AI-Driven SD-WAN Demo: Security Dashboard

Demo Drop AI & MLSD-WAN
A green transparent screen is shown over a woman with dark hair and glasses working in front of a computer. The title of the demo is shown: AI-Driven SD-WAN Demo: Firewall, SWG, ZTNA, CASB, and Security Dashboard.”

See firsthand how security functions are designed and implemented in the AI-driven SD-WAN. 

Does protecting your business from cybersecurity threats keep you up at night?  With the Juniper AI-driven SD-WAN, sessions from anywhere in the WAN can get exactly the right security needed to protect your business, and help put your worries to rest. This short demo will show you how. 

Show more

You’ll learn

  • How security is at the heart of the Juniper SD-WAN solution 

  • How the architecture features a “thin branch” approach and how that optimizes cost and performance

  • How security admins receive a focused view of events and threats to effectively and easily monitor security operations 

Who is this for?

Security Professionals Network Professionals

Transcript

0:06 This demonstration shows how security functions are designed and implemented throughout the

0:11 WAN.

0:12 Security is at the heart of the Juniper SD-WAN solution.

0:16 The architecture features a “thin branch” approach, which distributes standard L4 network,

0:21 and enhanced L7 security everywhere while centralizing advanced security to optimize

0:27 cost and performance.

0:29 In our networks across the WAN, we have isolated segments created for our corporate users,

0:34 guests, point-of-sale devices, IoT devices, and more.

0:38 Looking to our branch WAN edge template, we can see how the policy for these different

0:43 segments are designed.

0:45 Every branch site using the template will host the various branch network segments,

0:49 each isolated from one another.

0:52 Traffic steering policies describe different ways we intend to use the branch topology

0:56 to connect users with applications.

0:58 Finally, our access policies tie it all together, describing how traffic from each network should

1:04 be handled.

1:05 For example, for sessions from our corporate users going to the internet, we want to steer

1:09 them to the Juniper Secure Edge for functions such as Secure Web Gateway and Cloud Access

1:15 Security Broker.

1:16 Microsoft 365 uses a policy to optimally route direct from the branch over broadband.

1:23 For a variety of policies, we use native Intrusion Detection & Prevention applied to the sessions

1:28 natively within the branch WAN Edge.

1:31 And finally, we see our Guest Internet traffic is going to use broadband breakout, with web

1:36 filtering applied.

1:38 For our security admin, the Juniper solution offers a focused view of events and threats

1:43 for security operations.

1:45 Using our cloud based Secure Edge connected to the WAN, we can manage advanced policies

1:49 for Secure Web Gateway, Cloud Access Security Broker, Network Anti-virus, advanced threat

1:55 protection, and more.

1:57 Sessions from anywhere in the WAN can get exactly the right security needed to protect

2:02 the business.

Show more