| Copyright © 2009 Juniper Networks, Inc. | www.juniper.net 1 WX Client Rajoo Nagar PLM, WABU.

Slides:



Advertisements
Similar presentations
E N T E R P R I S E C L A S S H O S T I N G S E R V I C E S | D E L T E K A C C E S S A N Y W H E R E A N Y T I M E Application Specific Hosting Services:
Advertisements

1/4/2014 Enterprise to Cloud Mobilize, Secure & Accelerate your Business Customer Date `
UBIQUITY V3 An extensible platform for creating dynamic, customized, and geocentric native mobile applications.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Rick Claus IT Pro Advisor Microsoft Canada Rodney Buike IT Pro Advisor Microsoft Canada
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
Yammer Technical Solutions Overview
1 Matt McDermott 2 Applications Operating System Hardware What it does Creates a package of an application Eliminates software.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Supporting All NetWeaver Business Clients with a single comprehensive solution. Carlos A. Noriega Aparna Desai.
Office 365 for Enterprises ITExpo February 2, 2012.
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Windows Server Deployment and Management With System Center.
Building an EMS Database on a Company Intranet By: Nicholas Bollons Sally Goodman.
Microsoft Volume Licensing
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Content Overview Update Process Additional Tools.
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Citrix Partner Update The Citrix Delivery Centre.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
Module 16: Software Maintenance Using Windows Server Update Services.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
Barracuda Load Balancer Server Availability and Scalability.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
VS Anywhere. Visual Studio Industry Partner VS Anywhere NEXT STEPS Contact us at: Websitehttps://vsanywhere.com Blog- Facebook.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Microsoft Management Seminar Series SMS 2003 Change Management.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Avaya - Proprietary. Use pursuant to your signed agreement or Avaya policy. 1 IP Office Support Services Customer Benefits.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Barracuda Firewall The Next-Generation Firewall for Everyone
Self-service enrollment for Windows desktops
Novell iPrint Deployment Strategies
Tailor slide to customer industry/pain points
Check Point Connectra NGX R60
Presentation transcript:

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU

| Copyright © 2009 Juniper Networks, Inc. | 2 Agenda 1 Market Landscape 2 Product Overview 3 Deployment Use Cases 4 Integration with Juniper Secure Access SSL VPN 5 Q&A

| Copyright © 2009 Juniper Networks, Inc. | 3 WAN Optimization Client - Market Drivers Enterprise wide deployments for application acceleration No dedicated hardware or management expertise at the branch Speed connectivity to partners and contractors to secure extranets Accelerate mobile users outside the branch or at home office MobilityMobility Enterprise Extension StrategicStrategic ROIDrivenROIDriven

| Copyright © 2009 Juniper Networks, Inc. | 4 Agenda 2 Product Overview 1 Market Landscape 3 Deployment Use Cases 4 Integration with Juniper Secure Access SSL VPN 5 Q&A

| Copyright © 2009 Juniper Networks, Inc. | 5 WX Client - Value Proposition Simple, easy to deploy WAN optimization client that delivers application acceleration capabilities for mobile workers Key Benefits: –Does not require any dedicated hardware or technical expertise –Cost effective for small branch offices where a dedicated appliance is not needed –Ideal for enterprises with a large mobile workforce or telecommuters constrained by low bandwidth and high latency networks –Seamlessly integrates into existing WX networks, extending application performance benefits of the WX 5.x product line to mobile end users, small offices and home offices

| Copyright © 2009 Juniper Networks, Inc. | 6 WX Client – Key Benefits Does not require any dedicated hardware or technical expertise –Server software runs on existing WXC appliances –Automated deployment –End-user does not need to configure anything Cost effective for small branch offices where a dedicated appliance is not cost effective –Ideal solution for less than 4 users –Simple deployment for 24x7 operation Ideal for enterprises with a large mobile workforce or telecommuters constrained by low bandwidth and high latency networks –Works across home broadband internet, wireless networks and mobile wireless such as 3G Seamlessly integrates into existing WX networks, extending application performance benefits of the WX 5.x product line to mobile end users –Transparently extends existing WAN acceleration deployments to mobile users

| Copyright © 2009 Juniper Networks, Inc. | 7 WX Client - Key Features Windows-based software Client with full suite of WAN optimization technology –NSC Technology for compression and caching –TCP acceleration across all TCP applications (HTTP, other …) –AppFlow for acceleration of CIFS Auto discovery of WXC server appliance at the data center –No client configuration required for instant optimization Integrated with Juniper SA SSL VPN to provide complete optimized remote access solution –Auto deploy and run WX Client based on remote access policy –Auto upgrade of client configuration and client software –All security policies and postures with SA product preserved Co-exists with existing WAN acceleration and VPN solutions in customers network –Works with any VPN product or network access method –Seamless deployment in existing WAN acceleration networks

| Copyright © 2009 Juniper Networks, Inc. | 8 Ease of Management WX Client –Policy control centrally from the WXC appliance –Policies can be automatically distributed or scheduled via secure web downloads –Diagnostic tools WXC Appliance –Detailed and high level reporting on application acceleration and compression –View and update WX Client policies and status –View all connected (concurrent) WX Clients –Set global policies for WAN optimization –License WX Clients

| Copyright © 2009 Juniper Networks, Inc. | 9 Compression Results (Sample)

| Copyright © 2009 Juniper Networks, Inc. | 10 Agenda 3 Deployment Use Cases 2 Product Overview 1 Market Landscape 4 Integration with Juniper Secure Access SSL VPN 5 Q&A

| Copyright © 2009 Juniper Networks, Inc. | 11 WX Client Solution Headquarters/Data Center WX Client User WX client Intranet/Extranet Clients deployed on Windows 2000/XP PC Number of clients deployed is not limited Product licensed at the WXC appliance based on simultaneous users WXC appliance (WXC 2600, WXC 590 or WXC 3400) installed behind remote access solution Open VPN session from client PC to VPN concentrator Open WX Client – automatic association to WXC appliance behind VPN concentrator Solution: WXC appliance + license for number of simultaneous users WXC VPN Mobile User/Telecommuter WAN Application Servers

| Copyright © 2009 Juniper Networks, Inc. | 12 WX Client Delivery Options: Secure Web downloads (URL) MSI packages for bulk installs Auto download, install and run from SA using Hostchecker WX Client Deployment Scenarios

| Copyright © 2009 Juniper Networks, Inc. | 13 WX Client and WXC Network: Seamless Co-existence WX client WX Client Intranet/Extranet Mobile users and small offices with WX Client on PCs get optimized access to Data Center applications Branches with WXC appliances have an optimized connection to WXC appliance in Data Center WXC SA VPN Branch Office Intranet/Extranet WXC Data Center Mobile User/Small Office MPLS WAN Application Servers

| Copyright © 2009 Juniper Networks, Inc. | 14 Agenda 4 Integration with Juniper Secure Access SSL VPN 2 Product Overview 3 Deployment Use Cases 1 Market Landscape 5 Q&A

| Copyright © 2009 Juniper Networks, Inc. | 15 WX Client Integration with Juniper SA SSL VPN Integrated fast and secure remote access for mobile users Users authenticate and securely log into SA SSL VPN WX Client automatically downloads and launches upon starting Network Connect VPN session, transparently to the mobile user User starts receiving benefits of application acceleration immediately

| Copyright © 2009 Juniper Networks, Inc. | 16 Ease of Deployment Dynamic provisioning of secure, accelerated remote access for mobile users, partners and contractors –Automated software distribution and installation –End user transparency –Software configuration and version management –Leverage user roles in SA to selectively download WX Client to end users who need it most Combined solution = lower total cost of ownership Integrated solution is an industry first

| Copyright © 2009 Juniper Networks, Inc. | 17 Maximizing your Savings WAN optimization for mobile users has significant business relevance and impact on your bottom line –Improves mobile employee and telecommuter productivity –Allows mobile field workers to be more efficient –Saves enterprises significant costs associated with loss of productivity –Saves costs of deploying a dedicated appliance at the branch office

| Copyright © 2009 Juniper Networks, Inc. | 18 Agenda 5 Q&A 2 Product Overview 3 Deployment Use Cases 1 Market Landscape 4 Integration with Juniper Secure Access SSL VPN

| Copyright © 2009 Juniper Networks, Inc. | 19 THANK YOU