Jo Peterson, Vice President, Cloud and Security Services, Clarify360

Simplifying the SASE Experience

Industry Voices Security
The image is of Juniper’s Samantha Madrid and Clarify360’s Jo Peterson sitting at a conference table talking. A television behind them shows the Juniper Networks logo.

Just how threat aware is your network?

Listen as Juniper’s Samantha Madrid and Clarify360’s Jo Peterson discuss how Juniper is bringing security to every point of connection to protect user applications and network infrastructure when a breach occurs. Learn more about Juniper’s evolving and highly intelligent Connected Security, safeguards, as well as important new additions to full-stack SASE solutions. 

Show more

You’ll learn

  • The importance of extending Zero Trust principles from the edge into the data center

  • The impact of DLP and CASB functionalities in future-proofing your environment 

  • How Connected Security safeguards and supports all types of environments 

Who is this for?

Network Professionals Security Professionals

Host

Jo Peterson
Vice President, Cloud and Security Services, Clarify360

Guest speakers

Samantha Madrid Headshot
Samantha Madrid
Group Vice President, Security Business and Strategy, Juniper Networks

Transcript

0:09 i'm here today at rsa and i'm so happy

0:12 to be here it's exciting i'm i'm here

0:14 with samantha madrid the group vice

0:16 president of security business and

0:18 strategy at juniper networks

0:20 joe thank you for taking the time i'm

0:23 really looking forward to this

0:24 conversation me too i love the energy

0:27 here can you feel it i really can i mean

0:29 in a way it's like it took me back to

0:32 the early days of rsa in my career

0:35 being here it was like all the energy

0:37 the excitement everybody kind of saying

0:40 hello

0:41 learning sharing

0:43 it's exciting

0:44 i think you know i i missed it

0:47 yeah easy i mean it's it's easy to feel

0:49 like we missed it um and i know that

0:52 juniper is such a big part of the rsa

0:55 community and there's communities within

0:57 communities i feel like

0:59 you have a dedicated community of users

1:02 that use your products

1:04 but what some people may not know is

1:06 that juniper has been really really

1:09 forward uh in their support of the cloud

1:12 security alliance how does community and

1:15 the alliance help strengthen the whole

1:17 infosys community at large well i think

1:20 when you think of cyber

1:22 it is the bedrock community is the

1:24 bedrock of

1:26 really great threat intelligence

1:29 i think the the as an industry

1:32 we've kind of

1:33 built from that and one of the things

1:36 that i'm super proud of that juniper has

1:38 done is really um integrate ourselves

1:41 into the community

1:43 you know it's not just about the

1:45 intelligence and the technologies we

1:47 create it's how we can share

1:49 that intelligence with the collective

1:51 it's how can we

1:52 share early indicators of compromise and

1:55 insights

1:56 with the the global threatened community

1:59 and one organization you know that i'm

2:01 very proud to be a part of is the cyber

2:03 threat alliance so cta has been a

2:06 long-standing organization that is

2:08 dedicated to understanding threat

2:11 landscape

2:12 and sharing that intelligence

2:15 with all of its member

2:16 companies i was actually

2:19 recently voted in to serve on their

2:21 board

2:22 and and fun fact i'm the first woman to

2:25 ever serve on the board for the cyber

2:27 threat alliance so i'm very very honored

2:29 uh and excited about that okay can we

2:31 just take a moment and stand still and

2:33 go preach

2:38 that is

2:39 so awesome as i

2:42 look out into the marketplace and as i

2:43 work with customers what i'm seeing is

2:46 worlds coming together and what i mean

2:48 by that is

2:49 you know for years we had silos and i'm

2:51 not saying that we we don't still have

2:53 silos but

2:55 how many network people are responsible

2:57 for security raise your hand how many

2:59 security people are responsible for

3:01 network raise your hand so we're

3:03 starting to see these groups talk

3:05 together and work together on projects

3:07 and connection has always been an

3:09 important thing for juniper so can you

3:12 share take minute and share juniper's

3:15 connected security strategy absolutely

3:18 and i was i'm so glad you asked that

3:19 because i was going to weave it in

3:21 if you hadn't but that's really been the

3:24 whole premise behind the connected

3:26 security strategy it was to bring

3:28 security to every point of connection so

3:30 we could safeguard users applications

3:33 and the infrastructure when a breach

3:35 happens

3:36 the onus just doesn't just fall on the

3:38 security team

3:40 everybody

3:41 is called to action the networking teams

3:44 and the security teams alike to remedy

3:46 the situation understand the situation

3:49 and plug any potential hole

3:51 and so to only think about this as a

3:55 security problem that can only be solved

3:58 with security products i think is

4:00 selling the opportunity short and so the

4:02 secure the context security ship

4:04 strategy

4:05 has always been about weaving

4:08 intelligence in

4:10 so again back to we were just talking

4:11 about the collective intelligence

4:13 weaving that in so your routers your

4:16 switches and your access points can make

4:18 smart security decisions

4:20 in concert with your security technology

4:23 like your firewall your application

4:25 security and things like that that

4:27 everything is working together

4:29 communicating together so that you truly

4:32 have

4:33 visibility across the entire network and

4:36 so that's the connected security

4:37 strategy and what we've been executing

4:39 against

4:40 for nearly four years now that's awesome

4:43 you know and it seems like the only

4:44 thing constant in i.t is change right

4:48 and i've read this really interesting

4:49 statistic about how

4:52 globally cloud

4:55 will be

4:56 approaching the 500 billion all forms of

4:59 cloud mark by the end of this year wow

5:01 that's up 24

5:03 from last year wow so you would think

5:06 okay maybe you're one of the pandemic

5:08 it would have gone up but it

5:10 significantly continues to increase and

5:12 i know that juniper has been part of

5:14 that story

5:15 how is this connected strategy able to

5:18 support customers in hybrid environments

5:21 or whatever kind of environment they

5:23 have the premise is to bring security at

5:25 every point of connection we know there

5:27 is you know

5:29 security architectures

5:30 and network architectures are vast you

5:32 have distributed you mentioned cloud and

5:35 this move to cloud it should be an

5:37 extension of what you have today in your

5:40 environment it shouldn't be building

5:42 from scratch

5:43 so you know last year we introduced uh

5:45 security director cloud and that was a

5:47 cloud delivered security platform that

5:50 allows for customers to manage all of

5:52 their security technologies um

5:55 as well as manage that transition to the

5:57 to the cloud

5:59 earlier this year we we introduced our

6:02 uh secure edge which is our cloud

6:04 delivered security stack

6:07 that allows that for them to continue

6:10 that uh transition

6:12 and so there's no break invisibility

6:14 there's no break in in their ability to

6:17 secure their organization

6:19 but what it does do

6:21 is that it allows them to make that

6:23 transition at their pace

6:26 and so when we started hearing a lot

6:28 about the the

6:30 sassy architecture and the promise to be

6:33 able to

6:34 bring network and security together

6:37 right for

6:38 improved operations and and heightened

6:41 security we're like

6:43 this is what we've been delivering for

6:45 the past four years this is the

6:47 connected security strategy

6:49 and you've had some exciting

6:51 announcements here at rsa

6:54 and i know that some of

6:56 the

6:56 um

6:57 some of that news has created sort of

6:59 this whole full stack vision yeah can

7:02 you chat about that a little bit well

7:05 absolutely so you mentioned uh something

7:07 a moment ago you talked about how it's

7:09 not just a bunch of uh standalone

7:12 technologies

7:13 and i think you know what i've started

7:15 to see and this is why i had a lot of

7:18 conviction in our strategy

7:20 was sassy or the shift to cloud isn't

7:23 just taking what you have on

7:25 premise yeah and forklifting it to the

7:27 cloud calling it cloud delivered and

7:29 then i have a sassy strategy

7:32 no it should be a continuation so part

7:35 of that continuation or realizing that

7:38 is that full stack software uh for sassy

7:42 that means it's the one engine

7:45 right that is able to manage your

7:48 firewall policies

7:49 your secure web access policies

7:52 your uh cloud application policies

7:55 and your advanced dlp

7:57 so the customer burden is

8:00 removed when you're thinking about if i

8:03 have all of my security policies today

8:05 and i'm trying to translate that to

8:06 security you're not having to do that

8:08 manually

8:10 that's the key thing i was actually just

8:11 talking to someone earlier this morning

8:13 and they were talking about how one of

8:16 the biggest challenges that they're

8:18 starting to see

8:20 on an adoption of sassy is the fact that

8:24 they're starting to see um

8:26 vulnerabilities occur in customer

8:28 environments

8:29 because they're having to do all of this

8:32 manually

8:33 it's increasing human error

8:35 and and so while you you know

8:38 while you think about this why create

8:41 bigger challenges for ourselves

8:43 when you could just take your existing

8:45 policies

8:47 and with literally a click of a button

8:49 move those over

8:51 to cloud policies you're not taking on

8:54 any operational burden uh for the

8:56 customer and

8:58 you're able to have that seamless

9:00 security across the board yeah you make

9:03 a really good point because the number

9:05 one

9:06 issue around cloud security last year

9:09 was misconfiguration

9:10 yeah i mean

9:12 human error was the number one thing

9:14 that happened i believe they were secure

9:17 in things they weren't securing things

9:19 they didn't know that they needed to

9:20 secure them and it's confusing

9:23 right it's confusing for one person to

9:25 have to

9:26 manage all these multiple systems

9:29 um but take you know take a minute if

9:32 you can and besides policy talk to me

9:36 about end user visibility because that

9:39 is super important

9:40 yeah you know i i'm really glad you

9:42 brought that up if you ask any cio or

9:44 cso you know how many users are on their

9:47 network and how many devices they have

9:49 on their network that their users are

9:50 using they probably couldn't answer the

9:52 question confidently

9:54 and and what we strive to do is

9:58 provide that complete visibility one of

10:00 the things that security director cloud

10:03 fosters which powers our secure edge

10:05 solution

10:06 is the

10:08 ability to see

10:10 all devices that are on the network the

10:12 ability to see all users that are on the

10:15 network and then build policies around

10:17 identity

10:19 so if the the identity whether it's

10:21 based on a device a user or an

10:23 application

10:24 can follow

10:26 that entity wherever it is

10:29 and i think that that's really really

10:31 powerful when trying to support a

10:34 multi-cloud environment when trying to

10:36 support a distributed

10:39 network

10:40 that you're not having to build you know

10:44 thousands of policies

10:46 you can build them around

10:49 the the the entity specifically and

10:52 doesn't matter where that entity lives

10:54 that it just follows it

10:56 very forward thinking for you guys to

10:59 include casby into your stack it feels

11:02 like you're trying to future proof for

11:04 the customer

11:06 tell me about your thinking

11:08 in terms of adding casby to the stack

11:11 well casby is about understanding

11:15 applications that the customer doesn't

11:18 own and operate

11:20 right it gives visibility of those

11:23 applications

11:24 but it allows the customer to leverage

11:28 their

11:29 policies and apply it

11:32 to the data and the applications that

11:34 are outside their span of control

11:37 so they're not having to break

11:39 visibility

11:40 so if you think about

11:42 uh secure web gateway and firewall as a

11:45 service right there are firewall

11:47 policies that allow for a customer to

11:51 control their network resources

11:53 and or to secure

11:57 web access

11:58 but a lot of those network resources now

12:01 are living in applications

12:03 public applications

12:05 that again the

12:07 customer does not own

12:10 but their confidential information

12:13 is there

12:14 so

12:15 it only made sense if we're building

12:18 identity-based policies that follow the

12:20 user and follow the device

12:22 that that extended to public

12:26 applications

12:27 that it extended

12:29 the uh secure access to understanding

12:33 what is actually living in those

12:35 applications and is there any risk

12:37 associated with that so it's putting the

12:39 administrators back in the driver's seat

12:42 of their data

12:44 and really about securing the centers of

12:47 data

12:49 not just the data center

12:51 right and it feels like there was

12:54 very thoughtful thinking

12:56 as it relates to even the data because

12:59 you added a dlp element

13:02 so people forget about securing the data

13:04 i feel sometimes and that was a good

13:06 move was that your thinking was just to

13:08 think about the entire environment well

13:10 when you think of zero trust and i think

13:13 of sassy just the other side of the same

13:14 point

13:15 right zero trust should extend

13:18 to wherever the data resides and at the

13:22 and at the root of zero trust to me is

13:24 about identity and data

13:26 and if the data is living outside the

13:30 the kind of

13:31 traditional corporate perimeter

13:34 then the the the security needs to

13:36 extend and follow with it i talk about

13:39 it as kind of micro perimeters

13:41 it's creating a micro perimeter around

13:43 the actual

13:45 data itself

13:46 not just to where the data

13:48 lies

13:50 and so you have insight you can take

13:53 action

13:54 and you can adapt that through dlp

13:57 to be able to recognize

13:59 does that data need to be there should

14:01 it be there

14:02 should

14:03 i restrict it

14:05 should i remove it

14:07 right because not all data is created

14:08 equal

14:09 and so you can't have draconian policies

14:13 that either exclude or allow we live in

14:15 an adaptive world

14:17 and i think one of the things that

14:19 employees have really

14:20 shown over this pandemic

14:24 is that they can be highly successful in

14:27 a very flexible world

14:29 and so we need to have flexibility

14:31 around our policy our security needs to

14:33 be flexible and our networks need to be

14:35 flexible

14:36 and so

14:38 we have been laser focused

14:40 on providing that flexibility through

14:42 automation

14:44 so you're not having to take on

14:46 complexity

14:48 and the operational version to get there

14:51 that's great

14:53 what closing thoughts do you have for us

14:55 here at rsa well you know

14:57 again it a lot of talk is around

15:00 transformation

15:02 transformation is opportunity

15:04 but it's predicated on having a great

15:06 experience along the way

15:09 if

15:10 you aren't taking experience into mind

15:12 if that's not a part of that journey

15:16 then you're going to

15:18 over complicate

15:19 the the desired outcome and security has

15:23 been a

15:24 necessity in every type of network but

15:28 has a tendency

15:30 to sometimes become overly complicated

15:34 and it's overly complicated

15:37 because

15:38 security isn't integrated into the

15:40 network

15:41 it stands on the outside

15:44 in very specific locations so we've been

15:47 on this journey through our connected

15:48 security strategy

15:50 to bring security to every point of

15:52 connection

15:53 to safeguard the users the applications

15:55 and the infrastructure

15:57 and now with our latest

16:00 uh announcement

16:02 and addition to secure edge

16:04 we are extending that security

16:07 to cloud

16:09 to cloud-delivered architectures

16:12 and allowing customers truly

16:15 to

16:16 start with their today

16:18 and build for their future

16:20 automatically that's awesome

16:23 well thank you for taking time

16:24 today likewise

Show more