for Connectivity | Data Center | Applications & Content
SALES GUIDEYour JUNIPER NETWORKS dedicated Sales Team®
+32(0)2 461 01 [email protected] www.westconsecurity.be
Security Solutions
Juniper Networks: Connectivity
2
Security for Connectivity
- Use the same enterprise network infrastructure to securely connect remote and local users and devices- Enable BYOD initiatives- Increase Employee Satisfaction and Productivity
n Wire and Wirelessn User and Devicen Local and Remoten C orporate and Personal
MAG Series Junos Pulse Gateways Deliver SSL VPN connectivity and/or network access control (UAC) through a single converged gateway.
è Industry’s only unified remote and local access security solutionè Available as virtual appliance to add flexibilityè Dynamic policy-driven security enforcement across entire networkè Enforce device security posture to ensure policy complianceè Broad coverage to support enterprise BYOD initiatives
MAG Series are replacing SA and IC Series
Products :
) Compare Family Model
MAG2600For small to medium sized business customers
MAG4610Application acceleration for SMBs through medium to large sized enterprises
MAG4611 For SMBs through medium to large sized enterprises
MAG6610 Modular chassis for enterprise customers
MAG6611 Modular chassis for the complex needs of large enterprise customers and govern-ment agencies
) More on UAC
Juniper Networks: Connectivity Juniper Networks: Connectivity
3
Network security firewall designed to deliver scalable network and application access control and network security for large enterprise, carrier and data center networks.
è Predictable performance: ASIC-based architecture provides linear performance for all packet sizes at multi-gigabit speedsè System and network resiliency: Hardware component redundancy, multiple high availability options and route based VPNs offer reliability and resiliencyè Network security: embedded web filtering, anti-spam, IPS, ICAP antivirus redirect and optional integrated IDP.è Network segmentation: Security zones, virtual systems, virtual LANS and virtual routers allow administrators to deploy security policies to isolate guests and regional servers or databases.è Certifications: FIPS, ICSA, Robust IPv6…
ISG Series Integrated Security Gateways
) Compare Family Model
ISG1000Multi-gigabit performance firewall
ISG2000Multi-gigabit performance firewall which also enables IDP integration
Juniper Networks: Connectivity
4
Security gateways that provide essential Firewall, IDP and reach Routing capabilitiesSRX Series
SRX100For securing small distributed enterprise locations SRX110For securing small branch departments
SRX210 For small distributed enterprise locations
SRX220 For small to medium distributed enterprise locations
SRX240 For branch distributed enterprise locations
SRX550 For medium and large branch locations
SRX650 For securing regional distributed enter-prise locations
) Compare Family Model
è Scalable performance enables additional services without degradationè System and network resiliency ensures carrier-class reliabilityè Network segmentation allows administrators to tailor security and policies
è Interface flexibility meets the needs of any networkè Comprehensive threat protection
SRX1400 For securing small- to mid-size data centers
SRX3400For securing small and midsize server farms and hosting sites
SRX3600For securing medium to large enterprise data cen-ters and hosted or co-located data centers
SRX5600For securing large enterprise data centers or service provider infrastructures
SRX5800 For security large enterprise data centers, hosted or co-located data centers, and service provider infrastructures
SRX Series for the Branch SRX Series for the Data Center
M Watch the demo
) Compare Family Model
Juniper Networks: Connectivity Juniper Networks: Connectivity
5
è Interface flexibility meets the needs of any networkè Comprehensive threat protection
A standards-based, scalable, granular access control solution that creates and propagates dynamic policies based on user identity and role, device type and integrity, and location.UAC is comprised of Junos Pulse, Junos Pulse Access Control Service, MAG Series Junos Pulse Gateways and IC Series.
Unified Access Control (UAC)
Junos Pulse is an integrated, multiservice endpoint solution for mobile and non-mobile devices that serves as an enabling Data Center for security, connectivity, access control, collaboration and acceleration services.
è Enables mobile and remote network access, network security, and application acceleration, increasing visibility and manageability while enabling secure access to network resources based on user identity and roleè Reduces the cost and time associated with deploymentè Uses industry and open standardsè Serves as a Data Center for integration of select third-party, best-in-class security, access and connectivity applications è Delivers a value-added services Data Center for service providers
Junos Pulse
Junos Pulse Mobile Security SuiteProtects smartphones, tablets and other mobile devices from viruses, malware, loss or theft, physical compromise and other threats. It also delivers robust remote device monitoring, control and management.
Junos Pulse Secure Access ServiceEnables organizations to easily and securely federate user identity with third-party web applications, delivering seamless user authentication and access to cloud-based applications.
Junos Pulse Application Acceleration ServiceEnables dynamically provisioned, pervasive, location-agnostic application acceleration. It also provides an easy, affordable solution for small offices where a dedicated application acceleration appliance is not economically feasible.
Services currently supported and delivered through Junos Pulse include:
è Vendor-agnostic access controlè Simple guest user access controlè Application-specific policy rules can be granularly enforced for network, cloud, application and data
è Session federation UAC and SSL/VPN for session transparency è Dynamically addresses unmanageable endpoint devices (printers …)
M Watch the video
Juniper Networks: Data Center
6
Security for Data Center
- Guarantee consistent security and policy applications across the entire data center - Enable better business agility without affecting performance.
n Traditional Data Centern Virtualized Data Centern Hostingn Cloud
Products :
SRX Series for the DataCenter) See page 4
Unified Access Control (UAC)) See page 5
vGW Virtual Gateway Security A solution for virtualized data centers and clouds monitors and protects them while maintaining maximum capacity and performance. Its hypervisor-based stateful firewall integrates intrusion detection (IDS), virtualization-specific antivirus (AV) protection and compliance tools, with management scale.
è Visibility : a complete view of network traffic flowing between VMs and a complete VM and VM group inventory.è Protection: stateful firewall provides layers of defenses and automated security through access control over all traffic using policies that define which ports, protocols, destination and VMs, should be blocked.èCompliance: monitors for and enforces corporate and regulatory policies, including segregation of duties, business-warranted access, and ideal/desired images and configurations
M Watch the video
Juniper Networks: Data CenterJuniper Networks: Data Center
7
Combines network performance and security management into a single solution for enterprise and service provider customers, in addition to integrated log, threat and compliance management for both Juniper and non-Juniper products.
è Integrated log management, security information and event management (SIEM)è Network, security, application and identity awarenessè Advanced threat and security incident detectionè Scalable distributed log collection and archiveè Compliance-driven reporting capabilities
STRM Series
) Compare Family Model
STRM500Security Threat Response Manager is a plug-in network security management solution ideal for small, medium-size and large enterprises. This network security management solution can also be deployed for collection of network flows
STRM2500Security Threat Response Manager is an enterprise appliance, delivering scalable network security management. This network security management solution is ideal for medium-size to large companies which will require additional flow and event monito-ring capacity in the future
STRM5000Security Threat Response Manager is an enterprise and carrier-class appliance providing global deployment of scalable network security management solutions for medium-size and large companies. This network security management solution is ideal for global flow and event monitoring
8
Products :
IDP Series
IDP75For small and mid-size businesses and remote offices, providing a cost-effective method of ensuring network application security management and availability IDP250For mid-size and large enterprises offering continual network intrusion detection and application security management for enterprise networks and network applications
IDP800For mid-size and large enterprises and service providers
IDP8200For large enterprise networks and service pro-viders requiring the highest throughput, reliabi-lity, and quality of service
Juniper Networks: Applications and Content
Protects against Network and Application-level attacks
è Stateful Signature Detection to minimize false positivesè Protocol Anomaly Detection to Proactively protect network from undiscovered vulnerabilitiesè Traffic Anomaly Detection to protect against DDOS Attacksè VLAN-Aware Rules to apply unique policies based on department, customer and compliance requirementsè IDP Reporter, Pre-configured real-time reporting capability available in each IDP appliance
Security for Applications and Content
- Protect critical Web-based applications against attacks- Maintain user-centric, policy-driven, application-aware, visibility and control
n Legacy, Web and Cloud Appsn Location Independentn Application visibility and control,n Content Protection
) Compare Family Model
Juniper Networks: Applications and Content
9
Juniper Networks: Applications and Content
Web Intrusion Deception System that detects, tracks, profiles and prevents hackers in real-time.Junos WebApp Secure ,unlike signature-based approaches, inserts random variable detection points or tar traps, into the code of out-bound Web application traffic to proactively identify attackers before they can do damage - without false positives.
è Detection by deceptionè Track the attacker and record the attackè Understand how your website is attacked to better defend yourselfè Stop attackers in their tracks è Simple management
Junos WebApp Secure: MWS1000An appliance that runs Junos WebApp Secure. It is a plug-in solution that makes it easy to install this web intrusion deception system that detects, tracks, profiles and prevents hackers in real-time.
Junos Spotlight SecureA new cloud-based hacker device intelligence service that will identify individual attacker devices and track them in a global database. It will create a persistent fingerprint of attacker devices for precise identification and blocking of attackers.
Junos DDoS Secure Continually monitors and logs all in- and out-bound web traffic. Junos DDoS Secure uses its CHARM algorithm to learn which IP ad-dresses can be trusted and is able to respond intelligently and in real time by dropping suspect or noncompliant packets as soon as the optimum performance from critical resources begins to degrade.
Junos WebApp Secure
M Watch the demo
10
Demo UnitsBoost your Juniper Sales close rate by offering your end user customers an evaluation unit to prove products benefits and features.
Contact your Sales Representative at Westcon Security
Subscription
End-user support contact details: n Contact namen Onsite addressn Phone numbern Email address
Renewal
n End-user namen S/N or license keyn Required term dates
Do not forget on your Sales Order
Need help for your quote?
Get Trained on Juniper Security
Contact our Juniper Team: +32(0)2 461 01 [email protected] www.westconsecurity.be
For course details and schedule contact your Westcon Representativetel. +32(0)4 461 01 [email protected]
ASSOCIATEJNCIA-JUNOS
EXPERTJNCIE-SEC
PROFESSIONNALJNCIP-SEC
SPECIALISTJNCIS-SECj j j
Juniper Networks: Sales & Training at Westcon