Simplifying the SASE Experience
Just how threat aware is your network?
Listen as Juniper’s Samantha Madrid and Clarify360’s Jo Peterson discuss how Juniper is bringing security to every point of connection to protect user applications and network infrastructure when a breach occurs. Learn more about Juniper’s evolving and highly intelligent Connected Security, safeguards, as well as important new additions to full-stack SASE solutions.
You’ll learn
The importance of extending Zero Trust principles from the edge into the data center
The impact of DLP and CASB functionalities in future-proofing your environment
How Connected Security safeguards and supports all types of environments
Who is this for?
Host
Guest speakers
Transcript
0:09 i'm here today at rsa and i'm so happy
0:12 to be here it's exciting i'm i'm here
0:14 with samantha madrid the group vice
0:16 president of security business and
0:18 strategy at juniper networks
0:20 joe thank you for taking the time i'm
0:23 really looking forward to this
0:24 conversation me too i love the energy
0:27 here can you feel it i really can i mean
0:29 in a way it's like it took me back to
0:32 the early days of rsa in my career
0:35 being here it was like all the energy
0:37 the excitement everybody kind of saying
0:40 hello
0:41 learning sharing
0:43 it's exciting
0:44 i think you know i i missed it
0:47 yeah easy i mean it's it's easy to feel
0:49 like we missed it um and i know that
0:52 juniper is such a big part of the rsa
0:55 community and there's communities within
0:57 communities i feel like
0:59 you have a dedicated community of users
1:02 that use your products
1:04 but what some people may not know is
1:06 that juniper has been really really
1:09 forward uh in their support of the cloud
1:12 security alliance how does community and
1:15 the alliance help strengthen the whole
1:17 infosys community at large well i think
1:20 when you think of cyber
1:22 it is the bedrock community is the
1:24 bedrock of
1:26 really great threat intelligence
1:29 i think the the as an industry
1:32 we've kind of
1:33 built from that and one of the things
1:36 that i'm super proud of that juniper has
1:38 done is really um integrate ourselves
1:41 into the community
1:43 you know it's not just about the
1:45 intelligence and the technologies we
1:47 create it's how we can share
1:49 that intelligence with the collective
1:51 it's how can we
1:52 share early indicators of compromise and
1:55 insights
1:56 with the the global threatened community
1:59 and one organization you know that i'm
2:01 very proud to be a part of is the cyber
2:03 threat alliance so cta has been a
2:06 long-standing organization that is
2:08 dedicated to understanding threat
2:11 landscape
2:12 and sharing that intelligence
2:15 with all of its member
2:16 companies i was actually
2:19 recently voted in to serve on their
2:21 board
2:22 and and fun fact i'm the first woman to
2:25 ever serve on the board for the cyber
2:27 threat alliance so i'm very very honored
2:29 uh and excited about that okay can we
2:31 just take a moment and stand still and
2:33 go preach
2:38 that is
2:39 so awesome as i
2:42 look out into the marketplace and as i
2:43 work with customers what i'm seeing is
2:46 worlds coming together and what i mean
2:48 by that is
2:49 you know for years we had silos and i'm
2:51 not saying that we we don't still have
2:53 silos but
2:55 how many network people are responsible
2:57 for security raise your hand how many
2:59 security people are responsible for
3:01 network raise your hand so we're
3:03 starting to see these groups talk
3:05 together and work together on projects
3:07 and connection has always been an
3:09 important thing for juniper so can you
3:12 share take minute and share juniper's
3:15 connected security strategy absolutely
3:18 and i was i'm so glad you asked that
3:19 because i was going to weave it in
3:21 if you hadn't but that's really been the
3:24 whole premise behind the connected
3:26 security strategy it was to bring
3:28 security to every point of connection so
3:30 we could safeguard users applications
3:33 and the infrastructure when a breach
3:35 happens
3:36 the onus just doesn't just fall on the
3:38 security team
3:40 everybody
3:41 is called to action the networking teams
3:44 and the security teams alike to remedy
3:46 the situation understand the situation
3:49 and plug any potential hole
3:51 and so to only think about this as a
3:55 security problem that can only be solved
3:58 with security products i think is
4:00 selling the opportunity short and so the
4:02 secure the context security ship
4:04 strategy
4:05 has always been about weaving
4:08 intelligence in
4:10 so again back to we were just talking
4:11 about the collective intelligence
4:13 weaving that in so your routers your
4:16 switches and your access points can make
4:18 smart security decisions
4:20 in concert with your security technology
4:23 like your firewall your application
4:25 security and things like that that
4:27 everything is working together
4:29 communicating together so that you truly
4:32 have
4:33 visibility across the entire network and
4:36 so that's the connected security
4:37 strategy and what we've been executing
4:39 against
4:40 for nearly four years now that's awesome
4:43 you know and it seems like the only
4:44 thing constant in i.t is change right
4:48 and i've read this really interesting
4:49 statistic about how
4:52 globally cloud
4:55 will be
4:56 approaching the 500 billion all forms of
4:59 cloud mark by the end of this year wow
5:01 that's up 24
5:03 from last year wow so you would think
5:06 okay maybe you're one of the pandemic
5:08 it would have gone up but it
5:10 significantly continues to increase and
5:12 i know that juniper has been part of
5:14 that story
5:15 how is this connected strategy able to
5:18 support customers in hybrid environments
5:21 or whatever kind of environment they
5:23 have the premise is to bring security at
5:25 every point of connection we know there
5:27 is you know
5:29 security architectures
5:30 and network architectures are vast you
5:32 have distributed you mentioned cloud and
5:35 this move to cloud it should be an
5:37 extension of what you have today in your
5:40 environment it shouldn't be building
5:42 from scratch
5:43 so you know last year we introduced uh
5:45 security director cloud and that was a
5:47 cloud delivered security platform that
5:50 allows for customers to manage all of
5:52 their security technologies um
5:55 as well as manage that transition to the
5:57 to the cloud
5:59 earlier this year we we introduced our
6:02 uh secure edge which is our cloud
6:04 delivered security stack
6:07 that allows that for them to continue
6:10 that uh transition
6:12 and so there's no break invisibility
6:14 there's no break in in their ability to
6:17 secure their organization
6:19 but what it does do
6:21 is that it allows them to make that
6:23 transition at their pace
6:26 and so when we started hearing a lot
6:28 about the the
6:30 sassy architecture and the promise to be
6:33 able to
6:34 bring network and security together
6:37 right for
6:38 improved operations and and heightened
6:41 security we're like
6:43 this is what we've been delivering for
6:45 the past four years this is the
6:47 connected security strategy
6:49 and you've had some exciting
6:51 announcements here at rsa
6:54 and i know that some of
6:56 the
6:56 um
6:57 some of that news has created sort of
6:59 this whole full stack vision yeah can
7:02 you chat about that a little bit well
7:05 absolutely so you mentioned uh something
7:07 a moment ago you talked about how it's
7:09 not just a bunch of uh standalone
7:12 technologies
7:13 and i think you know what i've started
7:15 to see and this is why i had a lot of
7:18 conviction in our strategy
7:20 was sassy or the shift to cloud isn't
7:23 just taking what you have on
7:25 premise yeah and forklifting it to the
7:27 cloud calling it cloud delivered and
7:29 then i have a sassy strategy
7:32 no it should be a continuation so part
7:35 of that continuation or realizing that
7:38 is that full stack software uh for sassy
7:42 that means it's the one engine
7:45 right that is able to manage your
7:48 firewall policies
7:49 your secure web access policies
7:52 your uh cloud application policies
7:55 and your advanced dlp
7:57 so the customer burden is
8:00 removed when you're thinking about if i
8:03 have all of my security policies today
8:05 and i'm trying to translate that to
8:06 security you're not having to do that
8:08 manually
8:10 that's the key thing i was actually just
8:11 talking to someone earlier this morning
8:13 and they were talking about how one of
8:16 the biggest challenges that they're
8:18 starting to see
8:20 on an adoption of sassy is the fact that
8:24 they're starting to see um
8:26 vulnerabilities occur in customer
8:28 environments
8:29 because they're having to do all of this
8:32 manually
8:33 it's increasing human error
8:35 and and so while you you know
8:38 while you think about this why create
8:41 bigger challenges for ourselves
8:43 when you could just take your existing
8:45 policies
8:47 and with literally a click of a button
8:49 move those over
8:51 to cloud policies you're not taking on
8:54 any operational burden uh for the
8:56 customer and
8:58 you're able to have that seamless
9:00 security across the board yeah you make
9:03 a really good point because the number
9:05 one
9:06 issue around cloud security last year
9:09 was misconfiguration
9:10 yeah i mean
9:12 human error was the number one thing
9:14 that happened i believe they were secure
9:17 in things they weren't securing things
9:19 they didn't know that they needed to
9:20 secure them and it's confusing
9:23 right it's confusing for one person to
9:25 have to
9:26 manage all these multiple systems
9:29 um but take you know take a minute if
9:32 you can and besides policy talk to me
9:36 about end user visibility because that
9:39 is super important
9:40 yeah you know i i'm really glad you
9:42 brought that up if you ask any cio or
9:44 cso you know how many users are on their
9:47 network and how many devices they have
9:49 on their network that their users are
9:50 using they probably couldn't answer the
9:52 question confidently
9:54 and and what we strive to do is
9:58 provide that complete visibility one of
10:00 the things that security director cloud
10:03 fosters which powers our secure edge
10:05 solution
10:06 is the
10:08 ability to see
10:10 all devices that are on the network the
10:12 ability to see all users that are on the
10:15 network and then build policies around
10:17 identity
10:19 so if the the identity whether it's
10:21 based on a device a user or an
10:23 application
10:24 can follow
10:26 that entity wherever it is
10:29 and i think that that's really really
10:31 powerful when trying to support a
10:34 multi-cloud environment when trying to
10:36 support a distributed
10:39 network
10:40 that you're not having to build you know
10:44 thousands of policies
10:46 you can build them around
10:49 the the the entity specifically and
10:52 doesn't matter where that entity lives
10:54 that it just follows it
10:56 very forward thinking for you guys to
10:59 include casby into your stack it feels
11:02 like you're trying to future proof for
11:04 the customer
11:06 tell me about your thinking
11:08 in terms of adding casby to the stack
11:11 well casby is about understanding
11:15 applications that the customer doesn't
11:18 own and operate
11:20 right it gives visibility of those
11:23 applications
11:24 but it allows the customer to leverage
11:28 their
11:29 policies and apply it
11:32 to the data and the applications that
11:34 are outside their span of control
11:37 so they're not having to break
11:39 visibility
11:40 so if you think about
11:42 uh secure web gateway and firewall as a
11:45 service right there are firewall
11:47 policies that allow for a customer to
11:51 control their network resources
11:53 and or to secure
11:57 web access
11:58 but a lot of those network resources now
12:01 are living in applications
12:03 public applications
12:05 that again the
12:07 customer does not own
12:10 but their confidential information
12:13 is there
12:14 so
12:15 it only made sense if we're building
12:18 identity-based policies that follow the
12:20 user and follow the device
12:22 that that extended to public
12:26 applications
12:27 that it extended
12:29 the uh secure access to understanding
12:33 what is actually living in those
12:35 applications and is there any risk
12:37 associated with that so it's putting the
12:39 administrators back in the driver's seat
12:42 of their data
12:44 and really about securing the centers of
12:47 data
12:49 not just the data center
12:51 right and it feels like there was
12:54 very thoughtful thinking
12:56 as it relates to even the data because
12:59 you added a dlp element
13:02 so people forget about securing the data
13:04 i feel sometimes and that was a good
13:06 move was that your thinking was just to
13:08 think about the entire environment well
13:10 when you think of zero trust and i think
13:13 of sassy just the other side of the same
13:14 point
13:15 right zero trust should extend
13:18 to wherever the data resides and at the
13:22 and at the root of zero trust to me is
13:24 about identity and data
13:26 and if the data is living outside the
13:30 the kind of
13:31 traditional corporate perimeter
13:34 then the the the security needs to
13:36 extend and follow with it i talk about
13:39 it as kind of micro perimeters
13:41 it's creating a micro perimeter around
13:43 the actual
13:45 data itself
13:46 not just to where the data
13:48 lies
13:50 and so you have insight you can take
13:53 action
13:54 and you can adapt that through dlp
13:57 to be able to recognize
13:59 does that data need to be there should
14:01 it be there
14:02 should
14:03 i restrict it
14:05 should i remove it
14:07 right because not all data is created
14:08 equal
14:09 and so you can't have draconian policies
14:13 that either exclude or allow we live in
14:15 an adaptive world
14:17 and i think one of the things that
14:19 employees have really
14:20 shown over this pandemic
14:24 is that they can be highly successful in
14:27 a very flexible world
14:29 and so we need to have flexibility
14:31 around our policy our security needs to
14:33 be flexible and our networks need to be
14:35 flexible
14:36 and so
14:38 we have been laser focused
14:40 on providing that flexibility through
14:42 automation
14:44 so you're not having to take on
14:46 complexity
14:48 and the operational version to get there
14:51 that's great
14:53 what closing thoughts do you have for us
14:55 here at rsa well you know
14:57 again it a lot of talk is around
15:00 transformation
15:02 transformation is opportunity
15:04 but it's predicated on having a great
15:06 experience along the way
15:09 if
15:10 you aren't taking experience into mind
15:12 if that's not a part of that journey
15:16 then you're going to
15:18 over complicate
15:19 the the desired outcome and security has
15:23 been a
15:24 necessity in every type of network but
15:28 has a tendency
15:30 to sometimes become overly complicated
15:34 and it's overly complicated
15:37 because
15:38 security isn't integrated into the
15:40 network
15:41 it stands on the outside
15:44 in very specific locations so we've been
15:47 on this journey through our connected
15:48 security strategy
15:50 to bring security to every point of
15:52 connection
15:53 to safeguard the users the applications
15:55 and the infrastructure
15:57 and now with our latest
16:00 uh announcement
16:02 and addition to secure edge
16:04 we are extending that security
16:07 to cloud
16:09 to cloud-delivered architectures
16:12 and allowing customers truly
16:15 to
16:16 start with their today
16:18 and build for their future
16:20 automatically that's awesome
16:23 well thank you for taking time
16:24 today likewise