JUNIPER Securityworld
JUNIPER Securityworld
JUNIPER Securityworld
Andy Leung
Director, APAC Product Management
AGENDA
2
THE MULTICLOUD ENTERPRISE
3
BUYING STRATEGY
CIO IS PIVOTING TOWARDS
4
Source: www.juniper.net
KEY FINDINGS
100%
of enterprise workloads are shifting from on-
premises to public cloud in the next 1-3 years
73%
of enterprise has a mult-vendor Strategy, with Tech,
Manufacturing, and Public Section leading the way
Security
Is the leading concern for using the cloud
And Automation is also important.
5
CLOUD SECURITY MODEL
6
OPERATING AS MULTICLOUD
Secure CONTRAIL
Data Center SECURITY SRX Series
Top to Bottom
Public WAN Campus See
Private WAN
Branch
Public Cloud Orchestrate CONTRAIL
Enterprise Multicloud
Data Center
Connect
EX / MX / QFX vMX / vSRX Junos
Series Software
End to End
7
Secure
CONTRAIL
CUSTOM CUSTOM
8
CLOUD SECURITY MODELS
Deploying steps:
• Architecture (i.e., Planning the deployment steps)
• Orchestration (i.e., Manage all the instances )
• Detection (i.e., Advanced Threat Detection)
• Mitigation (i.e., Stop the illegal activities and access)
• Report (i.e. Telemetry and Logging )
9
ADVANCED THREAT DETECTION
10
DEEP LEARNING SOLVES THE SIGNATURE GAP
Threat
Detection JATP
Capability
Reputation Data
Machine Learning
SmartCore
ANALYTICS ENGINE
One-touch mitigation for IR teams
Infection Verification
Verify infection on suspect
endpoints before cleaning
(Native, Carbon-Black, Tanium,
Crowdstrike)
Sandbox HoneyPot
Automate Threat Remediation
MANUAL THREAT WORKFLOWS Automated Threat Remediation
Feed
TKT
Malware TKT
Found
Vendor specific threat feeds Open API and 3rd Party Threat
Feed Collation
JUNIPER CLOUD SECURITY SOLUTION
15
JUNIPER MULTI CLOUD SECURITY
Orchestrate
CONTRAIL SECURITY
Secure
SRXSeries vSRX
Report
16
Secure
SECURITY PORTFOLIO
Price / Performance, Scale and Efficacy Leadership
SDSN
4Gb/s (2 vCPU)
Sky 30Gb/s (17 vCPU)
16RU
2Tb/s
Security Director
ATP vSRX cSRX
8RU
JATP Appliance 960Gb/s
5RU
480Gb/s
1RU 2RU Q1-18 2H-18
2.3 Gb/s 1RU 1RU 1RU 1RU 3RU
Up to 1.7Gb/s 5Gb/s 20Gb/s 40Gb/s 80Gb/s 320Gb/s
Email with suspicious file • Full Incident view and RISK based prioritization
Lateral spread from endpoint
• Threats typically detected in less than 15 seconds
4
2
2 NSX provisions vSRX on all NSX hosts
3
ToR Switch
SUMMARY
22
SKY ATP: THREATS PREVENTED Detection
WannaCry ✓ Machine Learning at every
stage
• Exploits vulnerabilities in SMBv1 that allows remote code execution
✓ Deception Techniques and
Locky Behavioral analysis are
used to differentiate
• Uses VB macros to download payload, encrypts disk with key malware from good
obtained from C&C server software
JUNIPER