Moving Towards An Adaptive, Intelligent Firewall



Similar documents
Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age

FIREWALL INTELLIGENCE. 1 Copyright 2014 Juniper Networks, Inc.

Evolution to Virtual and Highly Scalable Platforms

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc.

Secure Cloud-Ready Data Centers Juniper Networks

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

EVOLVED DATA CENTER ARCHITECTURE

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

RETHINK SECURITY FOR UNKNOWN ATTACKS

The Global Attacker Security Intelligence Service Explained

Q1 Labs Corporate Overview

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

Junos WebApp Secure (formerly Mykonos)

Business Values of Network and Security Virtualization

What is Security Intelligence?

Next Generation IPS and Reputation Services

The Next Generation of Security Leaders

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Juniper Care Plus Services

The Evolution of Application Monitoring

Spotlight Secure. Spotlight Secure Connector Getting Started Guide. Modified: Copyright 2015, Juniper Networks, Inc.

<Insert Picture Here> Oracle Identity And Access Management

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

NEC s Juniper Technology Brief Issue 2

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Managing the Challenges of Cloud Management November 7, 2013

05.0 Application Development

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Symantec Consulting Services

IBM QRadar Security Intelligence April 2013

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

SOFTWARE DEFINED NETWORKING

PULSE SECURE CARE PLUS SERVICES

Netzwerkvirtualisierung? Aber mit Sicherheit!

Juniper Solutions for Turnkey, Managed Cloud Services

Payment Card Industry Data Security Standard

Delivering Managed Services Using Next Generation Branch Architectures

Find the needle in the security haystack

SWOT Assessment: FireMon Security Manager Suite v7.0

AGENDA. 資 訊 網 路 發 展 趨 勢 Juniper Cloud Solution Cloud Security 解 決 方 案 共 同 供 應 契 約 採 購 建 議 為 何 選 擇 Juniper

Introduction to the Junos Operating System

Nexum Training Course Catalog

IT SECURITY SEMINAR "STALLION " Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen

Learning objectives for today s session

Data Masking Best Practices

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Juniper Networks Certified Associate Junos Bootcamp, IJOS and JRE (JNCIA-Junos BC)

Citrix XenServer 7 Feature Matrix

Modular Network Security. Tyler Carter, McAfee Network Security

Key Strategies for Long-Term Success

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Think like an MBA not a CISSP

Mobile Security and Management Opportunities for Telcos and Service Providers

Implementation Guide. Juniper Networks SRX Series Services Gateways/ Websense V10000 G2 appliance. v7.6

Unified Threat Management, Managed Security, and the Cloud Services Model

JUNOS SPACE SECURITY DIRECTOR

AppGuard. Defeats Malware

Sophos Acquires Cyberoam

Sophos Roadshow. Complete Security Vision

SDN PARTNER INTEGRATION: SANDVINE

Customer Benefits Through Automation with SDN and NFV

Changing the Enterprise Security Landscape

IBM Internet Security Systems products and services

Managed Application Services

From the Bottom to the Top: The Evolution of Application Monitoring

FireMon Security Manager Fact Sheet

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Proactively Secure Your Cloud Computing Platform

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Managed Security Services Portfolio

2012 North American Managed Security Service Providers Growth Leadership Award

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

Secure Cloud Computing

Enterprise Security and Risk Management

North American Electric Reliability Corporation (NERC) Cyber Security Standard

HP and netforensics Security Information Management solutions. Business blueprint

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Transcription:

SECURELY ENABLING BUSINESS Moving Towards An, Rebecca Lawson Senior Director of Product Marketing, Juniper Networks Tom Schmatz VP of Partner Development, FishNet Security

Stateful inspection NAT Routing

App aware User aware Content aware (UTM) Stateful inspection NAT Routing

App aware User aware natures Active Directory Content aware (UTM) Stateful inspection NAT Routing

App aware User aware Content aware (UTM) Threat Intel Stateful inspection NAT Routing

Security Director Policy Mgmt Junos Space SRX Series Gateways -

Security Director Policy Mgmt RBAC UTM Logging Reporting Junos Space SRX Series Gateways - AppSecure AppID 2.0

Security Director Policy Mgmt RBAC UTM Logging Reporting Junos Space Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 SRX Series Gateways - AppSecure AppID 2.0

Spotlight Secure Attacker IDs WebApp Secure Security Director Policy Mgmt RBAC UTM Logging Reporting Junos Space Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 SRX Series Gateways - AppSecure AppID 2.0

Spotlight Secure Attacker IDs WebApp Secure Intelligence Platform Security Director Policy Mgmt RBAC UTM Logging Reporting Junos Space Spotlight Connector Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 SRX Series Gateways - AppSecure AppID 2.0 - Intelligence System Security Intelligence policies address groups

Spotlight Secure Attacker IDs Command & Control WebApp Secure Intelligence Platform Security Director Policy Mgmt RBAC UTM Logging Reporting Junos Space Spotlight Connector Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 SRX Series Gateways - AppSecure AppID 2.0 - Intelligence System Security Intelligence policies address groups

Spotlight Secure Attacker IDs Command & Control GeoIP WebApp Secure Intelligence Platform Security Director Policy Mgmt RBAC UTM Logging Reporting Junos Space Spotlight Connector Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 SRX Series Gateways - AppSecure AppID 2.0 - Intelligence System Security Intelligence policies address groups

Spotlight Secure Attacker IDs Command & Control GeoIP Security Director WebApp Secure Intelligence Platform Custom Data Feeds Personalized Government Industry Policy Mgmt RBAC UTM Logging Reporting Junos Space Spotlight Connector Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 SRX Series Gateways - AppSecure AppID 2.0 - Intelligence System Security Intelligence policies address groups

Spotlight Secure Attacker IDs Command & Control GeoIP Additional Intelligence Security Director WebApp Secure Intelligence Platform Custom Data Feeds Personalized Government Industry Policy Mgmt RBAC UTM Logging Reporting Junos Space Spotlight Connector Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 SRX Series Gateways - AppSecure AppID 2.0 - Intelligence System Security Intelligence policies address groups

Intelligence platform differentiators Spotlight Secure Unique intelligence sources Attacker IDs Command & Control GeoIP Additional Intelligence Adaptable, fine grain controls Security Director Policy Mgmt RBAC UTM Logging Reporting WebApp Secure Junos Space Intelligence Platform Spotlight Connector Open data model Custom Data Feeds Personalized Government Industry Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 High capacity Scalable SRX Series Gateways - AppSecure AppID 2.0 - Intelligence System Security Intelligence policies address groups

SRX differentiators Attacker IDs Spotlight Secure Command & Control GeoIP Additional Intelligence Keeps up with the threat rate of change Centralized management control, 1:n Open, programmable (automation) Security Director Policy Mgmt RBAC UTM Logging Reporting WebApp Secure Junos Space Intelligence Platform Spotlight Connector Scalability Custom Data Feeds Personalized Government Industry Firefly Perimeter (virtual SRX) - AppSecure - AppID 2.0 Breadth of form factor, use case SRX Series Gateways - AppSecure AppID 2.0 - Intelligence System Security Intelligence policies address groups

STRATEGIC SALES & SERVICES PARTNERSHIP FishNet Security is committed to providing comprehensive information technology and security solutions that combine the sales and services of Juniper technology. Network Consulting Integration Services Frontline Support Log Monitoring & Management Juniper Certification Training Partnership Focus: Best In Class Security & Infrastructure Product Experience Executive Collaboration Strategic Vendor/Partner Connectivity PAC & SAC Partner Councils Seats Highly Collaborative Relationship Product Sales In Every Juniper Product Category 2014 FishNet Security Inc. All rights reserved.

PROFESSIONAL & CONSULTING SERVICES As the CISO of our organization, I m challenged daily to provide insight and advice to colleagues. In turn, as I need to seek expert advice, I m confident to consult with my CISO in a pocket, FishNet Security! Jeffrey C. Weeks, CISSP First National of Nebraska Vice President & Chief Information Security Officer 2014 FishNet Security Inc. All rights reserved.

WHO IS FISHNET SECURITY? Most Highly Juniper Certified Partner in the Americas Product Specializations Advanced Network Infrastructure Advanced Security Service Provider Infrastructure Operate Specializations Network Infrastructure Advanced Security Junos Automation 2014 FishNet Security Inc. All rights reserved.

JUNIPER + FISHNET SECURITY SERVICES A Strategic Partnership Consulting: Security Integration (JNCIS) Design Review & Assessment Implementation Services Security Policy Analysis Competing Product Migrations Infrastructure Integration (SPI Certified Specialists, JNCIE) Architecture Design Network Architecture Review/Refresh Migration Assessments & Remediation Product Implementation Design Services (Juniper JNCIS / JNCIE Design & Enterprise Architecture Specialists) Data Center Build Assistance Network Infrastructure Refresh Infrastructure Best Practices Product Roadmaps 2014 FishNet Security Inc. All rights reserved.

JUNIPER + FISHNET SECURITY SERVICES A Strategic Partnership Managed Services: ThreatAssist Services (Operate Certified Specialists) Case Management Product Break-fix & RMA Services Effective Backline Vendor Case Escalation Appliance, O/S & Application Release Roadmaps ThreatProtect Managed Services (Juniper Focused MSS Platforms & Architecture) Juniper Foundation & Secure Services Delivery Lifecycle Systems Management 25x7x365 Systems Monitoring Monitored by FireMon 2014 FishNet Security Inc. All rights reserved.

THANK YOU Rebecca Lawson Senior Director of Product Marketing Juniper Networks Tom Schmatz VP of Partner Development FishNet Security 2014 FishNet Security Inc. All rights reserved.