Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Key Solutions & Updates - Security
Kang Eu WeenEnterprise Marketing Director, APAC
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2
Agenda2008 Market PredictionKey Security Solutions of interest
• Compliance Solution• IT Green Solution
Summary
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 3
Agenda2008 Market PredictionKey Security Solutions of interest
• Compliance Solution• IT Green Solution
Summary
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 4
2008 Top Market Prediction by SpringBoard
India emerges as a lucrative IT outsourcing market10.
Consolidation in the software industry will continue9.
Unified Communications will steadily gain traction8.
IT governance & risk management will be critical issues in it organizations in 2008
7.
Skill shortages will hit vendors, IT management & the investment plans of many organizations
6.
Business organizations become more appreciative of consumer-driven technologies & applications
5.
Cost savings will drive green IT investments4.
Virtualization will make steady headway in both large & mid-sized companies3.
Service-Oriented Architecture will get more attention & commitment from senior management
2.
The subprime crisis in the US will not derail strong IT market growth in Asia1.Prediction
Virtualization will make steady headway in both large & mid-sized companies
Cost savings will drive green IT investments
IT governance & risk management will be critical issues in it organizations in 2008
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 5Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 5
Agenda2008 Market PredictionKey Security Solutions of interest
• Compliance Solution• IT Green Solution
Summary
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6
Compliance Solution
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7
Broad Description of ComplianceBusiness or Country Specific Compliance • US – SOX, Gramm-Leach-Bliley Act (GLBA), HIPAA• Europe - Basel II• Japan – J-SOX• Malaysia – Bank Negara GPIS1
Industry self-regulated compliance• ISO/IEC ISMS 27001:2005• ITIL for IT service deliveries
Internal IT Policy
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 8
The Strategic Dilemma
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 9
Pain Points for CompaniesMore informationDifferent informationQuicker InformationGreater Accuracy
Responsible management wants to be confident that they are signing off accurate information, not going to jail
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 10
Wish List from Enterprise
A single view of the enterprise for threat response• Detection of complex and emerging threats
Simple management and analysis of millions of events and records
Monitoring capability for insider use and abuse
Default best practices for compliance and audit requirements (alerting, reporting etc.)
User identity as key context for threat management and compliance enforcement
• Tell me who caused the problem at the time an offense occurred
DISPERSED THREATS
INDUSTRY REGULATIONS
DROWNING IN LOGS
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 11
ThreatManagement
ComplianceManagement
LogManagement
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 12
Delivering Log ManagementLog collection is fundamental• You can’t analyze data that you did not collect & StoreChallenges• Log Overload
• Highly scalable log aggregation; Efficient & tamper proof archival
• Data Complexity• Broad vendor coverage and extensible APIs for less common
formats• Demanding Operational Requirements
• Customer driven product features delivers value across the organization
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13
Delivering Threat ManagementUniquely pieces together threats using traditionally silo information:• Network Events• Security logs• Application context from network & application flow
logs• User & Identity context data from directories
Without bridging the gap its near impossible to properly respond to threats
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 14
Delivering Compliance Management
•Integrity - SHA hashing•Redundancy - Raid 10•Reliability - Backup/restore
Log/EventCollection
LogManagement
RiskAnalysis
AuditingReporting
PolicyEnforcement
•Integrated behavior analysis•Asset based profiling•Network, asset, & identity context
•Compliance reporting•Deep forensic analysis
•Auto remediate threats•Compliance based “offenses”•Enforce application policy
•Unrivalled visibility•Secure data collection
PCI HIPAA GLBA FISMA NERC SOXCompliance
Regulations Complete compliance safety net
CobiT ISO 17799 CustomControl Objectives
SecurityFrameworks
•Compliance workflow
ComplianceTemplates
ForensicsSearch
PolicyReporting
Feature Compliance Benefits
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 15
STRM Product Portfolio
STRM500JN-STRM-SE-BSE
JN-STRM-ADD-500EPS
STRM2500JN-STRM-MD-BSE
JN-STRM-ADD-2500EPSJN-STRM-ADD-50KF
STRM5000JN-STRM-LG-BSE
JN-STRM-ADD-100KF
250EPS 500EPS 1000EPS 2500EPS 5000EPS
STRM – EPJN-STRM-LG-EP
STRM – FPJN-STRM-LG-FP
5000 + EPS
STRM – QFCJN-STRM-LG-QFC
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 16Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 16
IT Green Solution
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 17
Increasing Awareness of Business Impact on the Community and Environment
Investor Scrutiny on Sustainability
Customer Mandates
Regulatory Pressures
Taking Care of Society & the EnvironmentEnriches Our Lives & Business
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 18
Corporate Social Responsibility Initiatives
Community Outreach
Minimize Corporate Impacton the Environment
Drive Change Throughthe Juniper Eco-System
Product Development andLifecycle Management
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 19
Virtualization & IT Green SolutionVirtualization• Consolidate devices into a single chassis or appliance
without the loss of granular enforcement & control• Maintain integrity of many independent system within a single
physical device • The Green Way
• Reduces energy consumption• Reduces heat dissipation (cooling cost)• Maximize hosting space (save space)
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 20
Security Virtual Systems in Juniper Firewalls
Deployed in Data Centre, HQ offices etc.• Simplifies management• Improves security by segmenting
network• Lowers TCO by eliminating need for
additional hardware
Green initiatives• Reduces number of independent
devices to protect multiple security zones
Vsys #1 Vsys #2 Vsys #3
PhysicalInterfacesVLAN
Tags IPAddresses
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 21
Virtualization using MPLSUse MPLS to virtualize, consolidate, and simplify management of the network• Segment the network, enhance security and performance on an
application or user group basis
• Consolidate the core while preserving the investment of legacy system and data within the enterprise
• Simplify management
Lower cost and improve performance• Network virtualization reduces networks equipment
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 22
Legacy WAN
Scaling Enterprise Security ManagementFirewalls proliferate to “separate” applications & enforce policy• Enforced policy does not scale well and is costly to implement
Logical separation by L2 VLANs at edge• Hundreds to thousands of Access Lists (ACLs) on each router
Storage
Wireless
Storage
Wireless
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 23
Network Virtualization with MPLSIndividual Security zones become MPLS L3 VPNs (VRF)MPLS WAN “SuperCore” separates security zones
• Implicit deny between security zones • No need for extensive router ACLs
Endpoints mapped into security zones by Unified Access Control• Policy Enforcement by Firewall and/or IDP at zone boundaries
MPLS MPLS SuperCoreSuperCore
Storage VRF
Wireless VRF
Corporate VRF
Voice VRF
Storage VRF
Wireless VRF
Corporate VRF
Voice VRF
Storage
Wireless
Storage
Wireless
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 24Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 24
Agenda2008 Market PredictionKey Security Solutions of interest
• Compliance Solution• IT Green Solution
Summary
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 25
Security Opportunities to Address Key Trends in 2008
Opportunities in the Market• 2008 IT Market Predictions
• IT Governance and Risk Management• Virtualization• Green
The ability to address these opportunities• Juniper Solution
• Compliance Solution– Regulation, outsourcing (BPO etc.) & convergence
• Virtualization & Green Solutions– Drive to reduce operational expense
Business Proposition• Be a strategic advisor• Add value drive services
Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 26Copyright © 2008 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 26
Top Related