Transcript
Page 1: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

for Connectivity | Data Center | Applications & Content

SALES GUIDEYour JUNIPER NETWORKS dedicated Sales Team®

tel. 07824 [email protected]

Security Solutions

Page 2: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

Juniper Networks: Connectivity

2

Security for Connectivity

- Use the same enterprise network infrastructure to securely connect remote and local users and devices- Enable BYOD initiatives- Increase Employee Satisfaction and Productivity

n Wire and Wirelessn User and Devicen Local and Remoten C orporate and Personal

MAG Series Junos Pulse Gateways Deliver SSL VPN connectivity and/or network access control (UAC) through a single converged gateway.

è Industry’s only unified remote and local access security solutionè Available as virtual appliance to add flexibilityè Dynamic policy-driven security enforcement across entire networkè Enforce device security posture to ensure policy complianceè Broad coverage to support enterprise BYOD initiatives

MAG Series are replacing SA and IC Series

Products :

) Compare Family Model

MAG2600For small to medium sized business customers

MAG4610Application acceleration for SMBs through medium to large sized enterprises

MAG4611 For SMBs through medium to large sized enterprises

MAG6610 Modular chassis for enterprise customers

MAG6611 Modular chassis for the complex needs of large enterprise customers and govern-ment agencies

) More on UAC

Page 3: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

Juniper Networks: Connectivity Juniper Networks: Connectivity

3

Network security firewall designed to deliver scalable network and application access control and network security for large enterprise, carrier and data center networks.

è Predictable performance: ASIC-based architecture provides linear performance for all packet sizes at multi-gigabit speedsè System and network resiliency: Hardware component redundancy, multiple high availability options and route based VPNs offer reliability and resiliencyè Network security: embedded web filtering, anti-spam, IPS, ICAP antivirus redirect and optional integrated IDP.è Network segmentation: Security zones, virtual systems, virtual LANS and virtual routers allow administrators to deploy security policies to isolate guests and regional servers or databases.è Certifications: FIPS, ICSA, Robust IPv6…

ISG Series Integrated Security Gateways

) Compare Family Model

ISG1000Multi-gigabit performance firewall

ISG2000Multi-gigabit performance firewall which also enables IDP integration

Page 4: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

Juniper Networks: Connectivity

4

Security gateways that provide essential Firewall, IDP and reach Routing capabilitiesSRX Series

SRX100For securing small distributed enterprise locations SRX110For securing small branch departments

SRX210 For small distributed enterprise locations

SRX220 For small to medium distributed enterprise locations

SRX240 For branch distributed enterprise locations

SRX550 For medium and large branch locations

SRX650 For securing regional distributed enter-prise locations

) Compare Family Model

è Scalable performance enables additional services without degradationè System and network resiliency ensures carrier-class reliabilityè Network segmentation allows administrators to tailor security and policies

è Interface flexibility meets the needs of any networkè Comprehensive threat protection

SRX1400 For securing small- to mid-size data centers

SRX3400For securing small and midsize server farms and hosting sites

SRX3600For securing medium to large enterprise data cen-ters and hosted or co-located data centers

SRX5600For securing large enterprise data centers or service provider infrastructures

SRX5800 For security large enterprise data centers, hosted or co-located data centers, and service provider infrastructures

SRX Series for the Branch SRX Series for the Data Center

M Watch the demo

) Compare Family Model

Page 5: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

Juniper Networks: Connectivity Juniper Networks: Connectivity

5

è Interface flexibility meets the needs of any networkè Comprehensive threat protection

A standards-based, scalable, granular access control solution that creates and propagates dynamic policies based on user identity and role, device type and integrity, and location.UAC is comprised of Junos Pulse, Junos Pulse Access Control Service, MAG Series Junos Pulse Gateways and IC Series.

Unified Access Control (UAC)

Junos Pulse is an integrated, multiservice endpoint solution for mobile and non-mobile devices that serves as an enabling Data Center for security, connectivity, access control, collaboration and acceleration services.

è Enables mobile and remote network access, network security, and application acceleration, increasing visibility and manageability while enabling secure access to network resources based on user identity and roleè Reduces the cost and time associated with deploymentè Uses industry and open standardsè Serves as a Data Center for integration of select third-party, best-in-class security, access and connectivity applications è Delivers a value-added services Data Center for service providers

Junos Pulse

Junos Pulse Mobile Security SuiteProtects smartphones, tablets and other mobile devices from viruses, malware, loss or theft, physical compromise and other threats. It also delivers robust remote device monitoring, control and management.

Junos Pulse Secure Access ServiceEnables organizations to easily and securely federate user identity with third-party web applications, delivering seamless user authentication and access to cloud-based applications.

Junos Pulse Application Acceleration ServiceEnables dynamically provisioned, pervasive, location-agnostic application acceleration. It also provides an easy, affordable solution for small offices where a dedicated application acceleration appliance is not economically feasible.

Services currently supported and delivered through Junos Pulse include:

è Vendor-agnostic access controlè Simple guest user access controlè Application-specific policy rules can be granularly enforced for network, cloud, application and data

è Session federation UAC and SSL/VPN for session transparency è Dynamically addresses unmanageable endpoint devices (printers …)

M Watch the video

Page 6: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

Juniper Networks: Data Center

6

Security for Data Center

- Guarantee consistent security and policy applications across the entire data center - Enable better business agility without affecting performance.

n Traditional Data Centern Virtualized Data Centern Hostingn Cloud

Products :

SRX Series for the DataCenter) See page 4

Unified Access Control (UAC)) See page 5

vGW Virtual Gateway Security A solution for virtualized data centers and clouds monitors and protects them while maintaining maximum capacity and performance. Its hypervisor-based stateful firewall integrates intrusion detection (IDS), virtualization-specific antivirus (AV) protection and compliance tools, with management scale.

è Visibility : a complete view of network traffic flowing between VMs and a complete VM and VM group inventory.è Protection: stateful firewall provides layers of defenses and automated security through access control over all traffic using policies that define which ports, protocols, destination and VMs, should be blocked.èCompliance: monitors for and enforces corporate and regulatory policies, including segregation of duties, business-warranted access, and ideal/desired images and configurations

M Watch the video

Page 7: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

Juniper Networks: Data CenterJuniper Networks: Data Center

7

Combines network performance and security management into a single solution for enterprise and service provider customers, in addition to integrated log, threat and compliance management for both Juniper and non-Juniper products.

è Integrated log management, security information and event management (SIEM)è Network, security, application and identity awarenessè Advanced threat and security incident detectionè Scalable distributed log collection and archiveè Compliance-driven reporting capabilities

STRM Series

) Compare Family Model

STRM500Security Threat Response Manager is a plug-in network security management solution ideal for small, medium-size and large enterprises. This network security management solution can also be deployed for collection of network flows

STRM2500Security Threat Response Manager is an enterprise appliance, delivering scalable network security management. This network security management solution is ideal for medium-size to large companies which will require additional flow and event monito-ring capacity in the future

STRM5000Security Threat Response Manager is an enterprise and carrier-class appliance providing global deployment of scalable network security management solutions for medium-size and large companies. This network security management solution is ideal for global flow and event monitoring

Page 8: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

8

Products :

IDP Series

IDP75For small and mid-size businesses and remote offices, providing a cost-effective method of ensuring network application security management and availability IDP250For mid-size and large enterprises offering continual network intrusion detection and application security management for enterprise networks and network applications

IDP800For mid-size and large enterprises and service providers

IDP8200For large enterprise networks and service pro-viders requiring the highest throughput, reliabi-lity, and quality of service

Juniper Networks: Applications and Content

Protects against Network and Application-level attacks

è Stateful Signature Detection to minimize false positivesè Protocol Anomaly Detection to Proactively protect network from undiscovered vulnerabilitiesè Traffic Anomaly Detection to protect against DDOS Attacksè VLAN-Aware Rules to apply unique policies based on department, customer and compliance requirementsè IDP Reporter, Pre-configured real-time reporting capability available in each IDP appliance

Security for Applications and Content

- Protect critical Web-based applications against attacks- Maintain user-centric, policy-driven, application-aware, visibility and control

n Legacy, Web and Cloud Appsn Location Independentn Application visibility and control,n Content Protection

) Compare Family Model

Page 9: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

Juniper Networks: Applications and Content

9

Juniper Networks: Applications and Content

Web Intrusion Deception System that detects, tracks, profiles and prevents hackers in real-time.Junos WebApp Secure ,unlike signature-based approaches, inserts random variable detection points or tar traps, into the code of out-bound Web application traffic to proactively identify attackers before they can do damage - without false positives.

è Detection by deceptionè Track the attacker and record the attackè Understand how your website is attacked to better defend yourselfè Stop attackers in their tracks è Simple management

Junos WebApp Secure: MWS1000An appliance that runs Junos WebApp Secure. It is a plug-in solution that makes it easy to install this web intrusion deception system that detects, tracks, profiles and prevents hackers in real-time.

Junos Spotlight SecureA new cloud-based hacker device intelligence service that will identify individual attacker devices and track them in a global database. It will create a persistent fingerprint of attacker devices for precise identification and blocking of attackers.

Junos DDoS Secure Continually monitors and logs all in- and out-bound web traffic. Junos DDoS Secure uses its CHARM algorithm to learn which IP ad-dresses can be trusted and is able to respond intelligently and in real time by dropping suspect or noncompliant packets as soon as the optimum performance from critical resources begins to degrade.

Junos WebApp Secure

M Watch the demo

Page 10: Juniper Security Sales Guide - uk.security.westcon.com · Juniper Networks: Data Center Juniper ... JNCIA-JUNOS EXPERT JNCIE-SEC PROFESSIONNAL JNCIP-SEC SPECIALIST j JNCIS-SEC j j

10

Demo UnitsBoost your Juniper Sales close rate by offering your end user customers an evaluation unit to prove products benefits and features.

Contact your Sales Representative at Westcon Security

Subscription

End-user support contact details: n Contact namen Onsite addressn Phone numbern Email address

Renewal

n End-user namen S/N or license keyn Required term dates

Do not forget on your Sales Order

Need help for your quote?

Get Trained on Juniper Security

Contact our Juniper Team: Tel. 07824 [email protected]

For course details and schedule contact your Westcon RepresentativeTel. 01753 [email protected]

ASSOCIATEJNCIA-JUNOS

EXPERTJNCIE-SEC

PROFESSIONNALJNCIP-SEC

SPECIALISTJNCIS-SECj j j

Juniper Networks: Sales & Training at Westcon


Recommended