samantha madridd24wuq6o951i2g.cloudfront.net/img/events/3417929/assets/... · 2019. 8. 28. · ©...
TRANSCRIPT
SAMANTHA MADRIDVP Security Business & Strategy, Juniper Networks
© 2019 Juniper Networks Juniper Business Use Only
JUNIPER
CONNECTED
SECURITY
Samantha MadridVice President, Security Business & Strategy
© 2019 Juniper Networks Juniper Business Use Only 4
THE EVOLUTION OF SECURITY
Digital transformation has given way to greater network complexity, changing approaches to security, and endless security products.
2000’s
Network Security
2010’s
Web & EmailSecurity
Today
CloudSecurity
© 2019 Juniper Networks Juniper Business Use Only
Network infrastructure is now converging with perimeter security.
5
© 2019 Juniper Networks Juniper Business Use Only
JUNIPER CONNECTED SECURITY
Streamlined security operations that support business outcomes
Continuous enforcement and remediation ecosystem
Dynamic detection, protection & mitigation of
advanced threats
SEE AUTOMATE PROTECT
Extend security to all points of connection across the network
Safeguard Users, Applications and Infrastructure
© 2019 Juniper Networks Juniper Business Use Only
Adv. Threat DetectionAutomation
Orchestration
JUNIPER CONNECTED SECURITY
DDoS Prevention
Anomaly Detection
Behavioral Intelligence
Zero DayUser & Application Controls
Micro-segmentation
Securing Micro-services
Public & Private Workloads
Identity
APT
ComplianceDNS Security
Switches RoutersAccess Points FirewallsDevices
© 2019 Juniper Networks Juniper Business Use Only 8
Digital transformation has given way to network complexity, and new
security approaches and products. Despite having many options, networks
are still vulnerable.
Perimeter security and the network are converging, and
security must be a part of the entire network.
Juniper Connected Security safeguards
users, applications, and infrastructure by
extending security to all points of connection across the network.
KEY TAKEAWAYS
© 2019 Juniper Networks Juniper Business Use Only