Manage Security Anywhere with Security Director Cloud and Juniper Secure Edge

Security
Still image of a dashboard that manages network connections showing a map in blues and purples.

Discover Security Director Cloud, Juniper’s simple and seamless management experience delivered from the cloud in a single UI, connecting current deployments with future architectural rollouts, like SASE. Secure your architecture with consistent security policies across any environment—on-premises, cloud-based, cloud-delivered, and hybrid—and expand zero trust to all parts of the network from the edge all the way into the data center and to the applications and microservices.

Juniper Secure Edge, powered by Security Director Cloud, secures workforces anywhere with the fast, reliable, and secure access they need. Delivers full-stack SSE capabilities, including FWaaS, SWG, CASB & DLP, ZTNA, and advanced threat protection to protect access to web, SaaS, & on-premises applications, providing users with security that follows them anywhere.

Show more

You’ll learn

  • The features of Security Director Cloud

  • How to secure your workforce with Juniper Secure Edge

Who is this for?

Business Leaders Network Professionals

Transcript

0:06 security director cloud is the central

0:08 control point that operationalizes

0:10 security across the entire network from

0:13 a single UI providing unbroken

0:15 visibility from client to workload

0:17 administrators can see everything they

0:19 need to know about users devices

0:21 applications and threats network-wide

0:23 both on-prem and in the cloud from the

0:25 security director Cloud dashboard

0:28 as our customer Edge moves quickly to

0:30 distributed environments and our centers

0:32 of data move to multiple Cloud

0:34 environments deploying and configuring

0:36 firewalls can be very time consuming

0:37 with security director Cloud our

0:39 customers can deploy and configure any

0:41 SRX in any of these environments in less

0:43 than a minute

0:45 because security director Cloud uses a

0:47 single policy framework across physical

0:49 virtual containerized and cloud-based as

0:53 a service firewalls a customer can

0:55 easily apply existing security policies

0:57 with just three clicks how is this game

1:00 changing for our customers Juniper

1:02 security remains consistent across any

1:04 deployment type any Cloud every user and

1:07 every application even as the user moves

1:10 locations a single effective security

1:12 policy follows them wherever they go

1:15 undergoing sassy transformation is

1:17 difficult because change especially when

1:20 it involves changes to network and

1:21 changes to security is difficult

1:24 but security director cloud makes it as

1:26 easy as three clicks to adopt sassy with

1:29 a simple and intuitive wizard

1:31 Juniper is the only vendor that can do

1:33 this

1:34 the administrator simply chooses the

1:37 security policies that they want

1:38 delivered from the cloud via secure Edge

1:40 click ok

1:42 and just like that they're on their way

1:43 to sassy

1:46 now no sassy architecture is complete

1:48 without sd-wan the a driven sd-wan

1:51 solution managed by Mist completes

1:54 Juniper's comprehensive single vendor

1:56 assassin experience for our customers

1:58 after sites are configured in the secure

2:00 Edge site portal these configurations

2:02 are copied over to the new secure Edge

2:04 connector within the Mist UI

2:07 once the connector is configured and the

2:09 tunnels are up between the sd-wan device

2:11 and secure Edge

2:13 all internet traffic will be sent to and

2:16 secured by secure Edge for all the

2:18 branches shown here providing for safe

2:19 access for users and devices

2:23 but security isn't just for firewalls

2:25 Juniper has built security into our

2:27 Network portfolio to create a truly

2:30 threat aware Network

2:32 one example of this is the connected

2:34 security Mist integration that enables

2:37 administrators to easily identify

2:39 infected devices

2:41 within the MIS Portal administrator is

2:43 alerted to an endpoint that is likely

2:45 compromised by a cyber threat the

2:47 administrator can see exactly what the

2:49 thread is and how severe it could be if

2:52 it were allowed to spread within the

2:53 network

2:54 they can also see exactly where that

2:56 endpoint is physically located so they

2:58 can answer questions like is this device

3:00 where it should be

3:01 and where do I go to get my hands on it

3:03 but they don't need to have the infected

3:05 device in hand before they can respond

3:07 to the threat

3:08 they can quarantine or remove the device

3:10 from the network stopping the threat

3:12 from spreading further into the network

3:13 directly from the missed portal

Show more