0% found this document useful (0 votes)
125 views

Introduction To Security Slidedeck

The document provides an introduction to network security and Juniper's approach. It discusses the need to identify users and devices accessing the network, control access based on roles, and detect and prevent threats both inside and outside the network. The document also covers centralized management of security policies and products.

Uploaded by

Li Kang
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views

Introduction To Security Slidedeck

The document provides an introduction to network security and Juniper's approach. It discusses the need to identify users and devices accessing the network, control access based on roles, and detect and prevent threats both inside and outside the network. The document also covers centralized management of security policies and products.

Uploaded by

Li Kang
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

INTRODUCTION TO SECURITY

© 2019 Juniper Networks


WHAT IS NETWORK SECURITY?

Protect the network, its users, and its data

Unauthorized access, spyware, viruses, unapproved website access

Security products, security policies, and best practices

Inside

Firewall Outside

Network User Internet

© 2019 Juniper Networks 2


A NEW SECURITY APPROACH

Inside

Firewall Outside

Network User Internet

Threats are everywhere, outside AND inside the network

Users have multiple devices, some are their personal devices

Guest users might also need access to the network

© 2019 Juniper Networks 3


A NEW SECURITY APPROACH

Inside

Firewall Outside

Network User Internet

• Identify not only the user, but the device as well


• Need to go beyond perimeter security
• Security is needed in multiple areas of the network
• Access needs to be controlled
• Threat detection and prevention needs to cover the whole network
• Managed and monitored efficiently

© 2019 Juniper Networks 4


ACCESS CONTROL

Network
• Who is the user and the device?
• What is the user and device trying to access?
• Where are they connecting from?
• When are they accessing the network?
• How are they connecting?

• Identify the user and control what they can


access Network Access Control (NAC)
• Identify the device, ensure it is malware free
and protected
• Policies based on the users role can also be Role-Based Security
used (restricted access by admins)

© 2019 Juniper Networks 5


THREAT DETECTION AND PREVENTION

Hackers Malware Phishing Malware

The number and types of threats and attacks against the network continues to grow

• Users should be trained in security best practices


so they know what to do, and what not to do
• Role-based security should be implemented

© 2019 Juniper Networks 6


THREAT DETECTION AND PREVENTION

• Juniper Sky ATP (cloud) and JATP (hardware)


• Higher degree of accuracy
• Multiple devices can act as enforcement points
• Threat intelligence is shared
• Machine learning algorithms and AI Juniper
Advanced Threat Prevention Sky ATP Third-Party
Feeds
Cloud-based and hardware-based

JATP Network
Internet

SRX Series

© 2019 Juniper Networks 7


THREAT DETECTION AND PREVENTION

• UTM provides multiple security features and services


in a single device
• Anti-virus, anti-spam, content filter, and web filtering
• Streamlined installation and management

Unified Threat Management

Anti-Virus Anti-Spam

Content Filtering Web Filtering


SRX Series

© 2019 Juniper Networks 8


THREAT DETECTION AND PREVENTION

• Next-generation firewalls go beyond traditional firewalls


• SRX Series are next-generation firewalls
• Provides UTM, IPS, and level 4–7 visibility and enforcement
• Integrates with Juniper Sky ATP and JATP
• Applies user-based firewall rules, IPsec VPN capabilities
Juniper
• Detect, decrypt, and inspect SSL encrypted traffic Sky ATP Third-Party
Feeds

SRX Series
Next-Generation
Firewalls JATP Network
Internet

SRX Series

© 2019 Juniper Networks 9


CENTRALIZED MANAGEMENT

Junos Space
Security Director

• Can reduce or eliminate manual configuration errors


• Changes can be rolled out to thousands of devices simultaneously
• Devices and threats can be monitored and analyzed so that appropriate actions can be taken
• The network can be viewed, managed, and monitored from one central location

© 2019 Juniper Networks 10


JUNIPER’S APPROACH TO SECURITY

• It’s time for a better approach to protecting the network,


one that stays ahead of the threats
• Juniper Connected Security allows organizations to see,
automate and protect by leveraging your existing security
solutions as well as taking advantage of what all
organizations already have, the network.
• Juniper Connected Security offers traditional security
products such as enterprise network firewalls, Advanced
Threat Prevention, policy enforcement at the access layer,
identity management, Security Incident and Event
Management (SIEM), and a suite of integrated solutions
with our alliance partners.
• Juniper Connected Security helps you to See, Automate,
and Protect.

© 2019 Juniper Networks 11


THANK YOU

© 2019 Juniper Networks

You might also like