samantha madridd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · ©...

9

Upload: others

Post on 10-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha
Page 2: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

SAMANTHA MADRIDVP Security Business & Strategy, Juniper Networks

Page 3: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

© 2019 Juniper Networks Juniper Business Use Only

JUNIPER

CONNECTED

SECURITY

Samantha MadridVice President, Security Business & Strategy

Page 4: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

© 2019 Juniper Networks Juniper Business Use Only 4

THE EVOLUTION OF SECURITY

Digital transformation has given way to greater network complexity, changing approaches to security, and endless security products.

2000’s

Network Security

2010’s

Web & EmailSecurity

Today

CloudSecurity

Page 5: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

© 2019 Juniper Networks Juniper Business Use Only

Network infrastructure is now converging with perimeter security.

5

Page 6: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

© 2019 Juniper Networks Juniper Business Use Only

JUNIPER CONNECTED SECURITY

Streamlined security operations that support business outcomes

Continuous enforcement and remediation ecosystem

Dynamic detection, protection & mitigation of

advanced threats

SEE AUTOMATE PROTECT

Extend security to all points of connection across the network

Safeguard Users, Applications and Infrastructure

Page 7: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

© 2019 Juniper Networks Juniper Business Use Only

Adv. Threat DetectionAutomation

Orchestration

JUNIPER CONNECTED SECURITY

DDoS Prevention

Anomaly Detection

Behavioral Intelligence

Zero DayUser & Application Controls

Micro-segmentation

Securing Micro-services

Public & Private Workloads

Identity

APT

ComplianceDNS Security

Switches RoutersAccess Points FirewallsDevices

Page 8: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

© 2019 Juniper Networks Juniper Business Use Only 8

Digital transformation has given way to network complexity, and new

security approaches and products. Despite having many options, networks

are still vulnerable.

Perimeter security and the network are converging, and

security must be a part of the entire network.

Juniper Connected Security safeguards

users, applications, and infrastructure by

extending security to all points of connection across the network.

KEY TAKEAWAYS

Page 9: SAMANTHA MADRIDd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · © 2019 Juniper Networks Juniper Business Use Only JUNIPER CONNECTED SECURITY Samantha

© 2019 Juniper Networks Juniper Business Use Only