High Performance Networks for High Performance

advertisement
Juniper in the Enterprise
&
Introducing STRM
Stefan Nilsson
Marketing Manager, Nordics
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
1
Agenda
 The Juniper journey
 Evolving Enterprise Trends
 High Performance Networking
 Product & Technology focus
 Introducing STRM
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
22
A Decade of Innovation
2010
2006
M-Series
2005
#789
2004
2002
2001
1996
1998
1999
2000
Acorn
Acorn
UAC
Incorporated
T-Series
SSG
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
3
Leader in High-Performance Networking
Well
Positioned
For
Growth
Operational Excellence
$2.7B
Cash and Investments
5,000+
Dedicated Employees
$120M
Quarterly R&D Engine
Partner and Shareholder Value
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
4
Serving 20,000+ Customers Globally
U.S. Dept of Labor
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
5
Enterprise trends & How IT needs to be
aligned with business processes
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
66
Enterprise Trends Drive IT Requirements
High Performance IT
Organizations Differ****
Speed of
Execution on
Strategy and
Innovation is
Top of Mind*
Executives
Expect IT
to Drive
Competitive
Advantage**
Boosting Network
Performance
Increases
Productivity***
 Aggressive adopters of
new technology
 Spend less time fixing
systems
 Manage to more
performance metrics
New Business Directions Drive New IT Requirements
1. Performance for Business Speed
2. Risk management for Business Safety
3. Open standards and partnerships for Business Flexibility
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
*
**
***
****
The Economist, 2006
Gartner, 2006
Information Week, 2006
McKinsey, 2006
www.juniper.net
7
More than Ever, The Network is Critical to
Business Success
 The network is a strategic asset that should innovate
businesses and business processes
 Delivering strategic and tactical business results
should not require unreasonable trade-offs
Speed is the New Currency
Dynamic Business Models
Network Critical to Success
Countries
Copyright © 2007 Juniper Networks, Inc.
Companies
Proprietary and Confidential
Individuals
www.juniper.net
8
Aligning IT with the Business is Essential
 Challenges
The CIO Dilemma
• Control operational costs,
maximize investments, simplify
operations
• Manage threats, control access
• Assure service levels and
application performance
• Mitigate IT risk
IT Budgets
 Opportunities
• Pursue opportunity, enable
growth, respond to changes
• Innovate to deliver services that
create competitive advantage
Stay in the game
Copyright © 2007 Juniper Networks, Inc.
Grow &
Transform
Grow &
Transform
Run the
Business
Run the
Business
Grow &
Transform
Run the
Business
$
Time
Change the rules and win the game
Proprietary and Confidential
www.juniper.net
9
High-Performance Businesses View the
Network as Critical to Success
High-Performance
Businesses Profile
Benefits of a High-Performance
Network Infrastructure
 Believe IT is strategic to their
business, customers and
differentiation from competitors
 Expedites workforce productivity
and customer loyalty
 Supports revenue growth and
profitability goals
 Ensures Risk Management by
providing the visibility to react
and respond to unplanned
events and achieve preventative
goals
 Operational improvements that
enable cost reductions and
ensure quick time-to-value
 Must respond to new
opportunities and challenges in
the marketplace
 Aggressive adopters of new
technology*
 Spend less time fixing systems*
 Manage to more performance
metrics*
* Gartner, 2006
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
10
Product & Technology focus in the
Enterprise market place
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
11
11
Product Strategy
Steer Products Into a Naturally Integrated Portfolio
• Cutting-edge engineering
• Performance at scale
• Reliability
• Power efficiency
• Leverage:
• Build once - use multiple times
• Modular integration of services
• Commonality:
• Gradually converge on to a
common OS (JUNOS), policy,
and network mgmt
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
12
Enterprise Product & Technology focus
 Security (Firewalls & IDP’s)
 Remote Access (Secure Access)
 Unified Access Control (NAC solutions)
 Enterprise Routing (J-series)
 WAN acceleration (WX-series)
 JUNOS operating system
 Ethernet Switching (EX-series) NEW!
 Log & Event Management (STRM) NEW!
INTEGRATION IS KEY!
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
13
We Have a Complete Portfolio of Products
Network Mgmt
Policy and Control (UAC)
Branches &
Campuses
Datacenter
Switches
WAN Opt
FWVPN +
IDP
Router
Core /
Edge
Routers
SSL VPN
FWVPN +
IDP
Secure
Router
Switches
Service Provider
Datacenter of Partner or CSP
Switches
WAN Opt
FWVPN +
IDP
Router
SSL VPN
SSL VPN
Remote
Workers
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
14
The External Perception of Our Products
Is Excellent
Firewall / IPSec VPN
Remote Access – SSL VPN
Gartner Magic
Quadrants
Show Juniper
is a Proven
Leader in All
Categories
Copyright © 2007 Juniper Networks, Inc.
Intrusion Prevention
Proprietary and Confidential
WAN Optimization
www.juniper.net
15
Our Differentiation
Industry-Leading Security
Performance at Scale
Carrier-Class Reliability
Power & Cooling Efficiency
Single OS, Policy & Mgmt
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
16
Future Direction
An aggressive strategy
to deliver the best products, integrated
solutions and services at the best
economics
The “preferred choice”
for high-performance businesses
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
17
Juniper Security Threat
Response Manager
(STRM)
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
18
Customer Challenges
Dispersed Threats
 IT “information” overload
• Flood of logged events from many
“point” network and security devices
• Lack of expertise to manage disparate
data silos & tools
 Compliance mandates
IT Overload
• Industry specific regulations mandating
security best practices
• Internal IT “risk” assessment programs
 Evolving internal and external
threats
Industry Regulations
Copyright © 2007 Juniper Networks, Inc.
• Insider abuse, theft of intellectual
property
• Complex integrated attacks
Proprietary and Confidential
www.juniper.net
19
Introducing Junipers SIEM/NBAD Solution
STRM – “Security Threat Response Manager”
Integrates Mission Critical Network & Security Data Silos
 STRM Key application features
• Log Management
• Provides long term collection,
archival, search and reporting of
event logs, flow logs and application
data
Security
Information
& Event
Management
Log
Management
• Security Information and Event
Management (SIEM)
STRM
• Centralizes heterogeneous event
monitoring, correlation and
management
Network
Behavior
Analysis
• Network Behavior Anomaly
Detection (NBAD)
• Discovers aberrant network activities
using network and application flow
data
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
20
STRM’s Key Value Proposition
Threat Detection:
Detect New
Threats That Others
Miss
Log Management:
Right Threats at the
Right Time
Compliance:
Enterprise
Value
Juniper’s STRM
Appliance
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
Compliance and
Policy Safety Net
Complements
Juniper’s
Enterprise Mgmt
Portfolio
www.juniper.net
21
STRM Architecture
 STRM – Real time network &
security visibility
 Data collection provides
network, security, application,
and identity awareness
 Embedded intelligence &
analytics simplifies security
operations
 Prioritized “offenses”
separates the wheat from the
chafe
 Solution enables effective
Threat, Compliance & Log
Management
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
22
Reporting
 220+ Out of the box report templates
 Fully customizable reporting engine: creating,
branding and scheduling delivery of reports
 Compliance reporting packages for
PCI, SOX, FISMA, GLBA, and HIPAA
 Reports based on control frameworks:
NIST, ISO and CoBIT
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
23
STRM Key Benefits
 Converged network security management console
• Integrates typically silo’d network & security data
 Network, security, application, & identity awareness
• Unrivaled data management greatly improves ability to meet IT
security control objectives
 Advanced analytics & threat detection
• Detects threats that other solutions miss
 Compliance-driven capabilities
• Enables IT best practices that support compliance initiatives
 Scalable distributed log collection and archival
• Network security management scales to any sized organization
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
24
STRM Products
Large
enterprises
&Service
Providers
STRM5000
Small
Enterprise
Small
Medium
Enterprise
STRM - EP
STRM - FP
STRM2500
STRM500
Events per sec
250EPS
500EPS
1000EPS
2500EPS
5000EPS
5000 + EPS
Flows per Min
15k F
15kF
50 & 100k F
50 & 100k F
100 & 200k F
100 & 200k F
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
25
Thank You!
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
26
Copyright © 2007 Juniper Networks, Inc.
Proprietary and Confidential
www.juniper.net
27
27
Download