We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTanner Gresham
Modified over 2 years ago
1 Copyright © 2012 Juniper Networks, Inc. Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry, Media & Local Gov
2 Copyright © 2012 Juniper Networks, Inc. AGENDA The Cloud Cut Cost on MPLS Secure the Virtualized World Thinking of the Cloud Network has Changed Cloud Ready Network MPLS vs Internet Service Provider Solutions for Enterprise The Physical Firewall is not Enough Security = Portfolio of Solutions
3 Copyright © 2012 Juniper Networks, Inc. Blank Slide THE CLOUD
4 Copyright © 2012 Juniper Networks, Inc. THINKING OF THE CLOUD? Decreasing Cost Cloud Increased Reliability More Offering Or already Connected
5 Copyright © 2012 Juniper Networks, Inc. ROLE OF NETWORK HAS CHANGED Is your network cloud Ready! Continuity Inefficient use of the Network Poor Network Visibility Inconsistent User Experience Security (BYOD) Legacy Three Tier Data Center Up to 75% of traffic EW
6 Copyright © 2012 Juniper Networks, Inc. THE CLOUD READY NETWORK MEANS 1.Continuity – 99,999% (or 100%-10 min) - BOTH Cloud and Your Network Infrastructure 2.Efficient use of Network – 2 Tier 3.Manageability / Visibility – Visibility on application level to optimize network / compliancy 4.Consistent Performance / Experience anywhere on any device
7 Copyright © 2012 Juniper Networks, Inc. EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Redundancy in FW (SRX) Carrier Grade Hardware (SRX/EX/MX) JUNOS – Proven Service Provider OS Continuity Virtual Chassis Pay as you Grow Extend VC over Distance Throughput / € Efficiency SRX – App Secure Central Management - Space Secure Analytics Application WLAN - BYOD Control UAC Users
8 Copyright © 2012 Juniper Networks, Inc. CLOUD ENABLES YOU TO Move LAN away from commodity Discuss Multiple Solutions Technological Advantages become important Advise on the applications which are not CLOUD ready! – another opportunity
9 Copyright © 2012 Juniper Networks, Inc. Blank Slide CUT COST ON MPLS
10 Copyright © 2012 Juniper Networks, Inc. MPLS VS INTERNET MPLS Uptime Bandwidth Utilization Managed with SLA’s Simplification NW INTERNET Improved SLA’s High Bandwidth Availability INTERNET Latency Complexity MPLS Expensive Security Partners not Flexible
11 Copyright © 2012 Juniper Networks, Inc. SIMILARITIES IN RFP’S / FEEDBACK MKB+ Improved Security: BYOD NGF Take back Control:Central Management – Visibility Limited Solutions / Lack of Flexibility
12 Copyright © 2012 Juniper Networks, Inc. Blank Slide EXAMPLE
13 Copyright © 2012 Juniper Networks, Inc. SP SOLUTIONS FOR THE ENTERPRISE 1.Even if customer decides to keep MPLS – SRX can be placed in network 2.Create Overlay Network as Contracts Run Out 3.Juniper’s Core = Service Provider Solutions 4.Complete and Proven Portfolio
14 Copyright © 2012 Juniper Networks, Inc. EXECUTE WITH JUNIPER COMPLETE PORTFOLIO Best possible routing functionality on a firewall Carrier Grade Hardware JUNOS – Proven Service Provider OS SRX Central Granular Management Control Applications Simplified Roll Out SPACE Connect Any Device from Anywhere Riverbed MAG
15 Copyright © 2012 Juniper Networks, Inc. Blank Slide SECURE THE VIRTUALIZED WORLD
16 Copyright © 2012 Juniper Networks, Inc. MEGA TREND – SERVER VIRTUALIZATION Source: IDC Capital Savings
17 Copyright © 2012 Juniper Networks, Inc. FIREWALL / VIRTUAL - SECURITY Firewall Secure the Physical Network IPS NGF VGW Secures the VM Policy Enforcement on Migrating VM’s Synchronizes with SRX
18 Copyright © 2012 Juniper Networks, Inc. WHAT ABOUT VIRTUAL MACHINES? Physical Network Virtual Network Physical Security Is “Blind” to Traffic between Virtual Machines VM1VM2VM3 ESX/ESXi Host Firewall/IDS Sees/Protects All Traffic between Servers HYPERVISOR Virtual Switch
19 Copyright © 2012 Juniper Networks, Inc. Purpose Built Virtual Security VM1VM2VM3 VS ESX/ESXi Host Virtual Security Layer Traditional Security Agents VLANs & Physical Segmentation VM1VM2VM3 VS ESX/ESXi Host VM1VM2VM3 VS ESX/ESXi Host Regular Thick Agent for FW & AV HYPERVISOR APPROACHES TO SECURING VIRTUAL NETWORKS 123
20 Copyright © 2012 Juniper Networks, Inc. FIREWALL PERFORMANCE
21 Copyright © 2012 Juniper Networks, Inc. SECURE THE VM - EXAMPLES Cloud Service Provider Shipping Company CARE Prevent Customer Data Migration within VM’s Protect Customer Data To Proof SLA’s Protect VDI Users at Best Possible Performance Maintenance Tool VM’s Audit Tool Audit Tool for Electronic Client Records Protect Data Control Data on VM Level
22 Copyright © 2012 Juniper Networks, Inc. REAL LIFE drugs-through-antwerp-port-europol-reveals/
23 Copyright © 2012 Juniper Networks, Inc. SRX Series Physical Hypervisor vGW Series VM vGW Virtual Gateway Management and Security Services Security Design Security Threat Response Manager STRM Services Virtual Firewall IPS DoS Prevention AppSecure DoS JUNIPER SECURITY SOLUTION THAT SPANS PHYSICAL AND VIRTUAL NETWORKS
24 Copyright © 2012 Juniper Networks, Inc. SUMMARY1 Recurring Revenue 2 Drivers Seat 3 Portfolio 4 Services
© 2009 VMware Inc. All rights reserved VMware vShield – Foundation for the Most Secure Cloud Deployments.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Enabling Cloud with SDN/Virtual.
Network Services for Enhanced Cloud Computing T. V. Lakshman Bell Labs (Jointly with F. Hao, S. Mukherjee, H. Song)
1 Data Center Networking CS 6250: Computer Networking Fall 2011.
Unified Communications What Works and What Doesnt Kim Hamilton Strategic Accounts Manager.
Fortinet Confidential. 2 Fortinet Overview Market-Leading Provider of End-to-End IT Security Solutions Company Stats Founded in 2000 Silicon Valley-based,
Copyright© 2004 Avaya Inc. All rights reserved Customer Choice Through Service Provider Hosted Solutions Denzil Samuels Vice President & General Manager,
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
© 2007 IBM Corporation | Workshop on Middleware for Next Gen Apps IBM TJ Watson Research Center Middleware Challenges for the Emerging Application Environments.
Citrix Virtualization. 2 Citrix Systems NASDAQ 100 and S&P 500 company $909 million in 2005 revenue –25% YoY growth –~50% revenue from outside No. America.
0 Agenda Market Trends and Business Considerations Fujitsu Customer Experiences Today Options Today and Beyond Q&A.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
Objectives: Chapter 7: Intranet LAN Design * Goals and considerations in LAN design * Understand the steps in systematic LAN design * Design issues associated.
1 © 2005 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Public Cisco IP Communications for State and Local Government Agencies.
© 2011 VMware Inc. All rights reserved Confidential Why Choose Horizon Suite Over Citrix? Cyndie Zikmund, EUC Competitive Marketing February, 2013.
Carleton University 1 February 25th, 2014 Voice over IP Presenter: Tony Hutchinson System Engineering Manager.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Cisco Unified Communications Overview Donald A.Dindial
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc.
VMware vCenter Server High Availability Product Support Engineering VMware Confidential.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Nexus 1000V Ralf Eberhardt
© 2011 VMware Inc. All rights reserved VMware Sales Byte Net New Customer Improve Business Continuity and Disaster Recovery (BCDR) with Managed Virtualization.
VCS 5.0 for VMware ESX. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 2 Virtualization Goals Biggest drivers of Virtualization.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Server Modernization Speaker Title Org/contact info.
1 © 2009 Riverbed Technology. Confidential. IMPORTANT NOTE: The roadmap is for information purposes only and is not a commitment, promise or legal obligation.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
© 2016 SlidePlayer.com Inc. All rights reserved.