AGENDA. 資 訊 網 路 發 展 趨 勢 Juniper Cloud Solution Cloud Security 解 決 方 案 共 同 供 應 契 約 採 購 建 議 為 何 選 擇 Juniper

Size: px
Start display at page:

Download "AGENDA. 資 訊 網 路 發 展 趨 勢 Juniper Cloud Solution Cloud Security 解 決 方 案 共 同 供 應 契 約 採 購 建 議 為 何 選 擇 Juniper"

Transcription

1 EMEA SALES SUMMIT 2012 Cloud Solution

2 AGENDA 資 訊 網 路 發 展 趨 勢 Juniper Cloud Solution Cloud Security 解 決 方 案 共 同 供 應 契 約 採 購 建 議 為 何 選 擇 Juniper 2 Copyright 2012 Juniper Networks, Inc.

3 CUSTOMERS ARE BUILDING CLOUDS Agility Economics The Resource Network is the Pooling-Clouds Larger pools are more: Efficient and Agile Foundation of the Cloud 3 Copyright 2012 Juniper Networks, Inc.

4 THE DATA CENTER HAS EVOLVED BUT NOT THE NETWORK Rigid, legacy model of I.T. Client /Server silos Applications Servers/ Dedicated Servers Compute Dedicated Storage Storage Network Layers of Complexity Challenge 1 Connectivity: Trees to Any-to-Any Software Services Challenge 2 Virtualized Workloads Security: Shared Storage Perimeter to Multi layer Flexible, virtualized model 4 Copyright 2012 Juniper Networks, Inc.

5 CHALLENGE 1 - SIMPLIFYING CONNECTIVITY 3 Problems: 1. Multiple Networks SAN Production Many networks MGT vmotion vcenter Converged One network 2. Tiered Networks 3. Many Devices Trees Complexity Capacity Flat, any-to-any fabric Capacity Scale Many separate devices 5 Copyright 2012 Juniper Networks, Inc. Simplicity Scale One logical device

6 傳 統 網 路 架 構 問 題 之 一 造 成 網 路 延 遲, 嚴 重 影 響 整 體 服 務 效 能 VM Motion 後 交 換 器 設 定 未 調 整, 造 成 運 作 中 斷 同 一 交 換 器 內 傳 輸 擁 有 最 佳 運 作 效 能 VM One Hop 6 Copyright 2012 Juniper Networks, Inc.

7 傳 統 網 路 架 構 問 題 之 二 Typical tree configuration Location matters in a tree architecture Appliances and VLANs Shadows VM 7 Copyright 2012 Juniper Networks, Inc.

8 CHALLENGE 2 - NEW SECURITY MODEL Castle Model Hotel Model Perimeter security Physical separation Multi-layer security Virtual separation 8 Copyright 2012 Juniper Networks, Inc.

9 APPLICATIONS DEPEND ON THE NETWORK Clients Global High-Performance Network Data Centers Mobile IaaS PaaS SaaS Home Branch Campus Mobility Service Delivery Clouds Service Production 9 Copyright 2012 Juniper Networks, Inc.

10 THE GAME CHANGERS 10 Copyright 2012 Juniper Networks, Inc.

11 JUNIPER OFFERS All great things are simple Simplicity The Innovator in Network DC fabrics Security The Leader in cloud security Agility & Economics A more agile business Better economics 11 Copyright 2012 Juniper Networks, Inc.

12 SECURITY: SECURE VIRTUALIZATION Clients Global High-Performance Network Provides complete visibility, control and protection of virtualized servers Simple governance and compliance Optimized for the highest performance on the market Ease of provisioning and open for integration with multiple hypervisors Unlimited scale Data Centers VM Virtual VM VM VM Hypervisor VM to VM vgw Series vsrx 12 Copyright 2012 Juniper Networks, Inc.

13 SECURITY: SECURE MULTI-TENANCY Clients Global High-Performance Network Data Centers Rich, advanced security and routing High performance and scale with virtualization to support 1000s of tenants Complete suite of security and visibility tools for physical and virtual environments Customer deployment flexibility (software or hardware SRX) DC to DC Physical Virtual VM VM VM VM Hypervisor VM to VM vgw Series vsrx Server to Server SRX Series 13 Copyright 2012 Juniper Networks, Inc.

14 SECURITY: SECURE CLOUD ACCESS Clients Global High-Performance Network Data Centers Complete suite of security tools providing visibility, control and protection of unmanaged mobile devices Authenticates, authorizes and protects users and devices Compatible with all major mobile OSs Simplest possible download, installation and management Identity Client to DC DC to DC Junos Pulse Firewall AV + Anti-SPAM Loss/Theft Protection Physical VM Virtual VM VM VM Application Hypervisor VM to VM vgw Series vsrx SRX Series Server to Server Location Device monitoring and control Application 14 Copyright 2012 Juniper Networks, Inc.

15 JUNIPER CLOUD 解 決 方 案 透 過 JUNIPER EX & QFX 系 列 交 換 器, 建 置 扁 平 化 的 網 路 平 台 單 一 層 點 對 點 連 接 的 網 路 架 構, 網 路 傳 輸 速 度 提 升 十 倍 15 Copyright 2012 Juniper Networks, Inc.

16 SIMPLICITY: THE NETWORK TRANSFORMED One Network Flat, any-to-any connectivity Key resources are ALWAYS one hop away VM Locality should not matter in a virtualized data center 16 Copyright 2012 Juniper Networks, Inc.

17 JUNOS 單 一 網 路 作 業 系 統 Module x One Architecture 模 組 化 軟 體 設 計, 依 需 求 分 別 設 定 高 用 性 高 安 全 性 與 高 擴 充 性 單 一 作 業 系 統 SRX QFabric Single source code base Consistent implementation of features T Series EX8216 SRX5800 EX8208 SRX5600 SRX3600 NSMXpress SRX650 SRX240 SRX210 SRX100 SECURITY MX Series M Series J Series ROUTERS EX4200 EX3200 EX2200 EX4500 SWITCHES QFabric 17 Copyright 2012 Juniper Networks, Inc.

18 為 何 需 要 單 一 網 路 作 業 系 統 Access Switch Aggregation/Core Security WAN Router Product CAT 4948 CAT 6500 NX 7000 ASA 55xx FWSM IPS 7200 ASR OS Number of Release Trains IOS-SG Too many, inconsistent IOS-SX, NX-OS CAT-OS Too many, inconsistent PIX-OS PIX-OS Linux 7.x 6.x Too many, inconsistent IOSmainline IOS-XE Too many, inconsistent Product OS Number of Release Trains EX 4200 EX 8200 / MX SRX M JUNOS JUNOS JUNOS JUNOS 1 18 Copyright 2012 Juniper Networks, Inc.

19 JUNIPER CLOUD 網 路 平 台 完 整 產 品 Switching (1G,10G) Switching (10G) Fabric EX Series with Virtual Chassis EX4200, EX4500, EX8200 Physical Security Virtual Security VM VM VM VM Hypervisor QFX3500 ToR Switch Fabric Migration App & Web Security AppSecure QFabric QFX3000-M & QFX3000-G Data Center Interconnect MPLS Core Data Center Data Center High- End SRX Series vgw Series SRX MX Series 19 Copyright 2012 Juniper Networks, Inc.

20 20 Copyright 2012 Juniper Networks, Inc. 最 高 將 最 高 將 最 高 將 最 高 將 , 最 高 將 最 高 將 最 高 將 最 高 將 ,, 高 高 高 高, 高 高 高 高 ( 最 最 最 最 70 km) 70 km) 70 km) 70 km) ( 最 最 最 最 70 km) 70 km) 70 km) 70 km) VIRTUAL CHASSIS 滿 足 滿 足 滿 足 滿 足 ENTERPRISE CLOUD 需 求 需 求 需 求 需 求 Industry -only Industry -only

21 超 高 彈 性 架 構 專 用 VC 纜 線 1G 或 10G VC 纜 線 Virtual Chassis Location #1 Virtual Chassis Location #2 Up to 40 km 1G 或 10G VC 纜 線 EX VC 形 成 環 中 環 提 供 超 高 備 援 能 力 每 部 EX 設 備 最 高 提 供 4 個 VC 埠 VC 跨 越 不 同 機 櫃 排 ( 見 下 頁 ) 21 Copyright 2012 Juniper Networks, Inc.

22 超 高 備 援 設 計 EX4200 Master RE Backup RE Backup RE Line Card 3 22 Copyright 2012 Juniper Networks, Inc.

23 分 散 式 流 量 轉 送 無 須 繞 徑 重 複 占 用 VC 背 板 頻 寬 VPC0 EX-PFE5 VPC1 VPC0 EX-PFE4 VPC1 VPC0 VPC1 EX-PFE0 Packet is sent is from sent PFE0 from to PFE4 via PFE5 based on SPF Table PFE0 to PFE2 via PFE1 based on SPF Table EX-PFE3 VPC0 VPC1 VPC0 EX-PFE1 VPC1 VPC0 EX-PFE2 VPC1 流 量 由 EX0 至 EX2 EX4 23 Copyright 2012 Juniper Networks, Inc.

24 快 速 線 路 備 援 機 制 斷 線 備 援 時 間 小 於 50ms < 50ms VPC0 EX-PFE5 VPC1 VPC0 EX-PFE4 VPC1 VPC0 VPC1 EX-PFE VC Link re-computes Between PFE1 topology & PFE2 and breaks 1. generates Packet causes traffic is sent new loss from SPF table PFE0 to PFE3 via PFE1 Packet PFE1 enables and is sent PFE2 local from based loopback. PFE0 on to SPF PFE3 Packet Table via is PFE5 looped & PFE4 by PFE1 based in on opposite new SPF table direction. This takes only tens of milliseconds. EX-PFE3 VPC0 VPC1 VPC0 EX-PFE1 VPC1 VPC0 EX-PFE2 VPC1 24 Copyright 2012 Juniper Networks, Inc.

25 REDUCE DC NETWORK TCO WITH JUNIPER Typical Configuration Total List Price Rack Space Operating Systems (time to manage) 3000 servers, dual 1GbE attached Fully redundant design 25 Copyright 2012 Juniper Networks, Inc. Savings $$ $4.6M $9.6M Up to 52.1% CAPEX Power 372,169 kw*hr/yr 666,758 kw*hr/yr Up to 44.2% power 210 RU 450 RU Up to 55.3% space JUNOS IOS Up to 25% OPEX Juniper Solution EX 4200 top-of-rack (2/rack) EX 8208 in core 2 SRX Gbps firewall 10GE uplink from access and in core Cisco Solution Cat 4948 top-of-rack (2/rack) Cat 6500 in aggregation and core 46 FWSM Source: publicly available data sheets, price lists, Lake Partner study

26 CLOUD SECURITY 26 Copyright 2012 Juniper Networks, Inc. 26

27 THE DATACENTER CHALLENGE Of all orgs say 56% 54% 61% securing web traffic hacked through web is by far their biggest concern Of large orgs are apps Of security pros say next-generation security addresses only part of the problem Attacks have changed and security solutions have not adapted Next generation datacenter security Signature and IP/reputation blocking are inadequate Web application security solutions not solving the problem Continued DDoS attacks at scale not being stopped No intelligence sharing Traditional network security doesn t work in dynamic nature of cloud SDN security opportunity 27 Copyright 2012 Juniper Networks, Inc. Sources: Verizon DBIR Report 2012 and Ponemon Institute Report on Efficacy of Emerging Network Security 2013

28 STRATEGIC FOCUS AREAS Efficacy Security Intelligence Customer Experience Platform Independence 28 Copyright 2012 Juniper Networks, Inc.

29 常 見 的 虛 擬 網 路 防 禦 部 署 方 式 1. 透 由 VLAN 方 式 隔 離 2. 在 VM 中 安 裝 Agent Hypervisor 狀 態 層 防 火 牆 VM 透 由 VLAN 進 行 隔 離, 所 有 存 取 流 量 透 由 外 部 的 Firewall 進 行 封 包 過 濾 缺 點 : 複 雜 的 VLAN 網 路 設 定 兩 倍 網 路 流 量 需 求 管 理 成 本 高 VM1 VM2 VM3 在 每 個 VM 中 安 裝 單 機 版 軟 體 防 火 牆 缺 點 : 影 響 虛 擬 主 機 的 效 能 不 容 易 管 理 所 有 防 火 牆 設 定 管 理 成 本 高 VM1 VM2 VM3 所 有 VM 的 網 路 流 量 均 經 由 Firewall 保 護, 並 自 動 將 所 有 VM 進 行 網 路 分 段 及 隔 離 優 點 : 不 影 響 效 能 單 一 介 面 集 中 管 理 所 以 安 全 政 策 VM1 VM2 VM3 VS ESX Host VS ESX Host FW as Kernel Module ESX Host HYPERVISOR HYPERVISOR HYPERVISOR VS FW Agents 29 Copyright 2012 Juniper Networks, Inc. 29

30 CLOUD 資 安 解 決 方 案 虛 擬 主 機 安 全 防 護 透 過 JUNIPER VGW 防 火 牆 系 列 提 供 VM 虛 擬 主 機 與 虛 擬 主 機 之 間 連 接 與 傳 輸 VM1 VM2 VM3 vgw VS ESX Host Hypervisor 狀 態 層 防 火 牆 專 門 針 對 VMWare 虛 擬 化 進 行 防 護 30 Copyright 2012 Juniper Networks, Inc. 30

31 VGW 對 ESX 效 能 影 響 最 小 Unsecured ESX vgw FastPath Firewall 8750 Total Throughput (Mbps) Competitor Slowpath Firewall 5 VMs 10 VMs 15 VMs 20 VMs vgw secures ESX with only a 3% overhead 31 Copyright 2012 Juniper Networks, Inc.

32 VGW - THE HYPERVISOR-BASED 安 全 閘 道 全 球 第 一 家 提 供 Virtual Firewall, 擁 有 五 項 專 利 企 業 級 虛 擬 網 路 防 禦 通 過 VMware VMsafe Certified 有 效 保 護 VM and the hypervisor 容 錯 架 構 (i.e. HA) Virtual Center Security Design for VGW VM VM1 VM2 VM3 虛 擬 網 路 偵 測 功 能 Secure VMotion 擴 充 至 1,000+ ESX Auto Secure 自 動 偵 測 及 保 護 新 增 加 VM Partner Server (IDS, SIM, Syslog, Netflow) Packet Data THE vgw ENGINE ESX Host 多 層 次 縱 深 防 禦 具 備 Stateful firewall 及 IDS 功 能 彈 性 的 安 全 政 策 部 署 Zone, VM group, VM, Application, Port, Protocol, Security state VMWARE DVFILTER VMWARE VSWITCH HYPERVISOR ESX Kernal 32 Copyright 2012 Juniper Networks, Inc.

33 實 現 雲 端 網 路 安 全 Database SAP WWW Desktop Desktop vgw 4.5 vgw 4.5 ESX ESX Physical Security Devices 管 理 面 Physical Network - 視 覺 化 管 理 虛 擬 並 網 路 整 合 入 侵 偵 測 及 防 火 牆 功 能 - 單 一 管 理 介 面 統 一 管 理 VMs 的 安 全 存 取 政 策 具 備 高 網 路 存 取 效 能 - 整 合 Hypervisor Kernel 的 安 全 閘 道, 提 供 完 整 虛 擬 系 統 的 安 全 並 具 備 高 傳 輸 效 能 33 Copyright 2012 Juniper Networks, Inc.

34 VGW 主 要 功 能 視 覺 化 管 理 介 面 單 一 視 覺 化 儀 表 板 即 輕 鬆 管 理 vgw 所 有 功 能 六 大 主 要 功 能 Network VM 網 路 流 量 分 析 Firewall 防 火 牆 安 全 政 策 管 理 及 連 線 紀 錄 IDS 集 中 管 理 網 路 行 為 分 析 及 攻 擊 警 告 Introspection 分 析 所 有 VM 內 部 設 定 OS, Apps, HotFix, etc. Compliance Out-of-box, and ability to add rules and monitor VM compliance Reports 提 供 自 動 化 報 表 (all the functional modules) 34 Copyright 2012 Juniper Networks, Inc.

35 視 覺 化 管 理 介 面 單 一 介 面 管 理 所 有 VM 網 路 及 VM 設 定 落 實 網 路 存 取 政 策 動 態 調 整 網 路 存 取 黑 白 名 單 保 護 VM 內 部 系 統 設 定 集 中 安 全 政 策 管 理 所 有 網 路 存 取 流 量, 防 止 Malware 擴 散 並 自 動 調 整 因 VM 移 動 的 存 取 政 策 35 Copyright 2012 Juniper Networks, Inc.

36 網 路 存 取 控 制 設 定 介 面 36 Copyright 2012 Juniper Networks, Inc.

37 視 覺 化 - VM 內 部 應 用 程 式 狀 態 37 Copyright 2012 Juniper Networks, Inc.

38 視 覺 化 - 網 路 流 量 分 析 38 Copyright 2012 Juniper Networks, Inc.

39 INTEGRATED WITH JUNIPER DATA CENTER SECURITY VM1 VM2 VM3 ALTOR vgw Policies vgw VMware vsphere Zone Synchronization Traffic Mirroring to IPS Central Policy Management Firewall Event Syslogs Netflow for Inter-VM Traffic STRM Network Juniper EX Switch Juniper SRX with IDP 39 Copyright 2012 Juniper Networks, Inc.

40 EXECUTING ON THE STRATEGY Users Datacenters Security Intelligence Client Web Security Application Visibility IPS Firewall Internal Attack Protection Intrusion Deception Content Security Network Security Security Management 40 Copyright 2012 Juniper Networks, Inc.

41 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Juniper s Spotlight Secure global attacker database is a one-of-a-kind, cloud-based security solution that identifies specific attackers and delivers that intelligence to Junos security products Spotlight Attacker Database Spotlight Attacker Database WebApp Secure DDoS Secure SRX Series Services Gateways SRX Series Services Gateways 41 Copyright 2012 Juniper Networks, Inc.

42 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure Spotlight Attacker Database DDoS Secure Spotlight Attacker Database What it is Aggregates hacker profile information from global sources in a cloud-based database Distributes aggregated hacker profile information to global subscribers Why it s different High accuracy zero day attacker detection and threat mitigation Only solution to offer device-level hacker profiling service Can block a single device/attacker WebApp Secure SRX Series Services Gateways DDoS Secure 42 Copyright 2012 Juniper Networks, Inc. SRX Series Services Gateways

43 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure Spotlight Attacker Database What it is Continuously monitors web apps to stop hackers and botnets Collects forensic data on hacker device, location, and methods Continuously updates on-board hacker profile information Why it s different Accurate threat mitigation with near-zero false positives Hacker profile sharing for global protection surface Flexible deployment (i.e., appliance, VM, AWS) SRX Series Services Gateways DDoS Secure 43 Copyright 2012 Juniper Networks, Inc. SRX Series Services Gateways

44 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure DDoS Secure Spotlight Attacker Database What it is Large-scale DDoS attack mitigation Slow and low DDoS attack mitigation Zero-day protection via combination of behavioral and rules-based detection Why it s different Broadest protection with deployment ease Industry leading performance 40Gb throughput Ease of use through automated updating Flexible deployment (i.e., 1U appliance, VM) SRX Series Services Gateways 44 Copyright 2012 Juniper Networks, Inc. SRX Series Services Gateways

45 NEXT GENERATION DATACENTER SECURITY: SPOTLIGHT SECURE ATTACKER DATABASE WebApp Secure DDoS Secure Spotlight Attacker Database WebApp Secure DDoS Secure SRX Series Services Gateways SRX Series Services Gateways Spotlight Attacker Database 45 Copyright 2012 Juniper Networks, Inc. What it is Provides network security services WebApp Secure communicates attacker information to SRX upon detection of attempted breach SRX uses WebApp Secure intelligence about ongoing attack to block offending IP(s) Why it s different Only security provider to leverage hacker profile intelligence in network firewalling Provides large-scale web attack mitigation and web DDoS prevention Extends existing SRX capabilities with web DDoS mitigation

46

47 解 決 方 案 共 同 供 應 契 約 採 購 建 議 47 Copyright 2012 Juniper Networks, Inc. 47

48 ENTERPRISE CLOUD 規 劃 建 議 客 戶 若 要 規 劃 一 雲 端 資 料 中 心, 採 用 一 層 化 網 路 規 劃 環 境 需 求 : 需 40 埠 10G 網 路 介 面 及 48 埠 10/100/1000Base-T 網 路 介 面, 需 要 規 劃 一 層 化 網 路 架 構, 不 佔 用 網 路 埠, 建 議 規 劃 如 下 組 別 項 次 CTC 項 次 型 號 決 標 價 20% 1-49 有 網 管 10G 交 換 器 之 40 埠 10GBase-X( 支 援 IPv6) EX F-VC1-FB-TAA 842, 有 網 管 路 由 交 換 器 之 48 埠 10/100/1000Base-T( 具 10GBase-X)( 含 加 值 選 項 功 能 )( 支 援 IPv6) EX T-TAA EX-UM-2X4SFP 159, Copyright 2012 Juniper Networks, Inc. 48

49 Role Base Firewall 規 劃 建 議 規 劃 Role Base Firewall 需 包 含 下 列 主 要 產 品 解 決 方 案 第 三 組 SRX 安 全 路 由 閘 道 第 四 組 UAC 終 端 設 備 管 理 以 單 位 人 數 250 人 為 例, 若 客 戶 需 要 規 劃 Role Base Firewall 方 案, 防 火 牆 效 能 須 達 500Mbps 以 上 您 以 規 劃 建 議 的 解 決 方 案 內 容 : 組 別 項 次 CTC 項 次 3-29 防 火 牆 之 500Mbps( 含 加 值 選 項 功 能 )( 支 援 IPv6) 型 號 SRX240H-TAA(1 Set) SRX-RAC-5-LTU 決 標 價 % 4-27 終 端 電 腦 網 路 存 取 控 制 之 250 台 IC4500 IC4500-ADD-250E 260, Copyright 2012 Juniper Networks, Inc. 49

50 BYOD 規 劃 建 議 規 劃 SSLVPN+BYOD 需 包 含 下 列 主 要 產 品 解 決 方 案 第 四 組 UAC 終 端 設 備 管 理 第 四 組 SSLVPN 網 路 認 證 若 您 協 助 客 戶 規 劃 1000 人 SSLVPN 遠 端 認 證 並 需 要 規 劃 250U BYOD 解 決 方 案 您 以 規 劃 建 議 的 解 決 方 案 內 容 : 組 別 項 次 4-43 網 路 認 證 閘 道 之 1000 人 CTC 項 次 型 號 決 標 價 MAG4610 ACCESSX600-ADD-1000U 1,279,318 20% 4-27 終 端 電 腦 網 路 存 取 控 制 之 250 台 IC4500 IC4500-ADD-250E 260, Copyright 2012 Juniper Networks, Inc. 50

51 為 何 選 擇 JUNIPER 51 Copyright 2012 Juniper Networks, Inc. 51

52 進 口 品 牌 的 功 能 及 品 質, 貼 近 國 產 交 換 器 的 價 格 組 別 項 次 品 名 Juniper D-Link 1-24 有 網 管 交 換 器 之 24 埠 10/100/1000Base-T( 含 加 值 選 項 功 能 ) ( 支 援 IPv6) EX T-4G-TAA DGS TC(EI) 項 次 更 多 且 產 品 完 整, 滿 足 不 同 專 案 規 劃 需 要 ( 去 年 69 項, 本 標 83 項 ) 第 一 組 交 換 器 第 一 組 路 由 器 第 三 組 防 火 牆 / 防 毒 牆 第 四 組 存 取 控 管 / 認 證 閘 道 專 案 報 備 系 統 化, 自 動 追 蹤 報 備 處 理 進 度, 提 升 報 備 時 效 及 專 案 保 護 力 52 Copyright 2012 Juniper Networks, Inc.

53 如 何 透 過 JUNIPER 創 造 更 多 利 潤? 參 加 Juniper 台 灣 區 新 認 證 夥 伴 計 劃 您 只 需 要 參 加 Juniper 所 舉 辦 的 新 認 證 夥 伴 計 劃 並 成 為 Juniper Select/Elite Partner, 就 以 取 得 更 好 的 利 潤!! ( 請 填 妥 J-Partner 申 請 表, 並 交 給 現 場 服 務 同 仁 ) 以 網 路 解 決 方 案 之 方 式 銷 售 Juniper 系 列 產 品 53 Copyright 2012 Juniper Networks, Inc.

54

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNIPER One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net 2-3-7: JUNIPER S BUSINESS STRATEGY 2 Customer Segments 3 Businesses Service

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

RETHINK SECURITY FOR UNKNOWN ATTACKS

RETHINK SECURITY FOR UNKNOWN ATTACKS 1 Copyright 2012 Juniper Networks, Inc. www.juniper.net RETHINK SECURITY FOR UNKNOWN ATTACKS John McCreary Security Specialist, Juniper Networks AGENDA 1 2 3 Introduction 5 minutes Security Trends 5 minutes

More information

AN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD

AN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD White Paper AN INTEGRATED SECURITY SOLUTION FOR THE VIRTUAL DATA CENTER AND CLOUD Protecting Physical and Virtual Workloads Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD. Debbie Montano, Chief Architect dmontano@juniper.net

NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD. Debbie Montano, Chief Architect dmontano@juniper.net NETWORKING FOR DATA CENTER CONVERGENCE, VIRTUALIZATION & CLOUD Debbie Montano, Chief Architect dmontano@juniper.net DISCLAIMER This statement of direction sets forth Juniper Networks current intention

More information

EVOLVED DATA CENTER ARCHITECTURE

EVOLVED DATA CENTER ARCHITECTURE EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper

More information

Simplifying the Data Center Network to Reduce Complexity and Improve Performance

Simplifying the Data Center Network to Reduce Complexity and Improve Performance SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,

More information

Protecting Physical and Virtual Workloads

Protecting Physical and Virtual Workloads WHITE PAPER An Integrated Security Solution for the Virtual Data Center and Cloud Protecting Physical and Virtual Workloads Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

You can t build a new future on old technologies Juniper Networks. Enabling the Hi-IQ network of tomorrow

You can t build a new future on old technologies Juniper Networks. Enabling the Hi-IQ network of tomorrow You can t build a new future on old technologies Juniper Networks Enabling the Hi-IQ network of tomorrow Aligning business and IT strategy Agility and Economics Driving IT Transformation 0 0 1 0 0 0 0

More information

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc. White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario... APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center

More information

How Network Virtualization can improve your Data Center Security

How Network Virtualization can improve your Data Center Security How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA gchekroun@vmware.com 2014 VMware Inc. All rights reserved. Security IT spending Security spending is

More information

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe JUNIPER AND SDN IN THE NEWS 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net WHY DO WE NEED SOFTWARE

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3

More information

ENABLING THE PRIVATE CLOUD - THE NEW DATA CENTER NETWORK. David Yen EVP and GM, Fabric and Switching Technologies Juniper Networks

ENABLING THE PRIVATE CLOUD - THE NEW DATA CENTER NETWORK. David Yen EVP and GM, Fabric and Switching Technologies Juniper Networks ENABLING THE PRIVATE CLOUD - THE NEW DATA CENTER NETWORK David Yen EVP and GM, Fabric and Switching Technologies Juniper Networks Services delivered over the Network Dynamically shared resource pools Application

More information

SOLUTIONS FOR DEPLOYING SERVER VIRTUALIZATION IN DATA CENTER NETWORKS

SOLUTIONS FOR DEPLOYING SERVER VIRTUALIZATION IN DATA CENTER NETWORKS WHITE PAPER SOLUTIONS FOR DEPLOYING SERVER VIRTUALIZATION IN DATA CENTER NETWORKS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

Juniper Solutions for Turnkey, Managed Cloud Services

Juniper Solutions for Turnkey, Managed Cloud Services Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge

More information

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS pgeenens@juniper.net BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

LAYER3 HELPS BUILD NEXT GENERATION, HIGH-SPEED, LOW LATENCY, DATA CENTER SOLUTION FOR A LEADING FINANCIAL INSTITUTION IN AFRICA.

LAYER3 HELPS BUILD NEXT GENERATION, HIGH-SPEED, LOW LATENCY, DATA CENTER SOLUTION FOR A LEADING FINANCIAL INSTITUTION IN AFRICA. - LAYER3 HELPS BUILD NEXT GENERATION, HIGH-SPEED, LOW LATENCY, DATA CENTER SOLUTION FOR A LEADING FINANCIAL INSTITUTION IN AFRICA. Summary Industry: Financial Institution Challenges: Provide a reliable,

More information

JUNIPER NETWORKS CLOUD SECURITY

JUNIPER NETWORKS CLOUD SECURITY White Paper JUNIPER NETWORKS CLOUD SECURITY Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction Cloud Computing Overview...3 Private Cloud... 4 Public Cloud...

More information

SECURING THE DATACENTER

SECURING THE DATACENTER SECURING THE DATACENTER CAIO KLEIN SEGURINFO 2014 1 Copyright 2013 Juniper Networks, Inc. SECURITY AT JUNIPER Customer segments Service providers, enterprise Business segments Routing, switching, security

More information

Juniper Networks QFabric: Scaling for the Modern Data Center

Juniper Networks QFabric: Scaling for the Modern Data Center Juniper Networks QFabric: Scaling for the Modern Data Center Executive Summary The modern data center has undergone a series of changes that have significantly impacted business operations. Applications

More information

Proactively Secure Your Cloud Computing Platform

Proactively Secure Your Cloud Computing Platform Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud

More information

Palo Alto Networks. Security Models in the Software Defined Data Center

Palo Alto Networks. Security Models in the Software Defined Data Center Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling

More information

DATA CENTER LAN MIGRATION GUIDE

DATA CENTER LAN MIGRATION GUIDE DATA CENTER LAN MIGRATION GUIDE Table of Contents Chapter 1: Why Migrate to Juniper... 5 Introduction to the Migration Guide... 6 Audience... 6 Data Center Architecture and Guide Overview... 6 Why Migrate?...

More information

How To Extend Security Policies To Public Clouds

How To Extend Security Policies To Public Clouds What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their

More information

SECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer

SECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer SECURE THE DATACENTER Dennis de Leest Sr. Systems Engineer PURE PLAY IN HIGH-PERFORMANCE NETWORKING Breadth First 10 Years of Today s Of Juniper: Portfolio 1996-2006 Core Edge Access & Data Center WAN

More information

White Paper. Network Simplification with Juniper Networks Virtual Chassis Technology

White Paper. Network Simplification with Juniper Networks Virtual Chassis Technology Network Simplification with Juniper Networks Technology 1 Network Simplification with Juniper Networks Technology Table of Contents Executive Summary... 3 Introduction... 3 Data Center Network Challenges...

More information

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive

More information

Simplify the Data Center with Junos Fusion

Simplify the Data Center with Junos Fusion Simplify the Data Center with Junos Fusion Juniper Networks Fabric Technology 1 Table of Contents Executive Summary... 3 Introduction: Network Challenges in the Data Center... 3 Introducing Juniper Networks

More information

The Advantages of Cloud Services

The Advantages of Cloud Services Cloud-Based Services: Assure Performance, Availability, and Security What You Will Learn Services available from the cloud offer cost and efficiency benefits to businesses, but until now many customers

More information

Next Steps Toward 10 Gigabit Ethernet Top-of-Rack Networking

Next Steps Toward 10 Gigabit Ethernet Top-of-Rack Networking Next Steps Toward 10 Gigabit Ethernet Top-of-Rack Networking Important Considerations When Selecting Top-of-Rack Switches table of contents + Advantages of Top-of-Rack Switching.... 2 + How to Get from

More information

Juniper Unite Cloud-Enabled Enterprise Reference Architecture

Juniper Unite Cloud-Enabled Enterprise Reference Architecture Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.

More information

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS White Paper ALTERNATIVES FOR SECURING VIRTUAL NETWORKS A Different Network Requires a Different Approach Extending Security to the Virtual World Copyright 2013, Juniper Networks, Inc. 1 Table of Contents

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

NEC s Juniper Technology Brief Issue 2

NEC s Juniper Technology Brief Issue 2 NEC s Juniper Technology Brief Issue 2 Inside This Issue: Juniper s New SPACE Solutions, Datacentre, Services and Switches Product Releases For further information email info@nec.co.nz or visit www.nec.co.nz

More information

vsrx Services Gateway: Protecting the Hybrid Data Center

vsrx Services Gateway: Protecting the Hybrid Data Center Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud

More information

NETWORK AUTOMATION AND ORCHESTRATION

NETWORK AUTOMATION AND ORCHESTRATION White Paper NETWORK AUTOMATION AND ORCHESTRATION Building an Agile Data Center Infrastructure with Juniper Networks Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

STORMY WEATHER SECURING CLOUD COMPUTING. Russell Skingsley Director of Advanced Technology Data Centre and Cloud, APAC Juniper Networks

STORMY WEATHER SECURING CLOUD COMPUTING. Russell Skingsley Director of Advanced Technology Data Centre and Cloud, APAC Juniper Networks STORMY WEATHER SECURING CLOUD COMPUTING Russell Skingsley Director of Advanced Technology Data Centre and Cloud, APAC Juniper Networks DISCLAIMER These are not necessarily the views of Juniper Networks

More information

Product Description. Product Overview

Product Description. Product Overview DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their

More information

SECURE CLOUD CONNECTIVITY FOR VIRTUAL PRIVATE NETWORKS

SECURE CLOUD CONNECTIVITY FOR VIRTUAL PRIVATE NETWORKS White Paper SECURE CLOUD CONNECTIVITY FOR VIRTUAL PRIVATE NETWORKS Next-Generation Virtualized Managed Services for the Enterprise with Secure-on-Network Links to the Copyright 2014, Juniper Networks,

More information

HP FlexNetwork and IPv6

HP FlexNetwork and IPv6 HP FlexNetwork and IPv6 Miha Petrač ESSN HP Networking presales 25.1.2012 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Magic Quadrant:

More information

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two

More information

Front cover. Build a Smarter Data Center with Juniper Networks QFabric. Redguides for Business Leaders

Front cover. Build a Smarter Data Center with Juniper Networks QFabric. Redguides for Business Leaders Front cover Build a Smarter Data Center with Juniper Networks QFabric Redguides for Business Leaders Bill White Hoi T Hon Stephen Sauer Raymund Schuenke Understand the limitations of traditional data center

More information

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT BROCADE SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT Rajesh Dhople Brocade Communications Systems, Inc. rdhople@brocade.com 2012 Brocade Communications Systems, Inc. 1 Why can t you do these things

More information

CLOUD IS THE NEW COMPUTER

CLOUD IS THE NEW COMPUTER CLOUD IS THE NEW COMPUTER THE NEW TERMINAL-MAINFRAMES P L AT F O R M CLIENT-SERVER APP-CLOUD ENTERPRISE IT TRANSFORMATION THE CLOUD JOURNEY: 1. Eliminate infrastructure with public SaaS/PaaS 2. Flexible

More information

Architecting Security for the Private Cloud. Todd Thiemann

Architecting Security for the Private Cloud. Todd Thiemann Architecting Security for the Private Cloud Todd Thiemann Classification 4/9/2010 Copyright 2009 Trend Micro Inc. 1 The Evolving Datacenter Lowering Costs, Increasing Flexibility Public Cloud Private Cloud

More information

Analysis of Network Segmentation Techniques in Cloud Data Centers

Analysis of Network Segmentation Techniques in Cloud Data Centers 64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology

More information

The Global Attacker Security Intelligence Service Explained

The Global Attacker Security Intelligence Service Explained White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed

More information

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015 Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?

More information

IT SECURITY SEMINAR "STALLION 141113" Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen

IT SECURITY SEMINAR STALLION 141113 Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen IT SECURITY SEMINAR "STALLION 141113" Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen JUNIPER TODAY 2012 Revenue: $4.4 Billion Global Presence: Offices In 47 Countries +9000

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track** Course: Duration: Price: $ 4,295.00 Learning Credits: 43 Certification: Implementing and Troubleshooting the Cisco Cloud Infrastructure Implementing and Troubleshooting the Cisco Cloud Infrastructure**Part

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery

IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the

More information

How To Secure Your Network With Juniper Networks

How To Secure Your Network With Juniper Networks SECURITY SERVICES GATEWAYS PRODUCT CATEGORY BROCHURE Integrated Strong Security for Enterprise Data Center and Branch, Service Provider Infrastructure, and Cloud Deployments As threats to the network grow

More information

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN

More information

How To Build A Software Defined Data Center

How To Build A Software Defined Data Center Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware

More information

Securing the Virtualized Data Center With Next-Generation Firewalls

Securing the Virtualized Data Center With Next-Generation Firewalls Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service

More information

THE OPPORTUNITY IN DATA CENTER. 1 Copyright 2014 Juniper Networks, Inc.

THE OPPORTUNITY IN DATA CENTER. 1 Copyright 2014 Juniper Networks, Inc. THE OPPORTUNITY IN DATA CENTER 1 DATA CENTER NETWORK TAM BY PRODUCT AREA Data Center Network TAM USD Billions High End FW FW IDP/IPS Secure Routers Routing Core & Agg Switches 11.2 1.0 0.8 0.9 3.3 10%

More information

Juniper Update Enabling New Network Architectures. Debbie Montano Chief Architect, Gov t, Edu & Medical dmontano@juniper.

Juniper Update Enabling New Network Architectures. Debbie Montano Chief Architect, Gov t, Edu & Medical dmontano@juniper. Juniper Update Enabling New Network Architectures Debbie Montano Chief Architect, Gov t, Edu & Medical dmontano@juniper.net Feb 1, 2010 DISCLAIMER This statement of direction sets forth Juniper Networks

More information

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,

More information

VMware vshield App Design Guide TECHNICAL WHITE PAPER

VMware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications

More information

Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack

Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack Dave Tucker Hewlett-Packard April 2013 1 About Me Dave Tucker WW Technical Marketing HP Networking dave.j.tucker@hp.com Twitter:

More information

SDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków

SDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his

More information

Software Defined Network (SDN)

Software Defined Network (SDN) Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario

More information

Data Center Security That Accelerates Your Business

Data Center Security That Accelerates Your Business Solution Overview Data Center Security That Accelerates Your Business Business today runs at a breakneck pace. Customers want exceptional service, and workers expect instant access to their job tools,

More information

Virtual Firewalls. Ivan Pepelnjak (ip@ioshints.info) NIL Data Communications

Virtual Firewalls. Ivan Pepelnjak (ip@ioshints.info) NIL Data Communications Virtual Firewalls Ivan Pepelnjak (ip@ioshints.info) NIL Data Communications Who is Ivan Pepelnjak (@ioshints) Networking engineer since 1985 Focus: real-life deployment of advanced technologies Chief Technology

More information

Introduction to Junos Space Network Director

Introduction to Junos Space Network Director Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Use Case Brief NETWORK SECURITY

Use Case Brief NETWORK SECURITY Use Case Brief NETWORK SECURITY As Datacenter architectures have incorporated virtualization, new application topologies, and new programming constructs such as Docker Containers, new security gaps have

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Junos Space Virtual Control

Junos Space Virtual Control Proiduct Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these virtual network elements in conjunction

More information

vcloud Suite Architecture Overview and Use Cases

vcloud Suite Architecture Overview and Use Cases vcloud Suite Architecture Overview and Use Cases vcloud Suite 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on

More information

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent

More information

The Future of Computing Cisco Unified Computing System. Markus Kunstmann Channels Systems Engineer

The Future of Computing Cisco Unified Computing System. Markus Kunstmann Channels Systems Engineer The Future of Computing Cisco Unified Computing System Markus Kunstmann Channels Systems Engineer 2009 Cisco Systems, Inc. All rights reserved. Data Centers Are under Increasing Pressure Collaboration

More information

VMware NSX A Perspective for Service Providers part 2

VMware NSX A Perspective for Service Providers part 2 VMware NSX A Perspective for Service Providers part 2 Using Software Defined Networking to harden DC security controls Trevor Gerdes Strategic Architect Security and Networks NSX for SPs Part 2 - Agenda

More information

SDN van start naar finish

SDN van start naar finish SDN van start naar finish Ralph Wanders Datacenter Solutions Manager Rick Mur Senior System Engineer Juniper Networks IT SECURITY IS TOPSPORT! Beperkingen datacenter architecturen! Agility/Netwerk virtualisatie!

More information

vsphere 6.0 Advantages Over Hyper-V

vsphere 6.0 Advantages Over Hyper-V v3c Advantages Over Hyper-V The most trusted and complete virtualization platform 2015 Q1 2015 VMware Inc. All rights reserved. The Most Trusted Virtualization Platform Hypervisor Architecture Broad Support

More information

Software Defined Environments

Software Defined Environments November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements

More information

Limiting the Spread of Threats: A Data Center for Every User

Limiting the Spread of Threats: A Data Center for Every User SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware Why do breaches still

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

CoIP (Cloud over IP): The Future of Hybrid Networking

CoIP (Cloud over IP): The Future of Hybrid Networking CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical

More information

Security Services Gateways PRODUCT CATEGORY BROCHURE

Security Services Gateways PRODUCT CATEGORY BROCHURE Security Services Gateways PRODUCT CATEGORY BROCHURE Integrated Strong Security for Data Center, Campus, Branch and Cloud Deployments As threats to the network grow more prevalent and destructive, securing

More information

IMPLEMENTING VMWARE SERVER VIRTUALIZATION ON JUNIPER NETWORKS INFRASTRUCTURE

IMPLEMENTING VMWARE SERVER VIRTUALIZATION ON JUNIPER NETWORKS INFRASTRUCTURE IMPLEMENTATION GUIDE IMPLEMENTING VMWARE SERVER VIRTUALIZATION ON JUNIPER NETWORKS INFRASTRUCTURE Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks

More information

Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION

Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION Cloud Management Software can coordinate and automate server, network, and storage operations within the modern datacenter. This brief describes how

More information

Delivering Unprecedented Innovation to Create Flexible Virtual Environments

Delivering Unprecedented Innovation to Create Flexible Virtual Environments Delivering Unprecedented Innovation to Create Flexible Virtual Environments Cisco and Vmware Virtualizing the Data Center Maximize IT Productivity while Lowering Capital and Operating Costs 2010 Cisco

More information

BUILDING A NEXT-GENERATION DATA CENTER

BUILDING A NEXT-GENERATION DATA CENTER BUILDING A NEXT-GENERATION DATA CENTER Data center networking has changed significantly during the last few years with the introduction of 10 Gigabit Ethernet (10GE), unified fabrics, highspeed non-blocking

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information