SA SERIES SSL VPN APPLIANCES. June 2010 Fabio Melchert Channel Director Juniper Networks Brazil



Similar documents
SHA-256 IAB Q&A. February 2011

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Best Practices for Secure Mobile Access

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

Secure, Mobile Access to Corporate , Applications, and Intranet Resources

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

PRODUCT CATEGORY BROCHURE

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

I d like our employees to be able to access all the files in our network that are important to them anywhere and anytime. Simply and securely.

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

How To Get A Cloud Service For A Small Business

Mobile Access Software Blade

Best Practices for Secure Remote Access. Aventail Technical White Paper

Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs

SSL VPN Client Installation Guide Version 9

WatchGuard: Your Security Partner of Choice. Carlos Vieira

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

Remote Zugang, sicher und einfach

The BiGuard SSL VPN Appliances

SA Series SSL VPN Virtual Appliances

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

SECURING TODAY S MOBILE WORKFORCE

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Your Security Partner of Choice

FEATURE. THE RISE OF SSL VPNS by Ian Kilpatrick, chairman Wick Hill Group. Summary of feature words. * Recent growth of SSL VPNs

COORDINATED THREAT CONTROL

BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE

2003, Rainbow Technologies, Inc.

Juniper Networks Solution Portfolio for Public Sector Network Security

Astaro Gateway Software Applications

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Robson Communications Hosted Exchange Whitepaper

How To Configure SSL VPN in Cyberoam

Remote Access Protection

Juniper Networks VPN Decision Guide

RSA SecurID Two-factor Authentication

Juniper Networks Solution Portfolio for Public Sector Network Security

Check Point Positions

Network protection and UTM Buyers Guide

What the Experts Say

Dell SonicWALL Portfolio

NATIONAL GATEWAY SECURITY SURVEY

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Protecting Network Infrastructure. Mobile Workers. Florian Malecki - SonicWALL EMEA Enterprise Product Marketing Manager

SSL-Based Remote-Access VPN Solution

Boston Area Windows Server User Group April 2010

Managing the Network Infrastructure: A Peer-to-Peer Look at Trends and Challenges

WHITEPAPER IPSEC VPN Vs. SSL VPN

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Securing the Small Business Network. Keeping up with the changing threat landscape

Citrix Access Gateway

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

Secure Remote Access Give users in office remote access anytime, anywhere

The Remote Access Imperative in Disaster Recovery

SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN

Chris Boykin VP of Professional Services

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.

Network Security. Intertech Associates, Inc.

PULSE SECURE FOR GOOGLE ANDROID

The Cisco ASA 5500 as a Superior Firewall Solution

Technical papers Virtual private networks

6/5/2013 BYOD. About Sikich. Mobility Statistics. Mobility Makes BYOD Possible. Introduction. BYOD: Getting the Most Out of Your Technology

S. No. Type of Information Document Data. Date Version Nature of Change Author. Referred Policies, Procedures & Forms

Secure Authentication Managed Service Portfolio

Cisco ASA 5500 Series VPN Edition

Proven LANDesk Solutions

Cisco Small Business ISA500 Series Integrated Security Appliances

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Hit Hanan & Faisal Faruqi Nexscience

IPCOM S Series Functions Overview

Integrated Services Router with the "AIM-VPN/SSL" Module

Internet Content Provider Safeguards Customer Networks and Services

Using Entrust certificates with VPN

Mobile device Management mit NAC

Web Application Security

SSL VPN Management Guide Version 10

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Top 10 Reasons Enterprises are Moving Security to the Cloud

Market Application Delivery Networking. Products ADC, WAN Optimization, Secure Access

24 y 25 Octubre 2011

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Protecting Your Roaming Workforce With Cloud-Based Security

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

introducing The BlackBerry Collaboration Service

s Software as a Service (SaaS) offering: T-Suite Making your hard costs soft

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

The ForeScout Difference

Embracing Complete BYOD Security with MDM and NAC

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Solution Brief. Secure and Assured Networking for Financial Services

Transcription:

SA SERIES SSL VPN APPLIANCES June 2010 Fabio Melchert Channel Director Juniper Networks Brazil

Reconhecimento de Mercado 2008 Gartner Magic Quadrant for SSL VPN 2009 Magic Quadrant Key Takeaways: Juniper has maintained the product vision, execution and overall momentum so effectively that it has held a leadership position continuously unchallenged disruptive sales advantage Juniper is the No. 1 competitive threat Year after year, Juniper's products earn a high satisfaction rating http://www.gartner.com/technology/media-products/reprints/juniper/vol6/article1/article1.html Source: Gartner (October 2009) 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net

Líder de Mercado em SSL VPN Juniper maintains #1 market share position worldwide Leader since SSL VPN product category inception Source: 1Q10 Infonetics Research Network Security Appliances and Software Report 3 Copyright 2010 Juniper Networks, Inc. www.juniper.net

A solução: JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Secure SSL access to remote users from any device or location Mobile User Cafe Easy access from Web-browsers no client software to manage SA6500 VoIP Teleworker Dynamic, granular access control to manage users and resources Single comprehensive solution to access various application types from various devices available Business Partner or Customer Wireless User Airport Kiosk User 4 Copyright 2010 Juniper Networks, Inc. www.juniper.net

Prêmios e Reconhecimentos da Indústria Award Winning 3 rd Party Certified Market Leading Market share leader & proven solution with over 30,000 customers 5 Copyright 2010 Juniper Networks, Inc. www.juniper.net

#1 Acesso remoto a baixo custo operacional SA6500 Employees with Mobile Devices Employees with Corporate Laptops Employees with Home PCs Internet Router Firewall Corporate Intranet Server Email Server Increased Productivity Anytime, anywhere access from any device No endpoint software to install or manage Easy access facilitated from common browsers Increased Security Encrypted secure access to corporate resources Granular access control Comprehensive endpoint security enforcement 6 Copyright 2010 Juniper Networks, Inc. www.juniper.net

#2 Portais para Extranet com elevada segurança SA6500 Suppliers Customers Partners Firewall Corporate Intranet Web Client/Serer Internet Router Administrative ease of use Easier management of authorized users No client software enforced on external users Access enabled from any Web-enabled device Enforcement of corporate security policies Granular access to select applications or resources Endpoint security enforced before granting access No administrative hassle of managing users devices 7 Copyright 2010 Juniper Networks, Inc. www.juniper.net

#3 Continuidade de Negócios em caso de emergências SA6500 Partners Customers Corporate Intranet Server Employees Internet Router Firewall Email Server Web Unplanned Events That Could Impact Business Continuity: Hurricane, Snowstorm, Strike, Virus Outbreak, Terrorist Attack Continued Business Operations High remote access demand during emergency Simple scalability to increased demand Sustain access for partners and customers Increased Productivity Enable users to work from home or any location Assure employees safety Minimize downtime 8 Copyright 2010 Juniper Networks, Inc. www.juniper.net

#4 Acesso de dispositivos móveis e smartphones SA6500 iphone Firewall Corporate Intranet Email Server Internet Router Server Improved Ease of Use, Higher Productivity Access from any mobile device ActiveSync facilitates secure access to Exchange Enforce mobile device integrity and security 9 Copyright 2010 Juniper Networks, Inc. www.juniper.net

Um único dispositivo para múltiplos grupos de usuários Políticas e experiência de uso customizáveis para diferentes perfis partners.company.com Partner Role Authentication Host Check Access Username/Password Enabled Any AV, PFW Core Clientless MRP, Quote Tool employees.company.com SA Series Employee Role Authentication Host Check Access OTP or Certificate Enabled Any AV, PFW Core + Network Connect L3 Access to Apps customers.company.com Customer Role Authentication Host Check Access Username/Password Enabled Any AV, PFW Core Clientless Support Portal, Docs 10 Copyright 2010 Juniper Networks, Inc. www.juniper.net

Breadth of Functionality FAMILIA JUNIPER DE APPLIANCES SSL VPN Options/upgrades: 10-25 conc. users Core Clientless Access Network & Security Manager (NSM) Options/upgrades: 25-100 conc. users Secure Meeting Cluster Pairs NSM Options/upgrades: 50-1000 conc. users Secure Meeting Instant Virtual System SSL Acceleration Cluster Pairs NSM Options/upgrades: Up to 30K conc. users Secure Meeting Instant Virtual System 4-port SFP card 2 nd power supply or DC power supply Multi-Unit Clusters NSM SA700 Designed for: SMEs Secure remote access Includes: Network Connect SA2500 Designed for: Medium enterprise Secure remote, intranet and extranet access Includes: Core Clientless Access SA4500 Designed for: Medium to large enterprise Secure remote, intranet and extranet access Includes: Core Clientless Access SA6500 Designed for: Large enterprises & SPs Secure remote, intranet and extranet access Includes: Core Clientless Access SSL acceleration Hot swap drives, fans Enterprise Size All models are Common Criteria EAL3+ certified: http://www.dsd.gov.au/infosec/evaluation_services/epl/network_security/juniper_networks_saf.html 11 Copyright 2010 Juniper Networks, Inc. www.juniper.net