39
SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING FOR BYOD AND BYOA Phal Nanda

SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING FOR BYOD AND BYOA

Phal Nanda

Page 2: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

PREPARING FOR BYOD

Page 3: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

MAJOR MARKET TRENDS… DATA MOBILITY AND SCALE AT AN ALL TIME HIGH AND GROWING

New Devices

ERP

Internet Information Services

New Applications

Explosion of Devices

*Forester

Device Proliferation

Diversity of Applications and Richness

Of Data

Security Risk

Proliferation

Sophistication (Maturity)

14B

5B

Type of Attack Botnets

Trojans Virus Worms

DoS

APT

Malware

Page 4: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Top WLAN requirements

BYOD

Unified Policy

Performance at Scale

Highly Resilient

High Density

High Scale

CAMPUS MOBILITY TRENDS

0

100000

200000

300000

400000

Unique Daily Wireless Sessions Large American University ~50,000 Students, Multiple Devices Per Student

6x

Fall Summer Spring 2011

Fall Spring Summer 2010

Page 5: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

MOBILITY IS MUCH MORE THAN BYOD

Today's business environment requires coordinated access

Employee Owned

Devices (BYOD) Guest Devices

Corporate Owned

Devices

Page 6: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

GUEST USER ON CORPORATE NETWORK GUEST SELF PROVISIONING & APPLICATION RESTRICTION

GUEST ID

Hospital Guest

Login

(408) 569-9863

Google

www.youtube.com

Access denied!

This hospital

is reserving

bandwidth for

what matters most

!

Hospital Network

SRX 550

Provisioning Server

WLA532

WLC2800

W/SMARTpass

Junos Pulse Access

Control Service (UAC)

Guest Devices

Employee Owned

Corporate Owned

Guests gain access, IT

gains granular control

over network usage

Page 7: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

WLC

Wireless User

Tablet/smartphone

Unknown device

connects to open

captive portal SSID

1

User session is captured

and redirected to

SmartPass

2

User selects SmartPass

self-registration and

creates a temporary user

credential

3

User uses temporary

credentials to

authenticate against

SmartPass

5

SmartPass sends

temporary credential

to end user via

Clickatell SMS service

4

User is connected to

the network using

mobile phone number

and temporary

password

6

SmartPass

EX Series AP

EX Series

GUEST USER ON CORPORATE NETWORK GUEST SELF PROVISIONING & APPLICATION RESTRICTION

Clickatell SMS

Gateway service

Page 8: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

GUEST USER ON CORPORATE NETWORK APPLICATION RESTRICTION

Device authenticates

on wireless network

1 Smartpass

communicates user and

IP information to UAC

via IF-MAP

2

UAC pushes role based

ACL and FW policies to

EX, WL and SRX

3 SRX AppSecure

Polices block

bandwidth intensive

applications like

YouTube Video

5 SRX enforces user

policies allowing user

basic access to all

servers except finance

4 Apps

Data

Finance

Video

Active Directory

/LDAP

Corporate Data Center

WLC

Wireless User Tablet/smartphone

UAC

SRX

AP

SmartPass

Internet

EX Series

Page 9: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Employees use their own

device to simply access

secure network,

IT can limit use to business

critical functions

EMPLOYEE OWNED DEVICE ON CORPORATE NETWORK EMPLOYEE SELF PROVISIONING & APPLICATION RESTRICTION

Hospital Network

SRX 550

Provisioning Server

WLA532

WLC2800

W/SMARTpass

DOCTOR ID

Hospital Login

Dr. Brown 423

Junos Pulse Access

Control Service (UAC)

Now connecting to a

secure hospital network

Electronic Medical

Records

EMR Access denied!

This hospital

is reserving

bandwidth for

what matters most

!

Guest Devices

Employee Owned

Corporate Owned

Page 10: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

WLC

Corporate

Data

Center

Unknown device

connects to open

captive portal SSID

1

User session is captured

and redirected to

SmartPass

2

SmartPass web portal

presents captive portal

and redirects client to

provisioning server

3

Provisioning server gets

user credentials from

wizard; validates against

AD; and requests user

cert for end user

5

Provisioning server

pushes native

supplicant config wizard

to client device

4

SmartPass

EX Series AP

UAC

EMPLOYEE OWNED DEVICE ON CORPORATE NETWORK EMPLOYEE SELF PROVISIONING

Provisioning

Server

AD/Certificate

Authority

User selects secure wireless network and

device authenticates to RADIUS without

requiring user to enter credentials

7

Wireless User

Tablet/smartphone

Provisioning wizard gets EAP-TLS

configuration profile (and cert) from

provisioning server; agent dissolves

6

EX Series

Page 11: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

EMPLOYEE OWNED DEVICE ON CORPORATE NETWORK APPLICATION RESTRICTION

Device authenticated

on wireless network

1 DHCP Server/SmartPass

communicates User and

IP information to UAC

via IF-MAP

2

UAC pushes role based

ACL and FW policies to

EX and SRX

3 SRX AppSecure

Polices block non-work

related applications like

Hulu and Netflix

5 SRX enforces user

policies allowing user

basic access to all

servers except finance

4 Apps

Data

Finance

Video

Active Directory

/LDAP

Corporate Data Center

WLC

Wireless User Tablet/smartphone

UAC

SRX

AP

DHCP and IF-MAP

SRX AppTrack feature

combined with MAG

data collects per user

application information

providing detailed

reports in STRM

Internet

EX Series

Page 12: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

SMARTPASS IFMAP SUPPORT

Wireless Clients

WLC

SmartPass

SmartPass 7.7 adds support for two IF-MAP use cases

Guest User Federation – Guest users authenticating with SmartPass have complete session

information published to IF-MAP; UAC can apply dynamic policy based on “learned”

sessions

IP-MAC Binding for Non-agented Dot1x Sessions – Dot1x users authenticate directly with

UAC; WLC sends session IP-MAC binding to SmartPass via RADIUS acct and SmartPass updates dot1x session in IF-MAP

IFMAP

UAC

HTTP Redirect (guest users)

RADIUS Auth (dot1x

users)

RADIUS Acct (dot1x users)

Page 13: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

INTRODUCING SMARTPASS CONNECT FOR BYOD

Automated, Self-Service On-Boarding Automatically provision client devices

Secure 802.1x or PSK access to the network

Authentication: Credentials (PEAP, TTLS) or Certificates (TLS)

Automates certificate enrollment process Self service client certificates deployment from Microsoft CA

Devices: iOS, Andriod, Windows, Mac

Client-side Reporting http based reporting on client state

Driver information, OS and platform information

Page 14: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

SMARTPASS CONNECT COMPONENTS

Cloud-hosted IT provisioning utility

Specify configurations necessary to access the

network(s)

Creates deployment package for BYOD devices

Hosted service (SaaS) so it is always up-to-date

Wizard

Administrative

Console

Available to BYOD devices via browser:

Automated, self-service configuration

Self service certificate deployment through

Microsoft CA

When unable to connect to secure network

Hosted on web server, in cloud, or media

Page 15: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

1. New user connects to Open SSID

2. Captive portal provides link for secure network

3. SmartPass Connect configures device

4. SmartPass Connect moves device to secure SSID

SMARTPASS CONNECT ON-BOARDING

Page 16: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

SP Connect (dissolvable) client runs

through configuration on device.

The dissolvable agent is

downloaded to the client device and

then performs config tasks

SMARTPASS CONNECT USER EXPERIENCE

Web

Server AAA Server

Open SSID Secure

SSID

SmartPass Connect

allows agent-less

network provisioning

Network

Management

IT Admin deploys the

configuration files to local web

server or SmartPass server

2

User connects to open

captive portal SSID and

gets redirected to local web

server

3

4

User device

connects

to secure

network

5 Admin

Console

IT Admin configures

network parameters

1

The wizard validates

connectivity to the secure

SSID, uploads client

details, then removes itself

6

Page 17: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE – ANYTIME, ANY DEVICE FROM ANYWHERE

Identify • User

• Device

• Role

Onboard • Corporate or

Personal

• On Campus

• Offsite

• From Home

Secure • 24/7 Protection

• Anywhere

• Loss & Theft

Protection

• Device Location

Manage • Device-specific

• Ensure Adherence to

Policy

2

3

1

4

Page 18: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

EMPLOYEES ON PERSONAL/COMPANY OWNED DEVICE HOST CHECKING & APPLICATION RESTRICTION

Dr. Rose 369

Connect Connect Scan is Clean

Corporate Network

MAG Series Gateway running

Junos Pulse Secure Access

Service (SSL VPN)

Guest Devices

Employee Owned

Corporate Owned

Junos Pulse Mobile

Security Suite

Remote onboarding &

access and the highest

level of security with

automatic scan for latest

OS, viruses signatures,

jail broken

Any Device

Any

Complete

Access

Time

Page 19: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

EMPLOYEES ON CORPORATE LIABLE DEVICE ON BOARDING, HOST CHECKING AND APPLICATION RESTRICTION

Mobile User

Corporate Data Center

Apps

Data

Finance

Video

Active Directory /LDAP

Patch Remediation

MAG Series Junos Pulse Gateway running

Secure Access Service SSL VPN

User

downloads

Junos Pulse

Client from App

Store

1

JPMSS pushes:

• VPN Profile

• WiFi Profile

• SCEP Profile

JPMSS delivers

• 24/7 security via

AV & antimalware

• MDM such as password

mgmt

2

The device initiates a tunnel to the MAG Series Junos Pulse Gateway

3

User has appropriate

access to his role

8

Secure Access Service runs a HostCheck on the device

4

Compliant? Jailbroken/

Rooted?

Secure Access

authenticates the

user against AD

5

Valid user on

AD; device is

OK

6

User matched

to corporate

role

7

Page 20: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE MOBILE THREAT CENTER

Worldwide 24/7 Team of Leading Security Experts

Former Marine Computer Emergency Response

Center Leadership and U.S. Coast Guard

Telecommunication Specialists

Numerous PhDs

Certified Information Systems Security Professionals

(CISSP)

Certified Ethical Hackers (CEH),Certified Hacking Forensic

Investigators (CHFI) and Certified Wireless Network Administrator

(CWNA)

Team Members in Ohio, California, Florida, Massachusetts,

England, Sweden, India, Japan, etc.

Authors: “Blackjacking: Security Threats to BlackBerry

Devices, PDAs, and Cell Phones in the Enterprise” and

“Implementing NAP and NAC Security Technologies:

The Complete Guide to Network Access Control”

Page 21: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

21 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Copyright 2008 SMobile Systems Page 21

Mobile Security Threat Environment MOBILE SECURITY – WHAT ARE THE THREATS?

Malware – Viruses, Worms,

Trojans, Spyware

Direct Attack – Attacking device interfaces,

Network DoS, Malicious SMS

Loss and Theft – Accessing

sensitive data

Data Communication Interception – Sniffing data as it is transmitted and received

Exploitation and Misconduct – Online predators, pornography, inappropriate communications, data leakage

Page 22: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

22 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

MOBILITY IN THE ENTERPRISE RAISES THE STAKES

First-hand research also verifies these security concerns

According to Juniper Networks Mobile Threat Center:

Mobile malware increased

155% in 2011 and the

growth continues in 2012

Malware samples jumped

30% in the first three months

of 2012

Instances of spyware – which

are designed to steal

sensitive personal, financial

and work information from

mobile devices – have more

than doubled in the first

quarter of 2012 alone

Page 23: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

23 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

MANAGE THE APPS – NOT JUST THE DEVICE

App Container

App VPN

App Store

Page 24: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

24 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

PREPARING YOUR NETWORK FOR

BYOA

Page 25: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

25 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

APPLICATION PROLIFERATION

Business Applications Personal Applications

42% Increased

Productivity

39% Reduced

Paperwork

37% Increased

Revenue

Source : Forrester, Frost &Sullivan, Business week, Gigaom pro, ABI

research

Puls

e

Page 26: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

26 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

SOCIAL MEDIA FUNCTIONALITY IN THE ENTERPRISE

Profiles

Doc

Sharing

Up-to-date threat protection

Relevant security policies

Application visibility & control

Groups, Wikis, Internal “Walls”

Security Challenges

Page 27: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

27 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Customer Priorities

Juniper Security Solutions

ADDRESSING THE EVOLVING THREAT LANDSCAPE

Visibility into Web 2.0 Threats

Scalable Policy Enforcement &

Management

Control of Application Usage

Rapid Response to New

Threats

AppSecure Software Security Research Teams SRX Security

Service

Gateways

Page 28: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

28 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

APPSECURE: AN IMPORTANT COMPONENT TO A LAYERED SECURITY APPROACH

Inspection Depth

Processing

Intensity & Cost

ACLs & Stateless Firewall Stateful

Firewall

Application

Security

Intrusion

Prevention

• Decisions made based on

packet header info such as

Source and Destination

addresses

• Very fast

• More context incorporated into

decision process

• Better at identifying unauthorized

or forged communications

• Still fast

• Looks at every bit for threats—

thorough but intensive

processing

• Best used sparingly

Page 29: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

29 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Application Awareness and Classification Engine

Application

View

APPLICATION VISIBILITY AND CONTROL IS EASY WITH APPSECURE

Firewall

Enforcement

Mitigate

Threats

IPS

Application logs sent to

HQ(STRM) for reporting

What application?

What user?

User location?

User device?

NEW

Page 30: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

30 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

AI

Application Identification

Engine

Protocol

Decoding

Attack

DFA

Protection

AppTrack

View

AppFW

Enforce

APPLICATION LEVEL FIREWALL FOR WEB 2.0 APPS

Flow Processing

Identification

Results

Track which Web Applications are being consumed and how

much

Take action against the Web Applications

Enforce security actions such as allow or deny

Subscribe to get access to latest application signatures

Block P2P protocols

Enforcement is done

using AppFW

NAI

NEW

Page 31: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

31 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

AppTrack IPS

AppQoS

Flow

Processing

AppFW

AI

Application Identification Engine

NAI

Ingress Egress

Application ID

Results

AppDoS

APPSECURE SERVICE MODULES

Page 32: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

32 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Control & Enforce Web 2.0 Apps AppFW

APPFW: BEYOND JUST FW OR APP CONTROL

Inspect ports and protocols

Control nested apps, chat, file

sharing and other Web 2.0 activities Dynamic application security

Web 2.0 policy enforcement

Threat detection & prevention

HTTP Uncover tunneled apps

Stop multiple threat types

AppFW

Page 33: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

33 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Protect Valuable On-line Business AppDoS

BOTNET & DOS THREAT MITIGATION

Detect and mitigate botnet activity

Benchmark “normal” behavior to

detect anomalies

Botnet detection & remediation

DoS monitoring & remediation

On-going anomaly detection

Uncover misuse of routine Web

functionality

AppDoS

Purchase Item

Select Item View Item

Check bill

Adapt security policy and QOS

based on insights

Page 34: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

34 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Prioritize & Control App Bandwidth AppQoS

APPQOS FOR SCALE & PERFORMANCE

Monitor Web 2.0 bandwidth

consumption

Dynamic application

quality-of-service (QoS)

Application prioritization

Performance management

AppQoS

Throttle bit rates based on security

and usage insights

Prioritize business critical apps

X

Page 35: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

35 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

SECURITY THREAT RESPONSE MANAGER (STRM)

STRM supports SRX Series

Intrusion Prevention System (IPS) and AppSecure

220+ out-of-the box report templates

Fully customizable reporting engine:

creating, branding and scheduling delivery of reports

Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA

Reports based on control frameworks: NIST, ISO and CoBIT

Page 36: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

36 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

APPLE BONJOUR SERVICE IN WLAN – UNIVERSITY ENVIRONMENT

Simplicity in service sharing • Educational institutions

sharing services using Bonjour

• Students can project from their iPad to class-room Apple TV

Large campus Challenges • 15%+ traffic related to

Bonjour multicast messaging

• Does not propagate across VLANs

IT looking for device, user, location service

policies

Page 37: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

37 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

LYNC QOE / AIR-QUALITY CO-RELATION

Wireless LAN

Controller Campus Core

Campus Application Servers

Campus Access

Firewall

Juniper Space /

Manager

Data Center

Corporate

Office

Firewall

QoE data for call

collected in MSFT

server

‘Air quality’ monitored via

each AP / WLC and collected

In Campus Manager

Lync call made from

WiFi client on Juniper

AP

QoE data sent from

Server to CM

‘Air quality’ and QoE data

correlated and mashed up in CM

Page 38: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems

38 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

JUNIPER SECURITY LEADERSHIP

• Data Center with High-End Firewall #1 at 54%

• Secure Mobility with SSL VPN #1 at 29%

• Intelligent Networking with Secure Routing #2 at 21%

• Across Device, Network and Application

• One Junos for Routing, Switching and Security

• Security and Mobile Threat Research Teams

Market

Leadership

Security

Innovation

Proven

Reach and

Scale

• Protecting 76% of Smartphones Worldwide

• 24 of the Fortune 25 for Secure Connectivity

• GTM Scale with IBM, Dell, Ericsson & NSN

* Source: Infonetics Research, 4Q10

Page 39: SECURING NEW CAMPUS AND BRANCH NETWORK, PREPARING … · 2012-10-05 · Center Leadership and U.S. Coast Guard Telecommunication Specialists Numerous PhDs Certified Information Systems