SlideShare una empresa de Scribd logo
1 de 17
ALWAYS PROTECTED
PERVASIVE SECURITY
FROM THE DEVICE TO THE CLOUD TO THE DATA CENTER




Fredrik Lyhagen
Partner Account Manager
SETTING THE AGENDA FOR THE NEXT DECADE




            Juniper Networks is transforming the
          experience and economics of networking

2                   Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
JUNIPER AT A GLANCE


                            2011 Revenue: $4.5 Billion

                  Global Presence: Offices In 47 Countries

                                     9000 Employees
                                         #2 In Core
      #3 In Edge Routing,                                                                #1 In High-end
                                         Routing, SP Routing,
      Ethernet Switching                                                                 Firewall
                                         Network Security

                  Doing Business With 96% Of Fortune 100

          Powering 6 Of The World’s 7 Largest Stock Exchanges

        Securing 80% Of All Smart Phone Traffic In North America

             Mission: Connect Everything. Empower Everyone

3                            Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
CLEAR MISSION AND FOCUSED STRATEGY


           Connect everything. Empower everyone.

        Silicon                         Systems                                    Software




      Through high-performance network and industry innovation



4                      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
CIO TOP 3 BUSINESS TRENDS & IT INITIATIVES - 2012




      Employee
                                   Business                                           Cost
    Productivity &
                                    Agility                                        Efficiency
     Satisfaction




                           New Platforms &                                       Infrastructure
       BYOD
                              Services                                           Consolidation




5                    Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
INVESTMENT FOCUS AREAS




                      New Platforms &                                        Infrastructure
      BYOD
                         Services                                            Consolidation




    Mobility
     Mobility                 Cloud                                         Data Center,
                                                                            Campus & Branch




6               Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
SECURITY IMPACT

                   Notoriety                    Profitability                     .gov /.com                     .me / .you

    Attacker




                                                      Type of Attack                                               APT


                                                                                                       Botnets

    Threats                                                                DOS
                                                                                             Malware

                                                        Trojans
                                       Worms
                         Virus




               New Devices & Platforms                                                   New Applications & Delivery Models


    Targets
                                                                                                                     Internet Information
                                                                                                                     Services




7                                Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
EVERYDAY EXPLOITS

                                                      Robert Smith
                                                      Funniest video
                                                      ever! Check
                                                      out the link!
                                                      Click Here
                                                                              Intranet    Quarter EndEmail
                                             Connect to                                   Sales Results
                                             MALWARE
                                             Corporate                                     Corporate
                                               SITE                                      Financial Data
                                              Network




8                 Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
OFTEN INFECTED                                                                                  Can’t inspect content
                                                                                          !         in network


                                                                 Robert Smith
                                                                 Funniest video
                                                                 ever! Check
                                                                 out the link!
             Doesn’t have Intelligence                           Click Here
                                                                                         Intranet                       Email
         !   to detect Malware on Client             Connected To
                                                      MALWARE
                                                      Corporate                                          Corporate
                                                        SITE                                           Financial Data
                                                       Network
                                                                                                Can’t control
                                                                                         !      access to
                                                                                                sensitive data




                                      Can’t protect user from
                               !      cloud-based threats


9                            Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
NEW SOLUTION REQUIREMENTS



         BYOD


                                   Broad                          Flexible
                                  Coverage                       Deployment
     New Platforms &
        Services
                                                Security
                                              Context and
                                              Coordination
      Infrastructure
      Consolidation




10                     Copyright © 2012 Juniper Networks, Inc.    www.juniper.net
JUNIPER – CONTINUED INNOVATION AND DISRUPTION

                                                                               What We Are Doing In 2012
       What We Did In 2011                                                     • Security Design Introduction
       • AppSecure for SRX                                                     • Low Latency SRX Option
       • SRX 110 Introduction                                                  • AppSecure for Branch SRX
       • vGW introduction                                                      • SRX 550 Introduction
       • Added AV to vGW                                                       • vGW KVM Hypervisor support
       • Delivered Pulse Mobile Security Suite                                 • Junos Pulse Enhancements
       • Expanded Pulse OS support                                             • Virtual SRX (vSRX)




                                          Where We Are Going




     Develop Next Generation                Deliver Cloud Security                               Invest In Security
        Security Services                          Platform                                         Intelligence


11                                   Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
SECURITY IS REQUIRED ACROSS ALL DOMAINS




               S E C U R I T Y: ALWAY S P R O T E C T E D



12              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
WHY JUNIPER?

         Employee
                                                                                         Security Context and
     Broad Protection
        Productivity                Flexible Deployment
                                      Business Agility                                      Cost Efficiency
      and Satisfaction
                                                                                            Coordination


                                Always Protected




           Mobility                                Cloud                                    Data Center,
                                                                                         Campus and Branch




     Pulse, SA, MAG, STRM,                 SRX, vGW, STRM                                SRX, MAG, STRM, UAC &
           UAC & SRX                                                                         Security Design


13                           Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
ALWAYS PROTECTED – THE VISION
                                                                                                                    CAN enforce access via User,
                         !
                                CAN detect malware
                                on the client
                                                                                                             !       location and device context


                                                                             Robert Smith
                                                                             Funniest video
                                                                             ever! Check
                                                                             out the link!
                                                                             Click Here
                                                                                                         Intranet                      Email

                                                                    MALWARE                          X
                                                                                                                        Corporate
                                                                      SITE                                            Financial Data




                                    X
     CAN coordinate security                                                                                     CAN enable Client traffic
!   to provide access control                                                                            !       directed to Cloud, CAN
     to sensitive information                                                                                    scrub and detect malware


    14                                   Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
APPSECURE SERVICE MODULES FOR THE
 ENTERPRISE


                                                      NAI
   Flow
              Ingress
                                           AI                                       Egress
Processing
                                 Application Identification Engine




                                        Application
                                        ID Results

     AppDoS                                                                                    IPS




              AppFW                                                                 AppTrack
                                           AppQoS

16                      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
Q4’11 RESULTS: SOLID PERFORMANCE IN A
 CHALLENGING MACRO-ENVIRONMENT

              Revenue and Non-GAAP EPS                                                                       Q4‘11 Highlights
     $1,140                                                       $0.50
                    Revenue ($M)                EPS ($)                                        $1,120.8 million, up 1% Q/Q
                             $1,121                 $1,121                                     Non-GAAP EPS $0.28
     $1,120

                                       $1,106                     $0.40                        Cash flow from operations, $243.6M
               $1,102
     $1,100
                                                                                               Service Provider 60% of revenue
                                                                                               Enterprise 40% of revenue
                                                                  $0.30
     $1,080     $0.32        $0.32

                                        $0.28         $0.28
     $1,060
                                                                  $0.20                     Q4‘11 Revenue Diversification
     $1,040

                                                                  $0.10
     $1,020                                                                                                     36%
                                                                                                      46%
                                                                                                                           EMEA
     $1,000                                                       $0.00                                        18%         APAC
                Q1'11         Q2'11     Q3'11        Q4'11
                                                                                                                           Americas
                        Chart reflects non-GAAP EPS



17                                               Copyright © 2012 Juniper Networks, Inc.   www.juniper.net

Más contenido relacionado

La actualidad más candente

Disruptive Analysis LTE Summit 2011 voice presentation may 2011
Disruptive Analysis   LTE Summit 2011 voice presentation may 2011Disruptive Analysis   LTE Summit 2011 voice presentation may 2011
Disruptive Analysis LTE Summit 2011 voice presentation may 2011Dean Bubley
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...Saiful Hidayat
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008pwcom.co.uk Ltd
 
Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012crancer
 
Meet XO Communications
Meet XO CommunicationsMeet XO Communications
Meet XO CommunicationsMarc Cloutier
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed servicesPranowo Budi Sulistyo
 
Enrique Castro Leon Virtual Service Oriented Grids
Enrique  Castro Leon    Virtual  Service Oriented GridsEnrique  Castro Leon    Virtual  Service Oriented Grids
Enrique Castro Leon Virtual Service Oriented GridsSOA Symposium
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mefRafael Junquera
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentawlegalservices
 

La actualidad más candente (17)

Company Overview
Company OverviewCompany Overview
Company Overview
 
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
Disruptive Analysis   LTE Summit 2011 voice presentation may 2011Disruptive Analysis   LTE Summit 2011 voice presentation may 2011
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
 
10 fn s15
10 fn s1510 fn s15
10 fn s15
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...Saiful Hidayat On Csr Guru Telkom   Republika Bagimu Guru Kupersembahkan   It...
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008
 
Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012Meet Xo Core Presentation 2012
Meet Xo Core Presentation 2012
 
Meet XO Communications
Meet XO CommunicationsMeet XO Communications
Meet XO Communications
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed services
 
Enrique Castro Leon Virtual Service Oriented Grids
Enrique  Castro Leon    Virtual  Service Oriented GridsEnrique  Castro Leon    Virtual  Service Oriented Grids
Enrique Castro Leon Virtual Service Oriented Grids
 
Situational Web
Situational WebSituational Web
Situational Web
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 
Meet XO
Meet XOMeet XO
Meet XO
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 

Destacado

IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)Juniper Networks
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsKashif Latif
 
Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Cisco Security
 

Destacado (8)

IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)
 
Juniper SRX
Juniper SRX Juniper SRX
Juniper SRX
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
Next Generation Security Solution
Next Generation Security SolutionNext Generation Security Solution
Next Generation Security Solution
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy Groups
 
vSRX
vSRXvSRX
vSRX
 
Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)
 

Similar a Juniper Provision - 13martie2012

Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD OpportunityJuniper Networks
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011chaucheckpoint
 
Partnership for the Private Cloud
Partnership for the Private CloudPartnership for the Private Cloud
Partnership for the Private CloudCisco Canada
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future StateBruce MacVarish
 
Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
 
Top Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersTop Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersJuniper Networks
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Believe
BelieveBelieve
BelieveAdmeld
 
Mobile Advertising Presentation: AdMonsters Leadership Forum
Mobile Advertising Presentation: AdMonsters Leadership ForumMobile Advertising Presentation: AdMonsters Leadership Forum
Mobile Advertising Presentation: AdMonsters Leadership ForumAdmeld
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissIBMSERBIA
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Thomas Roider
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Xenesys
 

Similar a Juniper Provision - 13martie2012 (20)

Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Lam Chee Keong
Lam Chee KeongLam Chee Keong
Lam Chee Keong
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
 
Partnership for the Private Cloud
Partnership for the Private CloudPartnership for the Private Cloud
Partnership for the Private Cloud
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
 
Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012
 
Top Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersTop Ten Imperatives for Service Providers
Top Ten Imperatives for Service Providers
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Believe
BelieveBelieve
Believe
 
Mobile Advertising Presentation: AdMonsters Leadership Forum
Mobile Advertising Presentation: AdMonsters Leadership ForumMobile Advertising Presentation: AdMonsters Leadership Forum
Mobile Advertising Presentation: AdMonsters Leadership Forum
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond Kiss
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
10 fn s15
10 fn s1510 fn s15
10 fn s15
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
 

Más de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

Más de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Juniper Provision - 13martie2012

  • 1. ALWAYS PROTECTED PERVASIVE SECURITY FROM THE DEVICE TO THE CLOUD TO THE DATA CENTER Fredrik Lyhagen Partner Account Manager
  • 2. SETTING THE AGENDA FOR THE NEXT DECADE Juniper Networks is transforming the experience and economics of networking 2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 3. JUNIPER AT A GLANCE 2011 Revenue: $4.5 Billion Global Presence: Offices In 47 Countries 9000 Employees #2 In Core #3 In Edge Routing, #1 In High-end Routing, SP Routing, Ethernet Switching Firewall Network Security Doing Business With 96% Of Fortune 100 Powering 6 Of The World’s 7 Largest Stock Exchanges Securing 80% Of All Smart Phone Traffic In North America Mission: Connect Everything. Empower Everyone 3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 4. CLEAR MISSION AND FOCUSED STRATEGY Connect everything. Empower everyone. Silicon Systems Software Through high-performance network and industry innovation 4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 5. CIO TOP 3 BUSINESS TRENDS & IT INITIATIVES - 2012 Employee Business Cost Productivity & Agility Efficiency Satisfaction New Platforms & Infrastructure BYOD Services Consolidation 5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 6. INVESTMENT FOCUS AREAS New Platforms & Infrastructure BYOD Services Consolidation Mobility Mobility Cloud Data Center, Campus & Branch 6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 7. SECURITY IMPACT Notoriety Profitability .gov /.com .me / .you Attacker Type of Attack APT Botnets Threats DOS Malware Trojans Worms Virus New Devices & Platforms New Applications & Delivery Models Targets Internet Information Services 7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 8. EVERYDAY EXPLOITS Robert Smith Funniest video ever! Check out the link! Click Here Intranet Quarter EndEmail Connect to Sales Results MALWARE Corporate Corporate SITE Financial Data Network 8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 9. OFTEN INFECTED Can’t inspect content ! in network Robert Smith Funniest video ever! Check out the link! Doesn’t have Intelligence Click Here Intranet Email ! to detect Malware on Client Connected To MALWARE Corporate Corporate SITE Financial Data Network Can’t control ! access to sensitive data Can’t protect user from ! cloud-based threats 9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 10. NEW SOLUTION REQUIREMENTS BYOD Broad Flexible Coverage Deployment New Platforms & Services Security Context and Coordination Infrastructure Consolidation 10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 11. JUNIPER – CONTINUED INNOVATION AND DISRUPTION What We Are Doing In 2012 What We Did In 2011 • Security Design Introduction • AppSecure for SRX • Low Latency SRX Option • SRX 110 Introduction • AppSecure for Branch SRX • vGW introduction • SRX 550 Introduction • Added AV to vGW • vGW KVM Hypervisor support • Delivered Pulse Mobile Security Suite • Junos Pulse Enhancements • Expanded Pulse OS support • Virtual SRX (vSRX) Where We Are Going Develop Next Generation Deliver Cloud Security Invest In Security Security Services Platform Intelligence 11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 12. SECURITY IS REQUIRED ACROSS ALL DOMAINS S E C U R I T Y: ALWAY S P R O T E C T E D 12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 13. WHY JUNIPER? Employee Security Context and Broad Protection Productivity Flexible Deployment Business Agility Cost Efficiency and Satisfaction Coordination Always Protected Mobility Cloud Data Center, Campus and Branch Pulse, SA, MAG, STRM, SRX, vGW, STRM SRX, MAG, STRM, UAC & UAC & SRX Security Design 13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 14. ALWAYS PROTECTED – THE VISION CAN enforce access via User, ! CAN detect malware on the client ! location and device context Robert Smith Funniest video ever! Check out the link! Click Here Intranet Email MALWARE X Corporate SITE Financial Data X CAN coordinate security CAN enable Client traffic ! to provide access control ! directed to Cloud, CAN to sensitive information scrub and detect malware 14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 15.
  • 16. APPSECURE SERVICE MODULES FOR THE ENTERPRISE NAI Flow Ingress AI Egress Processing Application Identification Engine Application ID Results AppDoS IPS AppFW AppTrack AppQoS 16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 17. Q4’11 RESULTS: SOLID PERFORMANCE IN A CHALLENGING MACRO-ENVIRONMENT Revenue and Non-GAAP EPS Q4‘11 Highlights $1,140 $0.50 Revenue ($M) EPS ($)  $1,120.8 million, up 1% Q/Q $1,121 $1,121  Non-GAAP EPS $0.28 $1,120 $1,106 $0.40  Cash flow from operations, $243.6M $1,102 $1,100  Service Provider 60% of revenue  Enterprise 40% of revenue $0.30 $1,080 $0.32 $0.32 $0.28 $0.28 $1,060 $0.20 Q4‘11 Revenue Diversification $1,040 $0.10 $1,020 36% 46% EMEA $1,000 $0.00 18% APAC Q1'11 Q2'11 Q3'11 Q4'11 Americas Chart reflects non-GAAP EPS 17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Notas del editor

  1. Juniper Networks is delivering a new network that enables businesses and consumers to maximize the potential of their products and services and meets the infrastructure needs of the next decade.T: And many companies are already taking advantage of the potential the new network provides.
  2. Everywhere we look, we see the same trends and CIO business issues coming up around employee productivity, business agility and cost efficiencies. Much of the time these are driving specific IT initiatives like programs supporting BYOD, turning up new platforms and cloud services, and Infrastructure consolidation with data center and server virtualization projects. Transition: You may have similar initiatives in your organization today
  3. We are also finding that the investment focus for these new initiatives around three key areas: Mobility, Cloud and in the Data Center & Campus & Branch infrastructure. And while these investments are paying off, they also come with some profound impacts to the security of the organization. Transition: Let’s take a look at the security impact of these investment areas.
  4. Each successful exploit has three parts – the attacker, threat type, and target – we continue to see change in each. Attacker - in 2005, we saw a shift starting from attackers wanting notoriety to wanting profitability. Today, cybercrime is fully organized and we see crime syndicates out to profit from attacks. These attackers are now well funded, use sophisticated and purpose built tools and target organizations purely for profit. While this is nothing new, what we are seeing today is a move to not only attack “.gov/.com” but to attack “.me/.you”. Attackers are becoming increasingly sophisticated and are profiling not only companies but also individuals. They understand that we all have online identities but also “phyiscal profiles” or “connection points” where we connect to the internet from a variety of places……work, internet café, airport lounge, home. They have realized that often times our security defenses are down or weak at some of these connection points and penetrating individuals’ devices can work quite well outside of the work place. If you can infect a business user at an internet café and then have them walk that device into the enterprise then you can infiltrate the enterprise infrastructure and bypass many of the defenses that are in place today. Attackers understand this and have adopted their behavior. Threat – The threat landscape is also undergoing a change both in terms of the types of attacks and the sophistication and maturation of existing attacks. As expected, we continue to see new types of attacks to bypass the latest technologies that enterprises deploy.historically, the first large virus outbreak was on the Apple II in 1981. Since then there have been many well documented outbreaks that include the “iLOVEYOU” worm in 2000, SQL Slammer and Blaster worm in 2003 and countless worms, trojans and other forms of malware. Today, DOS has given way to DDOS and newer threats such as rootkits and botnets have taken hold. The most recent threat is APT which is not only a new type of threat but also a new way to profile and attack networks, systems and organizations. While we see new types of attacks we also see the morphing of existing attack types. As an example a few years ago, the majority of malware was in cleartext which could often be detected by AV or IDP solutions. Today over 80% of malware uses encryption, compression or file packing to bypass traditional AV or IDP technologies. Target - Finally, we also see significant changes with attack targets. The new attack targets are often the same as the investment areas that we talked about supporting your key business initiatives. Over the past few years there has been an explosion in devices that attackers target ranging from smart phones, to tablets to cloud services. What is particularly interesting about these new targets is the variation of the architecture of these platforms that ranges from more secure platforms such as the iphone to more open platforms such as the the Android OS. The other primary change we see is around the types of applications being attacked. Historically, most attacks have been focused on traditional corporate application servers and productivity applications such as office. Today, have seen a significant shift to web 2.0 type applications and social networking apps where attackers take advantage of a trusted relationship that is built amongst online users. Once user devices are compromised, they are used to access sensitive information in the data center over the campus and branch networks.Transition: Let’s take a look at an example
  5. Run through the animation: A mobile user checks e-mail on his own iPhone and communicates with friends. He trust the link from his friend and inadvertently becomes infected with malware. After going to work he connects to the corporate network and the attacker, who has taken control over the device, can access sensitive information.Transition: This is not an uncommon story
  6. The security team at his company has been avoiding the issue of what to do about employees using their own consumer devices to improve productivity and it shows. The don’t have the ability to detect malware on the mobile device, they can’t protect the user from cloud-based threats, they can’t control access based on user identity, device and location and the products they do have in place don’t have the coordination to know what is going on. Transistion: This clearly needs a new approach.
  7. The common IT initiatives of BYOD, New Platform and Services, and Infrastructure Consolidation need to shift to deliver three key benefits:Broad coverage across the enterprise, from the device to the cloud to the data centerFlexible deployment options that can be run on as a VM or an appliance, or on a mobile device. Custom fit to deliver security easily where ever it makes the most sense in your environment Security context and coordination that allows the overall system to run in a coordinated fashion, taking contextual information about user identity, location, and device to make better security enforcement decisions.Transition: These are capabilities Juniper offers today. Let’s see where we are heading next.
  8. We introduced a number of innovative new products last year, and have another full set of products we plan to deliver in 2012, including our new Security Design management application and a VM version of the SRX. For a longer term view of our strategic direction, you can expect to see us invest in developing next generation security services, delivering more cloud security service offerings and start to move beyond what we have from context and coordination into security intelligence.Transition: This is an integral part of the overall Juniper company strategy
  9. From a company strategy perspective,Juniper has significant development investments across a wide range of domains for both service provider and enterprise networks. As part of the always protected vision, we consider security as a critical component and area of differentiation in each of these domains. Transition: Bringing it all together, we can build an enterprise that is always protected with Juniper
  10. Juniper provides the critical components to securing your most valued assets by enabling BYOD policies and improve employee productivity and satisfaction with broad protection, by improving business agility with flexible deployment models tailored to your new enterprise, and to improve cost efficiencies with security context and coordination that keeps you always protected from the device to the cloud to the data center.Transition: Let’s go back to our example
  11. When we address the new requirements and provide broad protection, flexible deployment models that can be tailored to your environment and security context and coordination, we can keep you protected and against the dynamic threat landscape. We can now detect malware on the client, we can enforce access to company resources based on the user, device and location, we can control access to sensitive information, and we can take advantage of new cloud services to improve efficiency and reduce costs.Transition: Thanks for letting us share our security direction with you. Please let us know if there are any areas you would us like to cover in greater depth with you or any member of your staff.
  12. AppDOS: Application layer attacks. Looped attacks in applications to bring down services. Example: looped search or looped Shopping Cart additions in an online shop AppFW: Enforcement part. Black list or white list of apps that are allowed. Example: Block usage of Facebook of Telnet.AppQoS: Enforcing bandwidth based on app. Example: Limited downloads from Internet. Set preference for email services or ERP services.AppTrack: Visibility of app usage. Per protocol and also which app per protocol, good support for http.IPS: Anomaly detection, based on signatures and traffic patterns.User Identity Binding: Creating user specific rules (as opposed source IP based rules), we have!Decrypting SSL: We can do it.Blocking Skype: Can be done using multiple methods.
  13. PRELIMINARY FOURTH QUARTER AND FISCAL YEAR 2011 FINANCIAL RESULTS Q4 Financial Highlights: Revenue: $1,120.8 million, down 6% from Q4'10 and up 1% from Q3'11Operating Margin: 11.9% GAAP; 18.6% non-GAAPGAAP Net Income Per Share: $0.18 dilutedNon-GAAP Net Income Per Share: $0.28 diluted, down 33% from Q4'10 and flat from Q3'11 2011 Financial Highlights: Revenue: $4,448.7 million, up 9% from 2010Operating Margin: 13.9% GAAP; 20.6% non-GAAPGAAP Net Income Per Share: $0.79 dilutedNon-GAAP Net Income Per Share: $1.19 diluted, down 10% from 2010 SUNNYVALE, Calif., Jan. 26, 2012 -Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today reported preliminary financial results for the three and twelve months ended December 31, 2011, and provided its outlook for the three months ending March 31, 2012.  Net revenues for the fourth quarter of 2011 decreased 6% on a year-over-year basis, and increased 1% sequentially, to $1,120.8 million.  For the year ended December 31, 2011, Juniper's revenue increased 9% on a year-over-year basis to $4,448.7 million. The Company posted GAAP net income of $96.2 million, or $0.18 per diluted share, and non-GAAP net income of $150.1 million, or $0.28 per diluted share, for the fourth quarter of 2011.  Included in the GAAP diluted earnings per share was a $0.02 cents impact for restructuring and other charges.  Non-GAAP net income per diluted share decreased 33% compared to the fourth quarter of 2010 and was flat compared to the third quarter of 2011.  For the year ended December 31, 2011, GAAP net income was $425.1 million, or $0.79 per diluted share, and non-GAAP net income was $644.6 million, or $1.19 per diluted share. Non-GAAP net income per diluted share for the year ended December 31, 2011 decreased 10% on a year-over-year basis. The reconciliation between GAAP and non-GAAP results of operations is provided in a table immediately following the Share-Based Compensation Related Payroll Tax by Category table below. "While the fourth quarter was softer than we had anticipated primarily due to weak demand from service providers, Juniper delivered record revenues in a year where macro economic uncertainty increased as the year unfolded," said Kevin Johnson, president and CEO. “During the year, we introduced innovative new products across our portfolio that we believe will enable Juniper to continue to grow faster than the markets we serve.  We are confident in our strategy and our innovation pipeline, and we remain committed to delivering differentiated solutions that are highly relevant to our customers.”Juniper’s GAAP operating margin for the fourth quarter of 2011 was 11.9% compared to 12.4% in the third quarter of 2011, and 19.1% in the prior year fourth quarter. Non-GAAP operating margin for the fourth quarter of 2011 was 18.6% compared to 20.0% in the third quarter of 2011, and 24.5% in the prior year fourth quarter. For the fiscal year 2011, Juniper's GAAP operating margin was 13.9% compared to 18.8% for the prior fiscal year. Non-GAAP operating margin for the fiscal year 2011 was 20.6% compared to 24.0% in the fiscal year 2010. "The December quarter was an atypical and unexpectedly weak finish to the year, with reduced spending by some of our largest customers.” said Robyn Denholm, Juniper's chief financial officer. “While long-term industry fundamentals remain strong, we expect the near-term environment to remain challenging.  We will invest in support of our strategy while continuing our focus on execution and prudent cost management.” Other Financial HighlightsTotal cash, cash equivalents and investments as of the fourth quarter of 2011 was $4,292.4 million, compared to $4,130.3 million as of the third quarter of 2011 and $2,821.6 million as of the fourth quarter of 2010. Juniper generated net cash from operations in the fourth quarter of 2011 of $243.6 million, compared to net cash provided by operations of $185.2 million in the third quarter of 2011, and $371.0 million in the fourth quarter of 2010. For the year ended December 31, 2011, Juniper generated net cash from operations of $986.7 million, compared to $812.3 million in 2010. Days sales outstanding in accounts receivable (“DSO”) was 46 days in the fourth quarter of 2011, compared to 36 days in the prior quarter and 45 days in the fourth quarter of 2010. For the year ended December 31, 2011, Juniper repurchased 17.5 million shares, at an average share price of $30.93 per share, for a total of $541.2 million, which largely offset stock issued through our employee equity programs.    Capital expenditures, as well as depreciation and amortization of intangible assets expense during the fourth quarter of 2011, were $78.4 million and $43.3 million, respectively. Capital expenditures, as well as depreciation and amortization of intangible assets expense during the fiscal year 2011, were $266.3 million and $169.3 million, respectively.