build a software-defined network to defend your business · build a software-defined network to...

29
Kappa Data 2020 Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer [email protected]

Upload: others

Post on 22-Apr-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Kappa Data 2020

Build a Software-Defined Network to Defend your

Business

Filip VanierschotSystems Engineer

[email protected]

Page 2: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Software Defined Secure NetworksJuniper’s Innovation in Secure Networks

Filip Vanierschot – Systems [email protected]

Page 3: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software
Page 4: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Juniper Facts

Page 5: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

A History Of Innovation

Page 6: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Why is security important?

Page 7: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

• Hybrid cloud deployments

growing

• Device proliferation and

BYOD

• IoT

• Zero day attacks

• Advanced, persistent,

targeted attacks

• Adaptive malware

• Virtualization and SDN

• Applications, data,

management in the cloud

• Application proliferation

Security is in Transformation

INFRASTRUCTURETHREAT SOPHISTICATION CLOUD

Page 8: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Causing Network Security Complexity

Centralized DHCP and

other services

DataLoss Prevention

Inline Anti Prevention

ApplicationSecurity

UnifiedThreatManagement

Firewalls

App Servers

Core

LAG

Inline Intrusion Prevention

Multi-vendor, multi-vector solutions deployed

Layered on top of the network

Security tools lagging behind attacker ingenuity

Unmanaged risk to business outcomes and operations

Page 9: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Demanding Software Defined Secure Networks

Global Policy Orchestration, Policy Engine

Open and Unified Threat Detection

Dynamic, Automated Enforcement

IDSDeception Sandbox

AV NGFW

AnalyticsIPS NAT

Uncoordinated and firewall focused

Orchestrated, holistic system encompassing security + infrastructure

Page 10: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Assembling the parts into a solution

PERIMETER

&

ENDPOINT

BASED

HW

MANUAL

CONFIG.

ORIENTED

CLOSED,

SILO

OVERLAYS

PERVASIVE

SW/CLOUD

DEFINED

AUTOMATED

USER

INTENT

OPEN,

STANDARDIZED

Page 11: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Network Configuration

Device/Platform specific configurations

Tough to automate, challenging compliance

Islands of Management

User Intent Policy

User Intent Based Policies

Native automation and compliance support

Comprehensive Security

Users SitesDevices Applications Meta Data

AD CMDB vCenter Custom

ExtensibilityAutomation

Access ControlThreat Prevention

Compliance

Firewall

Rule

Tables

Access

Control

Lists

Routing Tables

& SDN Service

Chains

IP MAC Proto Port

Private Public

SDSN User Intent Policy Model Example

Page 12: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Manual Threat Workflows

Threat Detection Enforcement Delays

Vendor specific threat feeds

Multiple Teams

Threat Management Automation

Automation across Network & Security

Open API and 3rd Party Threat Feed Collation

Cohesive Threat Management System

SDSN – Threat Management Automation Example

Incident Response

Net-Sec Operations

EndpointSecurity

Malware Found

TKT

TKT

Feed

Feed

Page 13: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Software Defined Secure Networks Strategy

Leverage entire network and ecosystem for threat intelligence and detection

Utilize any point of the network as a point of enforcement

Dynamically execute policyacross all network elements including third party devices

Bottoms Up and Top Down Approach

Your Enterprise Network

ThreatIntelligence

Enforcement

Detection

Enforcement

Detection

Cloud-based Threat Defense and Open Intel Platform

Dynamic and Adaptive Policy Engine

Policy

Campus

&

Branch

DCPublic

CloudPrivate

Cloud

Page 14: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Juniper’s Software Defined Secure Network (SDSN) PlatformPervasive, Automated, Intent-driven

ENFORCEMENTAutomatically enforce policy across the infrastructure in site-locations and cloud

DETECTIONUnify threat intelligence from multiple sources

POLICYCreate and centrally manage policy with an intent-based system

Sky ATPMachine

Learning,

Analytics, Threat

Feeds

JSA Analytics, Security Director, Policy Enforcer

Visibility, Correlation, Automation, EnforcementPOLICY

Third Party Networking & Security

ENFORCEMENT

DETECTIONSRX / vSRX / cSRXNG Firewalls: Physical & Virtual

MX & PTX Routers

EX & QFX Switches

DETECTION

DETECTION

UTM & IPSMultiple layers of

sensing and detection

technologies

Infrastructure as a Secure Fabric

Third Party

Page 15: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Juniper’s Software Defined Secure Network (SDSN) Platform

AutomationArtificial

Intelligence

Page 16: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Malware Example

Page 17: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

SDSN vs. Malware

Automation

Sky

Advanced

Threat Prevention

Device Quarantined

Page 18: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

SDSN Simplified: Network As a Firewall

Sandboxw/Deception

StaticAnalysis

ATP

Sky Advanced

Threat Prevention Cloud

Security Director + Policy Enforcer

Policy Enforcement, Visibility, Automation

SRX Physical Firewall

vSRXVirtual Firewall

MX Routers*

EX & QFX Switches

Third Party Elements*

DETECTION

POLICY

Detection(Machine Learning)

Centralized

policy push

EnforcementMulti-cloud

1 2

34

Network asa Firewall

DETECTION

ENFORCEMENT

Page 19: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

SDSN Portfolio

Branch Campus Data Center Service Provider

SRX5800SRX5600SRX300 SRX1500SRX500 SRX4100 SRX4200 SRX5400

1RU5Gb/s

1RU20Gb/s

1RU40Gb/s

5RU480Gb/s

8RU960Gb/s

2RU5.5Gb/s

vSRX

4Gb/s (2 vCPU)

25Gb/s (16 vCPU)

Cloud

Security DirectorPolicy Enforcer

16RU2Tb/s

Application Security

SSL Inspection

Intrusion Prevention

User Firewall

UTM

Sky Advanced Threat Prevention

SecureAnalytics

Management, Visibility, Automation

SIEM Advanced Malware Prevention Service

Next Gen Security Services

cSRX*

Beta*

Page 20: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Ecosystem Partners

Ready to Deploy End to End Security Solutions

CASB

• Cloud App Risk Management

• Visibility and Control

• Malware and Threat Protection for Cloud

• Extend Security Policy

Access Security

• Context-based

• BYOD Onboarding

• Role-based Network Access Assignment

• Access Control and Enforcement

Endpoint Security

• Discovery of All Endpoints

• Vulnerability and Patch Management

• Continuous Policy Enforcement

Page 21: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Conclusion: Juniper’s SDSN is a Security Platform

• Nature of a Platform

• Flexible to enable multiple

solutions now

• Extensible to build and

deploy future solutions

• Open to integrate current

and future technologies

Your Enterprise Network

ThreatIntelligenceEnforcement

Detection

Enforcement

Detection

Cloud-based Threat Defense and Open Intel

Platform

Dynamic and Adaptive Policy

Engine

Policy

Page 22: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Internet of T. as an example

Page 23: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

IoT Applications: Industrial and Consumer

ConsumerInternet of Things

SMART

Phone

Wearable

TV

Appliances

Home

IndustrialInternet of Things

SMART

Factory

Grid

Machine

City

Car

Network

HighPerformance

HighlySecure

LowLatency

HighlyScalable

Page 24: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

IoT History & Forecast - Then, Now and Future

1999

2000

2008

2011

2012

2015

2020

Internet of ThingsFirst Coined- Conceived by Kevin Ashton at P&G

- RFID technologies commercialized

Growth in Connected Devices- First time number of devices surpass global population

IPv6 Launch- Potential for new IP addresses, enabling the future of IoT

Connected Devices to Reach 25 Billion- According to IDC, IoTconnected “things” will account for 60% of total connected devices by 2020

First Commercialized Consumer Product- Toaster and coffee maker

Nest Labs Develops First Product- Later acquired by Google for $3.2B

FitBit IPO- Wearables fitness tracker IPO (NYSE:FIT)

Page 25: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

IoT BREACH

Page 26: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

SDSN IN ACTION

Automation

Page 27: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

What about us IoT consumers ???

Page 28: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Juniper Networks Information

• Software Defined Secure Networks• http://www.juniper.net/uk/en/solutions/software-defined-secure-networks/

• Security Now! Blog• https://forums.juniper.net/t5/Security-Now/bg-p/networkingnow

• Juniper• http://www.juniper.net

Page 29: Build a Software-Defined Network to Defend your Business · Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net. Software

Kappa Data 2020

THANKYOU

Together Strong in a changing world

#KappaData2020