AGENDA. 資 訊 網 路 發 展 趨 勢 Juniper Cloud Solution Cloud Security 解 決 方 案 共 同 供 應 契 約 採 購 建 議 為 何 選 擇 Juniper
|
|
- Edwin Melton
- 8 years ago
- Views:
Transcription
1 EMEA SALES SUMMIT 2012 Cloud Solution
2 AGENDA 資 訊 網 路 發 展 趨 勢 Juniper Cloud Solution Cloud Security 解 決 方 案 共 同 供 應 契 約 採 購 建 議 為 何 選 擇 Juniper 2 Copyright 2012 Juniper Networks, Inc.
3 CUSTOMERS ARE BUILDING CLOUDS Agility Economics The Resource Network is the Pooling-Clouds Larger pools are more: Efficient and Agile Foundation of the Cloud 3 Copyright 2012 Juniper Networks, Inc.
4 THE DATA CENTER HAS EVOLVED BUT NOT THE NETWORK Rigid, legacy model of I.T. Client /Server silos Applications Servers/ Dedicated Servers Compute Dedicated Storage Storage Network Layers of Complexity Challenge 1 Connectivity: Trees to Any-to-Any Software Services Challenge 2 Virtualized Workloads Security: Shared Storage Perimeter to Multi layer Flexible, virtualized model 4 Copyright 2012 Juniper Networks, Inc.
5 CHALLENGE 1 - SIMPLIFYING CONNECTIVITY 3 Problems: 1. Multiple Networks SAN Production Many networks MGT vmotion vcenter Converged One network 2. Tiered Networks 3. Many Devices Trees Complexity Capacity Flat, any-to-any fabric Capacity Scale Many separate devices 5 Copyright 2012 Juniper Networks, Inc. Simplicity Scale One logical device
6 傳 統 網 路 架 構 問 題 之 一 造 成 網 路 延 遲, 嚴 重 影 響 整 體 服 務 效 能 VM Motion 後 交 換 器 設 定 未 調 整, 造 成 運 作 中 斷 同 一 交 換 器 內 傳 輸 擁 有 最 佳 運 作 效 能 VM One Hop 6 Copyright 2012 Juniper Networks, Inc.
7 傳 統 網 路 架 構 問 題 之 二 Typical tree configuration Location matters in a tree architecture Appliances and VLANs Shadows VM 7 Copyright 2012 Juniper Networks, Inc.
8 CHALLENGE 2 - NEW SECURITY MODEL Castle Model Hotel Model Perimeter security Physical separation Multi-layer security Virtual separation 8 Copyright 2012 Juniper Networks, Inc.
9 APPLICATIONS DEPEND ON THE NETWORK Clients Global High-Performance Network Data Centers Mobile IaaS PaaS SaaS Home Branch Campus Mobility Service Delivery Clouds Service Production 9 Copyright 2012 Juniper Networks, Inc.
10 THE GAME CHANGERS 10 Copyright 2012 Juniper Networks, Inc.
11 JUNIPER OFFERS All great things are simple Simplicity The Innovator in Network DC fabrics Security The Leader in cloud security Agility & Economics A more agile business Better economics 11 Copyright 2012 Juniper Networks, Inc.
12 SECURITY: SECURE VIRTUALIZATION Clients Global High-Performance Network Provides complete visibility, control and protection of virtualized servers Simple governance and compliance Optimized for the highest performance on the market Ease of provisioning and open for integration with multiple hypervisors Unlimited scale Data Centers VM Virtual VM VM VM Hypervisor VM to VM vgw Series vsrx 12 Copyright 2012 Juniper Networks, Inc.
13 SECURITY: SECURE MULTI-TENANCY Clients Global High-Performance Network Data Centers Rich, advanced security and routing High performance and scale with virtualization to support 1000s of tenants Complete suite of security and visibility tools for physical and virtual environments Customer deployment flexibility (software or hardware SRX) DC to DC Physical Virtual VM VM VM VM Hypervisor VM to VM vgw Series vsrx Server to Server SRX Series 13 Copyright 2012 Juniper Networks, Inc.
14 SECURITY: SECURE CLOUD ACCESS Clients Global High-Performance Network Data Centers Complete suite of security tools providing visibility, control and protection of unmanaged mobile devices Authenticates, authorizes and protects users and devices Compatible with all major mobile OSs Simplest possible download, installation and management Identity Client to DC DC to DC Junos Pulse Firewall AV + Anti-SPAM Loss/Theft Protection Physical VM Virtual VM VM VM Application Hypervisor VM to VM vgw Series vsrx SRX Series Server to Server Location Device monitoring and control Application 14 Copyright 2012 Juniper Networks, Inc.
15 JUNIPER CLOUD 解 決 方 案 透 過 JUNIPER EX & QFX 系 列 交 換 器, 建 置 扁 平 化 的 網 路 平 台 單 一 層 點 對 點 連 接 的 網 路 架 構, 網 路 傳 輸 速 度 提 升 十 倍 15 Copyright 2012 Juniper Networks, Inc.
16 SIMPLICITY: THE NETWORK TRANSFORMED One Network Flat, any-to-any connectivity Key resources are ALWAYS one hop away VM Locality should not matter in a virtualized data center 16 Copyright 2012 Juniper Networks, Inc.
17 JUNOS 單 一 網 路 作 業 系 統 Module x One Architecture 模 組 化 軟 體 設 計, 依 需 求 分 別 設 定 高 用 性 高 安 全 性 與 高 擴 充 性 單 一 作 業 系 統 SRX QFabric Single source code base Consistent implementation of features T Series EX8216 SRX5800 EX8208 SRX5600 SRX3600 NSMXpress SRX650 SRX240 SRX210 SRX100 SECURITY MX Series M Series J Series ROUTERS EX4200 EX3200 EX2200 EX4500 SWITCHES QFabric 17 Copyright 2012 Juniper Networks, Inc.
18 為 何 需 要 單 一 網 路 作 業 系 統 Access Switch Aggregation/Core Security WAN Router Product CAT 4948 CAT 6500 NX 7000 ASA 55xx FWSM IPS 7200 ASR OS Number of Release Trains IOS-SG Too many, inconsistent IOS-SX, NX-OS CAT-OS Too many, inconsistent PIX-OS PIX-OS Linux 7.x 6.x Too many, inconsistent IOSmainline IOS-XE Too many, inconsistent Product OS Number of Release Trains EX 4200 EX 8200 / MX SRX M JUNOS JUNOS JUNOS JUNOS 1 18 Copyright 2012 Juniper Networks, Inc.
19 JUNIPER CLOUD 網 路 平 台 完 整 產 品 Switching (1G,10G) Switching (10G) Fabric EX Series with Virtual Chassis EX4200, EX4500, EX8200 Physical Security Virtual Security VM VM VM VM Hypervisor QFX3500 ToR Switch Fabric Migration App & Web Security AppSecure QFabric QFX3000-M & QFX3000-G Data Center Interconnect MPLS Core Data Center Data Center High- End SRX Series vgw Series SRX MX Series 19 Copyright 2012 Juniper Networks, Inc.
20 20 Copyright 2012 Juniper Networks, Inc. 最 高 將 最 高 將 最 高 將 最 高 將 , 最 高 將 最 高 將 最 高 將 最 高 將 ,, 高 高 高 高, 高 高 高 高 ( 最 最 最 最 70 km) 70 km) 70 km) 70 km) ( 最 最 最 最 70 km) 70 km) 70 km) 70 km) VIRTUAL CHASSIS 滿 足 滿 足 滿 足 滿 足 ENTERPRISE CLOUD 需 求 需 求 需 求 需 求 Industry -only Industry -only
21 超 高 彈 性 架 構 專 用 VC 纜 線 1G 或 10G VC 纜 線 Virtual Chassis Location #1 Virtual Chassis Location #2 Up to 40 km 1G 或 10G VC 纜 線 EX VC 形 成 環 中 環 提 供 超 高 備 援 能 力 每 部 EX 設 備 最 高 提 供 4 個 VC 埠 VC 跨 越 不 同 機 櫃 排 ( 見 下 頁 ) 21 Copyright 2012 Juniper Networks, Inc.
22 超 高 備 援 設 計 EX4200 Master RE Backup RE Backup RE Line Card 3 22 Copyright 2012 Juniper Networks, Inc.
23 分 散 式 流 量 轉 送 無 須 繞 徑 重 複 占 用 VC 背 板 頻 寬 VPC0 EX-PFE5 VPC1 VPC0 EX-PFE4 VPC1 VPC0 VPC1 EX-PFE0 Packet is sent is from sent PFE0 from to PFE4 via PFE5 based on SPF Table PFE0 to PFE2 via PFE1 based on SPF Table EX-PFE3 VPC0 VPC1 VPC0 EX-PFE1 VPC1 VPC0 EX-PFE2 VPC1 流 量 由 EX0 至 EX2 EX4 23 Copyright 2012 Juniper Networks, Inc.
24 快 速 線 路 備 援 機 制 斷 線 備 援 時 間 小 於 50ms < 50ms VPC0 EX-PFE5 VPC1 VPC0 EX-PFE4 VPC1 VPC0 VPC1 EX-PFE VC Link re-computes Between PFE1 topology & PFE2 and breaks 1. generates Packet causes traffic is sent new loss from SPF table PFE0 to PFE3 via PFE1 Packet PFE1 enables and is sent PFE2 local from based loopback. PFE0 on to SPF PFE3 Packet Table via is PFE5 looped & PFE4 by PFE1 based in on opposite new SPF table direction. This takes only tens of milliseconds. EX-PFE3 VPC0 VPC1 VPC0 EX-PFE1 VPC1 VPC0 EX-PFE2 VPC1 24 Copyright 2012 Juniper Networks, Inc.
25 REDUCE DC NETWORK TCO WITH JUNIPER Typical Configuration Total List Price Rack Space Operating Systems (time to manage) 3000 servers, dual 1GbE attached Fully redundant design 25 Copyright 2012 Juniper Networks, Inc. Savings $$ $4.6M $9.6M Up to 52.1% CAPEX Power 372,169 kw*hr/yr 666,758 kw*hr/yr Up to 44.2% power 210 RU 450 RU Up to 55.3% space JUNOS IOS Up to 25% OPEX Juniper Solution EX 4200 top-of-rack (2/rack) EX 8208 in core 2 SRX Gbps firewall 10GE uplink from access and in core Cisco Solution Cat 4948 top-of-rack (2/rack) Cat 6500 in aggregation and core 46 FWSM Source: publicly available data sheets, price lists, Lake Partner study
26 CLOUD SECURITY 26 Copyright 2012 Juniper Networks, Inc. 26
27 THE DATACENTER CHALLENGE Of all orgs say 56% 54% 61% securing web traffic hacked through web is by far their biggest concern Of large orgs are apps Of security pros say next-generation security addresses only part of the problem Attacks have changed and security solutions have not adapted Next generation datacenter security Signature and IP/reputation blocking are inadequate Web application security solutions not solving the problem Continued DDoS attacks at scale not being stopped No intelligence sharing Traditional network security doesn t work in dynamic nature of cloud SDN security opportunity 27 Copyright 2012 Juniper Networks, Inc. Sources: Verizon DBIR Report 2012 and Ponemon Institute Report on Efficacy of Emerging Network Security 2013
28 STRATEGIC FOCUS AREAS Efficacy Security Intelligence Customer Experience Platform Independence 28 Copyright 2012 Juniper Networks, Inc.
29 常 見 的 虛 擬 網 路 防 禦 部 署 方 式 1. 透 由 VLAN 方 式 隔 離 2. 在 VM 中 安 裝 Agent Hypervisor 狀 態 層 防 火 牆 VM 透 由 VLAN 進 行 隔 離, 所 有 存 取 流 量 透 由 外 部 的 Firewall 進 行 封 包 過 濾 缺 點 : 複 雜 的 VLAN 網 路 設 定 兩 倍 網 路 流 量 需 求 管 理 成 本 高 VM1 VM2 VM3 在 每 個 VM 中 安 裝 單 機 版 軟 體 防 火 牆 缺 點 : 影 響 虛 擬 主 機 的 效 能 不 容 易 管 理 所 有 防 火 牆 設 定 管 理 成 本 高 VM1 VM2 VM3 所 有 VM 的 網 路 流 量 均 經 由 Firewall 保 護, 並 自 動 將 所 有 VM 進 行 網 路 分 段 及 隔 離 優 點 : 不 影 響 效 能 單 一 介 面 集 中 管 理 所 以 安 全 政 策 VM1 VM2 VM3 VS ESX Host VS ESX Host FW as Kernel Module ESX Host HYPERVISOR HYPERVISOR HYPERVISOR VS FW Agents 29 Copyright 2012 Juniper Networks, Inc. 29
30 CLOUD 資 安 解 決 方 案 虛 擬 主 機 安 全 防 護 透 過 JUNIPER VGW 防 火 牆 系 列 提 供 VM 虛 擬 主 機 與 虛 擬 主 機 之 間 連 接 與 傳 輸 VM1 VM2 VM3 vgw VS ESX Host Hypervisor 狀 態 層 防 火 牆 專 門 針 對 VMWare 虛 擬 化 進 行 防 護 30 Copyright 2012 Juniper Networks, Inc. 30
31 VGW 對 ESX 效 能 影 響 最 小 Unsecured ESX vgw FastPath Firewall 8750 Total Throughput (Mbps) Competitor Slowpath Firewall 5 VMs 10 VMs 15 VMs 20 VMs vgw secures ESX with only a 3% overhead 31 Copyright 2012 Juniper Networks, Inc.
32 VGW - THE HYPERVISOR-BASED 安 全 閘 道 全 球 第 一 家 提 供 Virtual Firewall, 擁 有 五 項 專 利 企 業 級 虛 擬 網 路 防 禦 通 過 VMware VMsafe Certified 有 效 保 護 VM and the hypervisor 容 錯 架 構 (i.e. HA) Virtual Center Security Design for VGW VM VM1 VM2 VM3 虛 擬 網 路 偵 測 功 能 Secure VMotion 擴 充 至 1,000+ ESX Auto Secure 自 動 偵 測 及 保 護 新 增 加 VM Partner Server (IDS, SIM, Syslog, Netflow) Packet Data THE vgw ENGINE ESX Host 多 層 次 縱 深 防 禦 具 備 Stateful firewall 及 IDS 功 能 彈 性 的 安 全 政 策 部 署 Zone, VM group, VM, Application, Port, Protocol, Security state VMWARE DVFILTER VMWARE VSWITCH HYPERVISOR ESX Kernal 32 Copyright 2012 Juniper Networks, Inc.
33 實 現 雲 端 網 路 安 全 Database SAP WWW Desktop Desktop vgw 4.5 vgw 4.5 ESX ESX Physical Security Devices 管 理 面 Physical Network - 視 覺 化 管 理 虛 擬 並 網 路 整 合 入 侵 偵 測 及 防 火 牆 功 能 - 單 一 管 理 介 面 統 一 管 理 VMs 的 安 全 存 取 政 策 具 備 高 網 路 存 取 效 能 - 整 合 Hypervisor Kernel 的 安 全 閘 道, 提 供 完 整 虛 擬 系 統 的 安 全 並 具 備 高 傳 輸 效 能 33 Copyright 2012 Juniper Networks, Inc.
34 VGW 主 要 功 能 視 覺 化 管 理 介 面 單 一 視 覺 化 儀 表 板 即 輕 鬆 管 理 vgw 所 有 功 能 六 大 主 要 功 能 Network VM 網 路 流 量 分 析 Firewall 防 火 牆 安 全 政 策 管 理 及 連 線 紀 錄 IDS 集 中 管 理 網 路 行 為 分 析 及 攻 擊 警 告 Introspection 分 析 所 有 VM 內 部 設 定 OS, Apps, HotFix, etc. Compliance Out-of-box, and ability to add rules and monitor VM compliance Reports 提 供 自 動 化 報 表 (all the functional modules) 34 Copyright 2012 Juniper Networks, Inc.
35 視 覺 化 管 理 介 面 單 一 介 面 管 理 所 有 VM 網 路 及 VM 設 定 落 實 網 路 存 取 政 策 動 態 調 整 網 路 存 取 黑 白 名 單 保 護 VM 內 部 系 統 設 定 集 中 安 全 政 策 管 理 所 有 網 路 存 取 流 量, 防 止 Malware 擴 散 並 自 動 調 整 因 VM 移 動 的 存 取 政 策 35 Copyright 2012 Juniper Networks, Inc.
36 網 路 存 取 控 制 設 定 介 面 36 Copyright 2012 Juniper Networks, Inc.
37 視 覺 化 - VM 內 部 應 用 程 式 狀 態 37 Copyright 2012 Juniper Networks, Inc.
38 視 覺 化 - 網 路 流 量 分 析 38 Copyright 2012 Juniper Networks, Inc.
39 INTEGRATED WITH JUNIPER DATA CENTER SECURITY VM1 VM2 VM3 ALTOR vgw Policies vgw VMware vsphere Zone Synchronization Traffic Mirroring to IPS Central Policy Management Firewall Event Syslogs Netflow for Inter-VM Traffic STRM Network Juniper EX Switch Juniper SRX with IDP 39 Copyright 2012 Juniper Networks, Inc.
40 EXECUTING ON THE STRATEGY Users Datacenters Security Intelligence Client Web Security Application Visibility IPS Firewall Internal Attack Protection Intrusion Deception Content Security Network Security Security Management 40 Copyright 2012 Juniper Networks, Inc.
41 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Juniper s Spotlight Secure global attacker database is a one-of-a-kind, cloud-based security solution that identifies specific attackers and delivers that intelligence to Junos security products Spotlight Attacker Database Spotlight Attacker Database WebApp Secure DDoS Secure SRX Series Services Gateways SRX Series Services Gateways 41 Copyright 2012 Juniper Networks, Inc.
42 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure Spotlight Attacker Database DDoS Secure Spotlight Attacker Database What it is Aggregates hacker profile information from global sources in a cloud-based database Distributes aggregated hacker profile information to global subscribers Why it s different High accuracy zero day attacker detection and threat mitigation Only solution to offer device-level hacker profiling service Can block a single device/attacker WebApp Secure SRX Series Services Gateways DDoS Secure 42 Copyright 2012 Juniper Networks, Inc. SRX Series Services Gateways
43 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure Spotlight Attacker Database What it is Continuously monitors web apps to stop hackers and botnets Collects forensic data on hacker device, location, and methods Continuously updates on-board hacker profile information Why it s different Accurate threat mitigation with near-zero false positives Hacker profile sharing for global protection surface Flexible deployment (i.e., appliance, VM, AWS) SRX Series Services Gateways DDoS Secure 43 Copyright 2012 Juniper Networks, Inc. SRX Series Services Gateways
44 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure DDoS Secure Spotlight Attacker Database What it is Large-scale DDoS attack mitigation Slow and low DDoS attack mitigation Zero-day protection via combination of behavioral and rules-based detection Why it s different Broadest protection with deployment ease Industry leading performance 40Gb throughput Ease of use through automated updating Flexible deployment (i.e., 1U appliance, VM) SRX Series Services Gateways 44 Copyright 2012 Juniper Networks, Inc. SRX Series Services Gateways
45 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure DDoS Secure SRX Series Services Gateways SRX Series Services Gateways Spotlight Attacker Database 45 Copyright 2012 Juniper Networks, Inc. What it is Provides network security services WebApp Secure communicates attacker information to SRX upon detection of attempted breach SRX uses WebApp Secure intelligence about ongoing attack to block offending IP(s) Why it s different Only security provider to leverage hacker profile intelligence in network firewalling Provides large-scale web attack mitigation and web DDoS prevention Extends existing SRX capabilities with web DDoS mitigation
46
47 解 決 方 案 共 同 供 應 契 約 採 購 建 議 47 Copyright 2012 Juniper Networks, Inc. 47
48 ENTERPRISE CLOUD 規 劃 建 議 客 戶 若 要 規 劃 一 雲 端 資 料 中 心, 採 用 一 層 化 網 路 規 劃 環 境 需 求 : 需 40 埠 10G 網 路 介 面 及 48 埠 10/100/1000Base-T 網 路 介 面, 需 要 規 劃 一 層 化 網 路 架 構, 不 佔 用 網 路 埠, 建 議 規 劃 如 下 組 別 項 次 CTC 項 次 型 號 決 標 價 20% 1-49 有 網 管 10G 交 換 器 之 40 埠 10GBase-X( 支 援 IPv6) EX F-VC1-FB-TAA 842, 有 網 管 路 由 交 換 器 之 48 埠 10/100/1000Base-T( 具 10GBase-X)( 含 加 值 選 項 功 能 )( 支 援 IPv6) EX T-TAA EX-UM-2X4SFP 159, Copyright 2012 Juniper Networks, Inc. 48
49 Role Base Firewall 規 劃 建 議 規 劃 Role Base Firewall 需 包 含 下 列 主 要 產 品 解 決 方 案 第 三 組 SRX 安 全 路 由 閘 道 第 四 組 UAC 終 端 設 備 管 理 以 單 位 人 數 250 人 為 例, 若 客 戶 需 要 規 劃 Role Base Firewall 方 案, 防 火 牆 效 能 須 達 500Mbps 以 上 您 以 規 劃 建 議 的 解 決 方 案 內 容 : 組 別 項 次 CTC 項 次 3-29 防 火 牆 之 500Mbps( 含 加 值 選 項 功 能 )( 支 援 IPv6) 型 號 SRX240H-TAA(1 Set) SRX-RAC-5-LTU 決 標 價 % 4-27 終 端 電 腦 網 路 存 取 控 制 之 250 台 IC4500 IC4500-ADD-250E 260, Copyright 2012 Juniper Networks, Inc. 49
50 BYOD 規 劃 建 議 規 劃 SSLVPN+BYOD 需 包 含 下 列 主 要 產 品 解 決 方 案 第 四 組 UAC 終 端 設 備 管 理 第 四 組 SSLVPN 網 路 認 證 若 您 協 助 客 戶 規 劃 1000 人 SSLVPN 遠 端 認 證 並 需 要 規 劃 250U BYOD 解 決 方 案 您 以 規 劃 建 議 的 解 決 方 案 內 容 : 組 別 項 次 4-43 網 路 認 證 閘 道 之 1000 人 CTC 項 次 型 號 決 標 價 MAG4610 ACCESSX600-ADD-1000U 1,279,318 20% 4-27 終 端 電 腦 網 路 存 取 控 制 之 250 台 IC4500 IC4500-ADD-250E 260, Copyright 2012 Juniper Networks, Inc. 50
51 為 何 選 擇 JUNIPER 51 Copyright 2012 Juniper Networks, Inc. 51
52 進 口 品 牌 的 功 能 及 品 質, 貼 近 國 產 交 換 器 的 價 格 組 別 項 次 品 名 Juniper D-Link 1-24 有 網 管 交 換 器 之 24 埠 10/100/1000Base-T( 含 加 值 選 項 功 能 ) ( 支 援 IPv6) EX T-4G-TAA DGS TC(EI) 項 次 更 多 且 產 品 完 整, 滿 足 不 同 專 案 規 劃 需 要 ( 去 年 69 項, 本 標 83 項 ) 第 一 組 交 換 器 第 一 組 路 由 器 第 三 組 防 火 牆 / 防 毒 牆 第 四 組 存 取 控 管 / 認 證 閘 道 專 案 報 備 系 統 化, 自 動 追 蹤 報 備 處 理 進 度, 提 升 報 備 時 效 及 專 案 保 護 力 52 Copyright 2012 Juniper Networks, Inc.
53 如 何 透 過 JUNIPER 創 造 更 多 利 潤? 參 加 Juniper 台 灣 區 新 認 證 夥 伴 計 劃 您 只 需 要 參 加 Juniper 所 舉 辦 的 新 認 證 夥 伴 計 劃 並 成 為 Juniper Select/Elite Partner, 就 以 取 得 更 好 的 利 潤!! ( 請 填 妥 J-Partner 申 請 表, 並 交 給 現 場 服 務 同 仁 ) 以 網 路 解 決 方 案 之 方 式 銷 售 Juniper 系 列 產 品 53 Copyright 2012 Juniper Networks, Inc.
54
JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net
JUNIPER One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net 2-3-7: JUNIPER S BUSINESS STRATEGY 2 Customer Segments 3 Businesses Service
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationRETHINK SECURITY FOR UNKNOWN ATTACKS
1 Copyright 2012 Juniper Networks, Inc. www.juniper.net RETHINK SECURITY FOR UNKNOWN ATTACKS John McCreary Security Specialist, Juniper Networks AGENDA 1 2 3 Introduction 5 minutes Security Trends 5 minutes
More informationAN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD
White Paper AN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD Protecting Physical and Virtual Workloads Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationNETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD. Debbie Montano, Chief Architect dmontano@juniper.net
NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD Debbie Montano, Chief Architect dmontano@juniper.net DISCLAIMER This statement of direction sets forth Juniper Networks current intention
More informationEVOLVED DATA CENTER ARCHITECTURE
EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper
More informationSimplifying the Data Center Network to Reduce Complexity and Improve Performance
SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,
More informationProtecting Physical and Virtual Workloads
WHITE PAPER An Integrated Security Solution for the Virtual Data Center and Cloud Protecting Physical and Virtual Workloads Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
More informationYou can t build a new future on old technologies Juniper Networks. Enabling the Hi-IQ network of tomorrow
You can t build a new future on old technologies Juniper Networks Enabling the Hi-IQ network of tomorrow Aligning business and IT strategy Agility and Economics Driving IT Transformation 0 0 1 0 0 0 0
More informationWhite Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationIntroduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...
APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center
More informationHow Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
More informationDECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe
DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe JUNIPER AND SDN IN THE NEWS 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net WHY DO WE NEED SOFTWARE
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationIncrease Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
More informationSoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
More informationENABLING THE PRIVATE CLOUD - THE NEW DATA CENTER NETWORK. David Yen EVP and GM, Fabric and Switching Technologies Juniper Networks
ENABLING THE PRIVATE CLOUD - THE NEW DATA CENTER NETWORK David Yen EVP and GM, Fabric and Switching Technologies Juniper Networks Services delivered over the Network Dynamically shared resource pools Application
More informationSOLUTIONS FOR DEPLOYING SERVER VIRTUALIZATION IN DATA CENTER NETWORKS
WHITE PAPER SOLUTIONS FOR DEPLOYING SERVER VIRTUALIZATION IN DATA CENTER NETWORKS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
More informationJuniper Solutions for Turnkey, Managed Cloud Services
Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge
More informationRIDE THE SDN AND CLOUD WAVE WITH CONTRAIL
RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS pgeenens@juniper.net BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services
More informationArchitecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
More informationLAYER3 HELPS BUILD NEXT GENERATION, HIGH-SPEED, LOW LATENCY, DATA CENTER SOLUTION FOR A LEADING FINANCIAL INSTITUTION IN AFRICA.
- LAYER3 HELPS BUILD NEXT GENERATION, HIGH-SPEED, LOW LATENCY, DATA CENTER SOLUTION FOR A LEADING FINANCIAL INSTITUTION IN AFRICA. Summary Industry: Financial Institution Challenges: Provide a reliable,
More informationJUNIPER NETWORKS CLOUD SECURITY
White Paper JUNIPER NETWORKS CLOUD SECURITY Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction Cloud Computing Overview...3 Private Cloud... 4 Public Cloud...
More informationSECURING THE DATACENTER
SECURING THE DATACENTER CAIO KLEIN SEGURINFO 2014 1 Copyright 2013 Juniper Networks, Inc. SECURITY AT JUNIPER Customer segments Service providers, enterprise Business segments Routing, switching, security
More informationJuniper Networks QFabric: Scaling for the Modern Data Center
Juniper Networks QFabric: Scaling for the Modern Data Center Executive Summary The modern data center has undergone a series of changes that have significantly impacted business operations. Applications
More informationProactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
More informationPalo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
More informationDATA CENTER LAN MIGRATION GUIDE
DATA CENTER LAN MIGRATION GUIDE Table of Contents Chapter 1: Why Migrate to Juniper... 5 Introduction to the Migration Guide... 6 Audience... 6 Data Center Architecture and Guide Overview... 6 Why Migrate?...
More informationHow To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
More informationSECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer
SECURE THE DATACENTER Dennis de Leest Sr. Systems Engineer PURE PLAY IN HIGH-PERFORMANCE NETWORKING Breadth First 10 Years of Today s Of Juniper: Portfolio 1996-2006 Core Edge Access & Data Center WAN
More informationWhite Paper. Network Simplification with Juniper Networks Virtual Chassis Technology
Network Simplification with Juniper Networks Technology 1 Network Simplification with Juniper Networks Technology Table of Contents Executive Summary... 3 Introduction... 3 Data Center Network Challenges...
More informationWHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1
WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive
More informationSimplify the Data Center with Junos Fusion
Simplify the Data Center with Junos Fusion Juniper Networks Fabric Technology 1 Table of Contents Executive Summary... 3 Introduction: Network Challenges in the Data Center... 3 Introducing Juniper Networks
More informationThe Advantages of Cloud Services
Cloud-Based Services: Assure Performance, Availability, and Security What You Will Learn Services available from the cloud offer cost and efficiency benefits to businesses, but until now many customers
More informationNext Steps Toward 10 Gigabit Ethernet Top-of-Rack Networking
Next Steps Toward 10 Gigabit Ethernet Top-of-Rack Networking Important Considerations When Selecting Top-of-Rack Switches table of contents + Advantages of Top-of-Rack Switching.... 2 + How to Get from
More informationJuniper Unite Cloud-Enabled Enterprise Reference Architecture
Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.
More informationALTERNATIVES FOR SECURING VIRTUAL NETWORKS
White Paper ALTERNATIVES FOR SECURING VIRTUAL NETWORKS A Different Network Requires a Different Approach Extending Security to the Virtual World Copyright 2013, Juniper Networks, Inc. 1 Table of Contents
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationNEC s Juniper Technology Brief Issue 2
NEC s Juniper Technology Brief Issue 2 Inside This Issue: Juniper s New SPACE Solutions, Datacentre, Services and Switches Product Releases For further information email info@nec.co.nz or visit www.nec.co.nz
More informationvsrx Services Gateway: Protecting the Hybrid Data Center
Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud
More informationNETWORK AUTOMATION AND ORCHESTRATION
White Paper NETWORK AUTOMATION AND ORCHESTRATION Building an Agile Data Center Infrastructure with Juniper Networks Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationSTORMY WEATHER SECURING CLOUD COMPUTING. Russell Skingsley Director of Advanced Technology Data Centre and Cloud, APAC Juniper Networks
STORMY WEATHER SECURING CLOUD COMPUTING Russell Skingsley Director of Advanced Technology Data Centre and Cloud, APAC Juniper Networks DISCLAIMER These are not necessarily the views of Juniper Networks
More informationProduct Description. Product Overview
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
More informationSECURE CLOUD CONNECTIVITY FOR VIRTUAL PRIVATE NETWORKS
White Paper SECURE CLOUD CONNECTIVITY FOR VIRTUAL PRIVATE NETWORKS Next-Generation Virtualized Managed Services for the Enterprise with Secure-on-Network Links to the Copyright 2014, Juniper Networks,
More informationHP FlexNetwork and IPv6
HP FlexNetwork and IPv6 Miha Petrač ESSN HP Networking presales 25.1.2012 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Magic Quadrant:
More informationTHE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
More informationFront cover. Build a Smarter Data Center with Juniper Networks QFabric. Redguides for Business Leaders
Front cover Build a Smarter Data Center with Juniper Networks QFabric Redguides for Business Leaders Bill White Hoi T Hon Stephen Sauer Raymund Schuenke Understand the limitations of traditional data center
More informationSOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT
BROCADE SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT Rajesh Dhople Brocade Communications Systems, Inc. rdhople@brocade.com 2012 Brocade Communications Systems, Inc. 1 Why can t you do these things
More informationCLOUD IS THE NEW COMPUTER
CLOUD IS THE NEW COMPUTER THE NEW TERMINAL-MAINFRAMES P L AT F O R M CLIENT-SERVER APP-CLOUD ENTERPRISE IT TRANSFORMATION THE CLOUD JOURNEY: 1. Eliminate infrastructure with public SaaS/PaaS 2. Flexible
More informationArchitecting Security for the Private Cloud. Todd Thiemann
Architecting Security for the Private Cloud Todd Thiemann Classification 4/9/2010 Copyright 2009 Trend Micro Inc. 1 The Evolving Datacenter Lowering Costs, Increasing Flexibility Public Cloud Private Cloud
More informationAnalysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
More informationThe Global Attacker Security Intelligence Service Explained
White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
More informationUnderstanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led
Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed
More informationSimplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
More informationIT SECURITY SEMINAR "STALLION 141113" Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen
IT SECURITY SEMINAR "STALLION 141113" Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen JUNIPER TODAY 2012 Revenue: $4.4 Billion Global Presence: Offices In 47 Countries +9000
More informationData Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
More informationSECURING YOUR MODERN DATA CENTER WITH CHECK POINT
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security
More informationKeith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationImplementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**
Course: Duration: Price: $ 4,295.00 Learning Credits: 43 Certification: Implementing and Troubleshooting the Cisco Cloud Infrastructure Implementing and Troubleshooting the Cisco Cloud Infrastructure**Part
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationIT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery
IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the
More informationHow To Secure Your Network With Juniper Networks
SECURITY SERVICES GATEWAYS PRODUCT CATEGORY BROCHURE Integrated Strong Security for Enterprise Data Center and Branch, Service Provider Infrastructure, and Cloud Deployments As threats to the network grow
More informationHAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
More informationHow To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
More informationSecuring the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationSecuring the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC
Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service
More informationTHE OPPORTUNITY IN DATA CENTER. 1 Copyright 2014 Juniper Networks, Inc.
THE OPPORTUNITY IN DATA CENTER 1 DATA CENTER NETWORK TAM BY PRODUCT AREA Data Center Network TAM USD Billions High End FW FW IDP/IPS Secure Routers Routing Core & Agg Switches 11.2 1.0 0.8 0.9 3.3 10%
More informationJuniper Update Enabling New Network Architectures. Debbie Montano Chief Architect, Gov t, Edu & Medical dmontano@juniper.
Juniper Update Enabling New Network Architectures Debbie Montano Chief Architect, Gov t, Edu & Medical dmontano@juniper.net Feb 1, 2010 DISCLAIMER This statement of direction sets forth Juniper Networks
More informationSecurity That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation
White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,
More informationVMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
More informationBuilding Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack
Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack Dave Tucker Hewlett-Packard April 2013 1 About Me Dave Tucker WW Technical Marketing HP Networking dave.j.tucker@hp.com Twitter:
More informationSDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
More informationSoftware Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationData Center Security That Accelerates Your Business
Solution Overview Data Center Security That Accelerates Your Business Business today runs at a breakneck pace. Customers want exceptional service, and workers expect instant access to their job tools,
More informationVirtual Firewalls. Ivan Pepelnjak (ip@ioshints.info) NIL Data Communications
Virtual Firewalls Ivan Pepelnjak (ip@ioshints.info) NIL Data Communications Who is Ivan Pepelnjak (@ioshints) Networking engineer since 1985 Focus: real-life deployment of advanced technologies Chief Technology
More informationIntroduction to Junos Space Network Director
Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights
More informationUse Case Brief NETWORK SECURITY
Use Case Brief NETWORK SECURITY As Datacenter architectures have incorporated virtualization, new application topologies, and new programming constructs such as Docker Containers, new security gaps have
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationJunos Space Virtual Control
Proiduct Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these virtual network elements in conjunction
More informationvcloud Suite Architecture Overview and Use Cases
vcloud Suite Architecture Overview and Use Cases vcloud Suite 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationRestricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
More informationSoftware Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security
Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent
More informationThe Future of Computing Cisco Unified Computing System. Markus Kunstmann Channels Systems Engineer
The Future of Computing Cisco Unified Computing System Markus Kunstmann Channels Systems Engineer 2009 Cisco Systems, Inc. All rights reserved. Data Centers Are under Increasing Pressure Collaboration
More informationVMware NSX A Perspective for Service Providers part 2
VMware NSX A Perspective for Service Providers part 2 Using Software Defined Networking to harden DC security controls Trevor Gerdes Strategic Architect Security and Networks NSX for SPs Part 2 - Agenda
More informationSDN van start naar finish
SDN van start naar finish Ralph Wanders Datacenter Solutions Manager Rick Mur Senior System Engineer Juniper Networks IT SECURITY IS TOPSPORT! Beperkingen datacenter architecturen! Agility/Netwerk virtualisatie!
More informationvsphere 6.0 Advantages Over Hyper-V
v3c Advantages Over Hyper-V The most trusted and complete virtualization platform 2015 Q1 2015 VMware Inc. All rights reserved. The Most Trusted Virtualization Platform Hypervisor Architecture Broad Support
More informationSoftware Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
More informationLimiting the Spread of Threats: A Data Center for Every User
SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware Why do breaches still
More informationDMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
More informationCoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
More informationSecurity Services Gateways PRODUCT CATEGORY BROCHURE
Security Services Gateways PRODUCT CATEGORY BROCHURE Integrated Strong Security for Data Center, Campus, Branch and Cloud Deployments As threats to the network grow more prevalent and destructive, securing
More informationIMPLEMENTING VMWARE SERVER VIRTUALIZATION ON JUNIPER NETWORKS INFRASTRUCTURE
IMPLEMENTATION GUIDE IMPLEMENTING VMWARE SERVER VIRTUALIZATION ON JUNIPER NETWORKS INFRASTRUCTURE Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks
More informationUse Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION Cloud Management Software can coordinate and automate server, network, and storage operations within the modern datacenter. This brief describes how
More informationDelivering Unprecedented Innovation to Create Flexible Virtual Environments
Delivering Unprecedented Innovation to Create Flexible Virtual Environments Cisco and Vmware Virtualizing the Data Center Maximize IT Productivity while Lowering Capital and Operating Costs 2010 Cisco
More informationBUILDING A NEXT-GENERATION DATA CENTER
BUILDING A NEXT-GENERATION DATA CENTER Data center networking has changed significantly during the last few years with the introduction of 10 Gigabit Ethernet (10GE), unified fabrics, highspeed non-blocking
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More information