16
© 2021 Juniper Networks Juniper Business Use Only Vice President, Security Business Juniper Connected Security Samantha Madrid

Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

Vice President, Security Business

Juniper Connected Security

Samantha Madrid

Page 2: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

01 02 03

PORTFOLIO STRATEGY

Product Focus

SECURITY EXPANSION

Growth Focus

CUSTOMER WINS

Execution Focus

POSITIONED FOR SUCCESS

THE ROAD TO CONNECTED SECURITY

STRATEGIC USE CASES

Page 3: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

2000'sNETWORK SECURITYStateful firewall, IPS, AV, VPN

Secure Connectivity

2010'sWEB SECURITYSWG, NGFW, ATP, MDM/ EPP

Standalone Perimeter Security

The Evolution of Security

3

NETWORKING vendors are acquiring

SECURITY technologies

SECURITY vendors are acquiring

NETWORKING technologies

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

ST

RA

TE

GIC

US

E C

AS

ES

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

Transition to the cloudTodayCLOUD SECURITYMulti-cloud, CWP, SASE, ZTNA

Convergence of Networking & Security

01

Page 4: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

01

Rapid shift to

new architectures

is driving

market change.

35% YoY increase in

cloud adoption in 20202

SASE TAM to reach $5.1Bby 2024 with 124% CAGR3

5G will cover 40% of the

world by 2024 and handle

1.9B subscribers1

70% of attacks

now leverage encryption4

4

ST

RA

TE

GIC

US

E C

AS

ES

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

1 Ericsson Mobility Report, 2018

2 Forrester Research, Predictions 2021, 2020

3 Dell’Oro SASE Advanced Research Report, 2020

4 Gartner, Predicts: 2017 Network and Gateway Security, 2016

Page 5: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

Juniper Connected SecurityFrom endpoint to edge, and every cloud in between

The Threat-Aware

Network

Applications Devices

UsersInfrastructure

NETWORK SECURITY

Connected Security is securing every point of connection to

safeguard our customers’ users, applications and infrastructure TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

01

5

ST

RA

TE

GIC

US

E C

AS

ES

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

Page 6: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

01

" Juniper firewalls are a good shortlist candidate for network

teams looking to consolidate network and firewall components

with a single vendor."

"Juniper firewalls meet all the firewall deployment use cases,

including physical, virtual and containers."

" Juniper has compelling, well-executed security components...

is one of a few firewall vendors to apply machine learning to

encrypted traffic to augment malicious behavior detection."

"All network infrastructure is security infrastructure....

This bear hug of all infrastructure is a wise move by Juniper."

35% YoY increase in

cloud adoption in 2020

SASE TAM to reach $5.1B

by 2024 with 124% CAGR

5G will cover 40% of the

world by 2024 and handle

1.9B subscribers

70% of attacks

now leverage encryption

Connected Security is Resonating with Industry Analysts

6

ST

RA

TE

GIC

US

E C

AS

ES

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

Page 7: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

Paving Our Way to Transformation

INDUSTRY RECOGNITION INNOVATION VALIDATED EFFICACY

20 Coolest Network Security Companies of 2020

99.62% Exploit Block Rate

100% Evasion Block Rate

100%*Malware Detection

Zero*False Positives

AA Ratingfor NGFW

99.5%Exploit Block Rate

AI Security, Machine Learning

*Juniper achieved the only perfect score from ICSA LabsTH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

01

7

ST

RA

TE

GIC

US

E C

AS

ES

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

Page 8: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

Independently Validated Security Efficacy

Security Effectiveness against exploits, malware, malicious URLs

99.5%

100%

99.6%

We Beat Didn’t Compete

Cisco

CiscoPalo Alto

Palo Alto

Fortinet

Fortinet

Palo Alto

Check Point

Huawei

Zscaler

CiscoCheck Point

Check Point

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

8

ST

RA

TE

GIC

US

E C

AS

ES

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

Page 9: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

CLOSED-LOOP

AUTONOMOUS

PROTECTION

& POLICY

MANAGEMENT

Juniper Connected Security in ActionLeading customer use cases

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

02S

TR

AT

EG

IC U

SE

CA

SE

S

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

CLOUD-READY DATA CENTER

Micro-Segmentation

Cloud Workload Protection

Multi-cloud Orchestration

Secure 5G Transformation

AI-DRIVEN ENTERPRISE

Security-as-a-Service

Application Security

Any Device, Any Access

Page 10: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

Remote UsersBranch/ RetailCampus/ HQ

SD-WAN

WWW.

AI-Driven Automation

Application Performance

Session Smart Routing

Unified Policy Management

Adv. Threat Protection & Enforcement

Secure Access

Security-as-a-Service

Any Device, Any Access

AIDE: Enterprise EdgeSecuring the campus, branch, remote users, and enterprise applications

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

We used to operate in a more reactive mode. But with Juniper we have an early warning system. We’ve been able to ensure the security of our network, users, and devices wherever they are, even under the ocean.

– Keith Manson, IT Systems & OperationsManager, The Marine Institute

Security Effectiveness Against Threats

99.7%Verified by NSS Labs & ICSA Labs

Security Subscription

Software Attach

52% Y/Y

02S

TR

AT

EG

IC U

SE

CA

SE

S

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

Page 11: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

WWW.

DC WAN Gateway

Intra-DC DC Interconnect

Top 5 US hyperscalers secure their network with Juniper SRX firewalls,

including fulfillment centers for the largest online retailers.

Cloud Workload Protection

Enterprise

Cloud Provider

CRDC: Enterprise & Cloud Provider Securing the DC WAN gateway, Intra-DC, DC interconnect & application workloads

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

Juniper is keeping us safe from both internal and external threats. Juniper offered better network performance and stronger security than the other options.

– Scott Mc Gannon, Senior Vice President of IT, Baha Mar

Virtual SRX

40% revenue growth in 2020

Mid-Range SRX

65% Q/Qorders growth in Q4'20

02S

TR

AT

EG

IC U

SE

CA

SE

S

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

Page 12: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

5G Radios5G Cell Site

RouterMetro

AggregationIP Core

IPSec Security Gateway

Mobile Roaming Firewall

Distributed Mobile Services

Mobile Application Firewall

Mobile Packet Core

CRDC: Service Provider Securing 5G transformation for mobile operators

Mobile Data Center

Mobile Edge Compute

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

By leveraging Juniper’s single, low-latency security platform, we can be confident, regardless of scale, that our 5G network will be secure now and into the future.

– Joaquin Mata, Chief Technology Officer, Telefónica Spain

High-End SRX

+2% Y/Yin gross margin FY'20

High-End SRX

+5% Y/Yrevenue growth in FY'20

02S

TR

AT

EG

IC U

SE

CA

SE

S

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

DDoS Protection

Page 13: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

CLOSED-LOOP

AUTONOMOUS

PROTECTION

& POLICY

MANAGEMENT

Juniper Connected Security in ActionEnd-to-end security from client to application

PO

SIT

ION

ED

FO

R S

UC

CE

SS

03

02S

TR

AT

EG

IC U

SE

CA

SE

S

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

CLOUD-READY DATA CENTER

Micro-Segmentation

Cloud Workload Protection

Multi-cloud Orchestration

Secure 5G Transformation

AI-DRIVEN ENTERPRISE

Security-as-a-Service

Application Security

Any Device, Any Access

Page 14: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

Enterprise & Cloud Data CenterEnterprise Edge

Service Provider Data Center

• Proven security efficacy against threats like exploits, ransomware and malicious traffic

• Easy to manage, easy to secure thousands of users and devices globally

• Unmatched service & support

• High-performance, low-latency security, including DDoS protection

• Threat prevention that “just works”

• Scalable, effective security at the gateway, between servers, and within individual applications

• Consistent security across public and private clouds simultaneously

• High performance throughput with smaller physical footprint

Why We Win03S

TR

AT

EG

IC U

SE

CA

SE

S

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

Page 15: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

The NEW “Networking & Security” Vendor

Active threat protection & application policy across public & private clouds simultaneously

Risk mitigation at all points of connection

Threat intelligence integrated into all network infrastructure

Independently validated security efficacy & performance

Endpoint control without an agent

SD-WAN & Security within a single solution

…demand for cloud-based SASE capabilities, and market competition and consolidation, will redefine enterprise network and network security architectures and reshape the competitive landscape.

03S

TR

AT

EG

IC U

SE

CA

SE

S

02

PO

SIT

ION

ED

FO

R S

UC

CE

SS

01

TH

E R

OA

D T

O C

ON

NE

CT

ED

SE

CU

RIT

Y

Page 16: Juniper Connected Security...Juniper Business Use Only Enterprise Edge Enterprise & Cloud Data Center Service Provider Data Center • Proven security efficacy against threats like

© 2021 Juniper NetworksJuniper Business Use Only

Thank you