Juniper in the Enterprise & Introducing STRM Stefan Nilsson Marketing Manager, Nordics Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1 Agenda The Juniper journey Evolving Enterprise Trends High Performance Networking Product & Technology focus Introducing STRM Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 22 A Decade of Innovation 2010 2006 M-Series 2005 #789 2004 2002 2001 1996 1998 1999 2000 Acorn Acorn UAC Incorporated T-Series SSG Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3 Leader in High-Performance Networking Well Positioned For Growth Operational Excellence $2.7B Cash and Investments 5,000+ Dedicated Employees $120M Quarterly R&D Engine Partner and Shareholder Value Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4 Serving 20,000+ Customers Globally U.S. Dept of Labor Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 5 Enterprise trends & How IT needs to be aligned with business processes Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 66 Enterprise Trends Drive IT Requirements High Performance IT Organizations Differ**** Speed of Execution on Strategy and Innovation is Top of Mind* Executives Expect IT to Drive Competitive Advantage** Boosting Network Performance Increases Productivity*** Aggressive adopters of new technology Spend less time fixing systems Manage to more performance metrics New Business Directions Drive New IT Requirements 1. Performance for Business Speed 2. Risk management for Business Safety 3. Open standards and partnerships for Business Flexibility Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential * ** *** **** The Economist, 2006 Gartner, 2006 Information Week, 2006 McKinsey, 2006 www.juniper.net 7 More than Ever, The Network is Critical to Business Success The network is a strategic asset that should innovate businesses and business processes Delivering strategic and tactical business results should not require unreasonable trade-offs Speed is the New Currency Dynamic Business Models Network Critical to Success Countries Copyright © 2007 Juniper Networks, Inc. Companies Proprietary and Confidential Individuals www.juniper.net 8 Aligning IT with the Business is Essential Challenges The CIO Dilemma • Control operational costs, maximize investments, simplify operations • Manage threats, control access • Assure service levels and application performance • Mitigate IT risk IT Budgets Opportunities • Pursue opportunity, enable growth, respond to changes • Innovate to deliver services that create competitive advantage Stay in the game Copyright © 2007 Juniper Networks, Inc. Grow & Transform Grow & Transform Run the Business Run the Business Grow & Transform Run the Business $ Time Change the rules and win the game Proprietary and Confidential www.juniper.net 9 High-Performance Businesses View the Network as Critical to Success High-Performance Businesses Profile Benefits of a High-Performance Network Infrastructure Believe IT is strategic to their business, customers and differentiation from competitors Expedites workforce productivity and customer loyalty Supports revenue growth and profitability goals Ensures Risk Management by providing the visibility to react and respond to unplanned events and achieve preventative goals Operational improvements that enable cost reductions and ensure quick time-to-value Must respond to new opportunities and challenges in the marketplace Aggressive adopters of new technology* Spend less time fixing systems* Manage to more performance metrics* * Gartner, 2006 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 10 Product & Technology focus in the Enterprise market place Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 11 11 Product Strategy Steer Products Into a Naturally Integrated Portfolio • Cutting-edge engineering • Performance at scale • Reliability • Power efficiency • Leverage: • Build once - use multiple times • Modular integration of services • Commonality: • Gradually converge on to a common OS (JUNOS), policy, and network mgmt Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 12 Enterprise Product & Technology focus Security (Firewalls & IDP’s) Remote Access (Secure Access) Unified Access Control (NAC solutions) Enterprise Routing (J-series) WAN acceleration (WX-series) JUNOS operating system Ethernet Switching (EX-series) NEW! Log & Event Management (STRM) NEW! INTEGRATION IS KEY! Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13 We Have a Complete Portfolio of Products Network Mgmt Policy and Control (UAC) Branches & Campuses Datacenter Switches WAN Opt FWVPN + IDP Router Core / Edge Routers SSL VPN FWVPN + IDP Secure Router Switches Service Provider Datacenter of Partner or CSP Switches WAN Opt FWVPN + IDP Router SSL VPN SSL VPN Remote Workers Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 14 The External Perception of Our Products Is Excellent Firewall / IPSec VPN Remote Access – SSL VPN Gartner Magic Quadrants Show Juniper is a Proven Leader in All Categories Copyright © 2007 Juniper Networks, Inc. Intrusion Prevention Proprietary and Confidential WAN Optimization www.juniper.net 15 Our Differentiation Industry-Leading Security Performance at Scale Carrier-Class Reliability Power & Cooling Efficiency Single OS, Policy & Mgmt Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 16 Future Direction An aggressive strategy to deliver the best products, integrated solutions and services at the best economics The “preferred choice” for high-performance businesses Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 17 Juniper Security Threat Response Manager (STRM) Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 18 Customer Challenges Dispersed Threats IT “information” overload • Flood of logged events from many “point” network and security devices • Lack of expertise to manage disparate data silos & tools Compliance mandates IT Overload • Industry specific regulations mandating security best practices • Internal IT “risk” assessment programs Evolving internal and external threats Industry Regulations Copyright © 2007 Juniper Networks, Inc. • Insider abuse, theft of intellectual property • Complex integrated attacks Proprietary and Confidential www.juniper.net 19 Introducing Junipers SIEM/NBAD Solution STRM – “Security Threat Response Manager” Integrates Mission Critical Network & Security Data Silos STRM Key application features • Log Management • Provides long term collection, archival, search and reporting of event logs, flow logs and application data Security Information & Event Management Log Management • Security Information and Event Management (SIEM) STRM • Centralizes heterogeneous event monitoring, correlation and management Network Behavior Analysis • Network Behavior Anomaly Detection (NBAD) • Discovers aberrant network activities using network and application flow data Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 20 STRM’s Key Value Proposition Threat Detection: Detect New Threats That Others Miss Log Management: Right Threats at the Right Time Compliance: Enterprise Value Juniper’s STRM Appliance Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential Compliance and Policy Safety Net Complements Juniper’s Enterprise Mgmt Portfolio www.juniper.net 21 STRM Architecture STRM – Real time network & security visibility Data collection provides network, security, application, and identity awareness Embedded intelligence & analytics simplifies security operations Prioritized “offenses” separates the wheat from the chafe Solution enables effective Threat, Compliance & Log Management Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 22 Reporting 220+ Out of the box report templates Fully customizable reporting engine: creating, branding and scheduling delivery of reports Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA Reports based on control frameworks: NIST, ISO and CoBIT Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 23 STRM Key Benefits Converged network security management console • Integrates typically silo’d network & security data Network, security, application, & identity awareness • Unrivaled data management greatly improves ability to meet IT security control objectives Advanced analytics & threat detection • Detects threats that other solutions miss Compliance-driven capabilities • Enables IT best practices that support compliance initiatives Scalable distributed log collection and archival • Network security management scales to any sized organization Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 24 STRM Products Large enterprises &Service Providers STRM5000 Small Enterprise Small Medium Enterprise STRM - EP STRM - FP STRM2500 STRM500 Events per sec 250EPS 500EPS 1000EPS 2500EPS 5000EPS 5000 + EPS Flows per Min 15k F 15kF 50 & 100k F 50 & 100k F 100 & 200k F 100 & 200k F Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 25 Thank You! Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 26 Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 27 27