerp-port-europol-reveals/

23 23 Copyright © 2012 Juniper Networks, Inc. SRX Series Physical Hypervisor vGW Series VM vGW Virtual Gateway Management and Security Services Security Design Security Threat Response Manager STRM Services Virtual Firewall IPS DoS Prevention AppSecure DoS JUNIPER SECURITY SOLUTION THAT SPANS PHYSICAL AND VIRTUAL NETWORKS

24 24 Copyright © 2012 Juniper Networks, Inc. SUMMARY1 Recurring Revenue 2 Drivers Seat 3 Portfolio 4 Services

25


Download ppt "1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry,"

Similar presentations


Ads by Google