Upload
others
View
9
Download
0
Embed Size (px)
Citation preview
© 2021 Juniper NetworksJuniper Business Use Only
Vice President, Security Business
Juniper Connected Security
Samantha Madrid
© 2021 Juniper NetworksJuniper Business Use Only
01 02 03
PORTFOLIO STRATEGY
Product Focus
SECURITY EXPANSION
Growth Focus
CUSTOMER WINS
Execution Focus
POSITIONED FOR SUCCESS
THE ROAD TO CONNECTED SECURITY
STRATEGIC USE CASES
© 2021 Juniper NetworksJuniper Business Use Only
2000'sNETWORK SECURITYStateful firewall, IPS, AV, VPN
Secure Connectivity
2010'sWEB SECURITYSWG, NGFW, ATP, MDM/ EPP
Standalone Perimeter Security
The Evolution of Security
3
NETWORKING vendors are acquiring
SECURITY technologies
SECURITY vendors are acquiring
NETWORKING technologies
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
ST
RA
TE
GIC
US
E C
AS
ES
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
Transition to the cloudTodayCLOUD SECURITYMulti-cloud, CWP, SASE, ZTNA
Convergence of Networking & Security
01
© 2021 Juniper NetworksJuniper Business Use Only
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
01
Rapid shift to
new architectures
is driving
market change.
35% YoY increase in
cloud adoption in 20202
SASE TAM to reach $5.1Bby 2024 with 124% CAGR3
5G will cover 40% of the
world by 2024 and handle
1.9B subscribers1
70% of attacks
now leverage encryption4
4
ST
RA
TE
GIC
US
E C
AS
ES
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
1 Ericsson Mobility Report, 2018
2 Forrester Research, Predictions 2021, 2020
3 Dell’Oro SASE Advanced Research Report, 2020
4 Gartner, Predicts: 2017 Network and Gateway Security, 2016
© 2021 Juniper NetworksJuniper Business Use Only
Juniper Connected SecurityFrom endpoint to edge, and every cloud in between
The Threat-Aware
Network
Applications Devices
UsersInfrastructure
NETWORK SECURITY
Connected Security is securing every point of connection to
safeguard our customers’ users, applications and infrastructure TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
01
5
ST
RA
TE
GIC
US
E C
AS
ES
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
© 2021 Juniper NetworksJuniper Business Use Only
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
01
" Juniper firewalls are a good shortlist candidate for network
teams looking to consolidate network and firewall components
with a single vendor."
"Juniper firewalls meet all the firewall deployment use cases,
including physical, virtual and containers."
" Juniper has compelling, well-executed security components...
is one of a few firewall vendors to apply machine learning to
encrypted traffic to augment malicious behavior detection."
"All network infrastructure is security infrastructure....
This bear hug of all infrastructure is a wise move by Juniper."
35% YoY increase in
cloud adoption in 2020
SASE TAM to reach $5.1B
by 2024 with 124% CAGR
5G will cover 40% of the
world by 2024 and handle
1.9B subscribers
70% of attacks
now leverage encryption
Connected Security is Resonating with Industry Analysts
6
ST
RA
TE
GIC
US
E C
AS
ES
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
© 2021 Juniper NetworksJuniper Business Use Only
Paving Our Way to Transformation
INDUSTRY RECOGNITION INNOVATION VALIDATED EFFICACY
20 Coolest Network Security Companies of 2020
99.62% Exploit Block Rate
100% Evasion Block Rate
100%*Malware Detection
Zero*False Positives
AA Ratingfor NGFW
99.5%Exploit Block Rate
AI Security, Machine Learning
*Juniper achieved the only perfect score from ICSA LabsTH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
01
7
ST
RA
TE
GIC
US
E C
AS
ES
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
© 2021 Juniper NetworksJuniper Business Use Only
Independently Validated Security Efficacy
Security Effectiveness against exploits, malware, malicious URLs
99.5%
100%
99.6%
We Beat Didn’t Compete
Cisco
CiscoPalo Alto
Palo Alto
Fortinet
Fortinet
Palo Alto
Check Point
Huawei
Zscaler
CiscoCheck Point
Check Point
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
8
ST
RA
TE
GIC
US
E C
AS
ES
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
© 2021 Juniper NetworksJuniper Business Use Only
CLOSED-LOOP
AUTONOMOUS
PROTECTION
& POLICY
MANAGEMENT
Juniper Connected Security in ActionLeading customer use cases
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
02S
TR
AT
EG
IC U
SE
CA
SE
S
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
CLOUD-READY DATA CENTER
Micro-Segmentation
Cloud Workload Protection
Multi-cloud Orchestration
Secure 5G Transformation
AI-DRIVEN ENTERPRISE
Security-as-a-Service
Application Security
Any Device, Any Access
© 2021 Juniper NetworksJuniper Business Use Only
Remote UsersBranch/ RetailCampus/ HQ
SD-WAN
WWW.
AI-Driven Automation
Application Performance
Session Smart Routing
Unified Policy Management
Adv. Threat Protection & Enforcement
Secure Access
Security-as-a-Service
Any Device, Any Access
AIDE: Enterprise EdgeSecuring the campus, branch, remote users, and enterprise applications
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
We used to operate in a more reactive mode. But with Juniper we have an early warning system. We’ve been able to ensure the security of our network, users, and devices wherever they are, even under the ocean.
“
– Keith Manson, IT Systems & OperationsManager, The Marine Institute
Security Effectiveness Against Threats
99.7%Verified by NSS Labs & ICSA Labs
Security Subscription
Software Attach
52% Y/Y
02S
TR
AT
EG
IC U
SE
CA
SE
S
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
© 2021 Juniper NetworksJuniper Business Use Only
WWW.
DC WAN Gateway
Intra-DC DC Interconnect
Top 5 US hyperscalers secure their network with Juniper SRX firewalls,
including fulfillment centers for the largest online retailers.
Cloud Workload Protection
Enterprise
Cloud Provider
CRDC: Enterprise & Cloud Provider Securing the DC WAN gateway, Intra-DC, DC interconnect & application workloads
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
Juniper is keeping us safe from both internal and external threats. Juniper offered better network performance and stronger security than the other options.
“
– Scott Mc Gannon, Senior Vice President of IT, Baha Mar
Virtual SRX
40% revenue growth in 2020
Mid-Range SRX
65% Q/Qorders growth in Q4'20
02S
TR
AT
EG
IC U
SE
CA
SE
S
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
© 2021 Juniper NetworksJuniper Business Use Only
5G Radios5G Cell Site
RouterMetro
AggregationIP Core
IPSec Security Gateway
Mobile Roaming Firewall
Distributed Mobile Services
Mobile Application Firewall
Mobile Packet Core
CRDC: Service Provider Securing 5G transformation for mobile operators
Mobile Data Center
Mobile Edge Compute
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
By leveraging Juniper’s single, low-latency security platform, we can be confident, regardless of scale, that our 5G network will be secure now and into the future.
“
– Joaquin Mata, Chief Technology Officer, Telefónica Spain
High-End SRX
+2% Y/Yin gross margin FY'20
High-End SRX
+5% Y/Yrevenue growth in FY'20
02S
TR
AT
EG
IC U
SE
CA
SE
S
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
DDoS Protection
© 2021 Juniper NetworksJuniper Business Use Only
CLOSED-LOOP
AUTONOMOUS
PROTECTION
& POLICY
MANAGEMENT
Juniper Connected Security in ActionEnd-to-end security from client to application
PO
SIT
ION
ED
FO
R S
UC
CE
SS
03
02S
TR
AT
EG
IC U
SE
CA
SE
S
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
CLOUD-READY DATA CENTER
Micro-Segmentation
Cloud Workload Protection
Multi-cloud Orchestration
Secure 5G Transformation
AI-DRIVEN ENTERPRISE
Security-as-a-Service
Application Security
Any Device, Any Access
© 2021 Juniper NetworksJuniper Business Use Only
Enterprise & Cloud Data CenterEnterprise Edge
Service Provider Data Center
• Proven security efficacy against threats like exploits, ransomware and malicious traffic
• Easy to manage, easy to secure thousands of users and devices globally
• Unmatched service & support
• High-performance, low-latency security, including DDoS protection
• Threat prevention that “just works”
• Scalable, effective security at the gateway, between servers, and within individual applications
• Consistent security across public and private clouds simultaneously
• High performance throughput with smaller physical footprint
Why We Win03S
TR
AT
EG
IC U
SE
CA
SE
S
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
© 2021 Juniper NetworksJuniper Business Use Only
The NEW “Networking & Security” Vendor
Active threat protection & application policy across public & private clouds simultaneously
Risk mitigation at all points of connection
Threat intelligence integrated into all network infrastructure
Independently validated security efficacy & performance
Endpoint control without an agent
SD-WAN & Security within a single solution
…demand for cloud-based SASE capabilities, and market competition and consolidation, will redefine enterprise network and network security architectures and reshape the competitive landscape.
“
03S
TR
AT
EG
IC U
SE
CA
SE
S
02
PO
SIT
ION
ED
FO
R S
UC
CE
SS
01
TH
E R
OA
D T
O C
ON
NE
CT
ED
SE
CU
RIT
Y
© 2021 Juniper NetworksJuniper Business Use Only
Thank you