SlideShare a Scribd company logo
1 of 2
Download to read offline
Case Study
1
Expedient Data Centers provides IT infrastructure outsourcing services, including
managed services, private and public cloud, colocation, and enterprise access to
businesses. Expedient is known for its highly reliable and interconnected facilities,
leading-edge services, and technically competent customer service. The privately-held
company has data centers in Boston, Baltimore, Cleveland, Columbus, Indianapolis,
Memphis, and Pittsburgh.
Business Challenge
Businesses, schools, and government agencies rely on Expedient’s managed network
security services to keep their data safe and available and to keep sophisticated threats
from interrupting their businesses. Expedient wanted to offer customers greater control
over their managed security services so that customers could tailor their protection to
their business needs and compliance requirements.
Technology Solution
To support a more flexible and customizable managed security service, Expedient
wanted to migrate from its physical firewalls to a virtual firewall solution. A year ago,
Expedient deployed Juniper Networks®
vSRX Services Gateway to support its managed
security service, allowing each customer to have its own dedicated firewall. With
vSRX, customers can leave the traditional, monolithic firewall environment behind for
a new solution with granular security control. vSRX provides strong security with the
performance and scale needed in today’s virtualized world, with advanced security and
rich networking and routing delivered in a virtual machine.
Business Results
Expedient can now offer security services that are tailored to customers’ specific needs
and accelerate service delivery. More than 50 Expedient customers use vSRX and the
company expects significant growth as other customers are migrated from its physical
firewall infrastructure.
“One of the big positives of vSRX is the different services we can offer to
customers. Using virtual security services has freed up engineering cycles
and support time, which has allowed us to introduce services faster.”
Bryan Smith, Regional Vice President, Expedient
Expedient Keeps Customers’
Networks Safe and Highly
Available with vSRX
Summary
Company:
Expedient Data Centers
Industry:
Technology
Business Challenge:
Quickly provision managed security
services that are tailored to
customer needs
Technology Solution:
Juniper Networks MetaFabric
Architecture, which includes:
•	vSRX
•	 Junos Space Virtual Director
•	 Junos Space Security Director
Business Results:
•	 Offered highly customized
managed security services
•	 Used automation to deploy
security services in minutes,
not hours
•	 Simplified security operations
Corporate and Sales Headquarters
Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089 USA
Phone: 888.JUNIPER (888.586.4737)
or +1.408.745.2000
Fax: +1.408.745.2100
www.juniper.net
Copyright 2015 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos
and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries.
All other trademarks, service marks, registered marks, or registered service marks are the property of their
respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
APAC and EMEA Headquarters
Juniper Networks International B.V.
Boeing Avenue 240
1119 PZ Schiphol-Rijk
Amsterdam, The Netherlands
Phone: +31.0.207.125.700
Fax: +31.0.207.125.701
Case StudyExpedient Keeps Customers’ Networks Safe and Highly Available with vSRX
3520505-002-EN Feb 2015
To handle the demand, Expedient has customized and
automated the deployment of its managed security service,
cutting provisioning from hours to minutes. Security automation
allows Expedient to get customers connected and protected
faster—and significantly reduces the workload of the security
operations center. That efficiency is important for the security
operations team, which provides around-the-clock service,
support, and monitoring of customers’ networks.
In addition, customers can manage their own security rules with
Expedient’s self-service option to meet specific business needs or
compliance requirements. Customers have such granular control
over their security policies that they can even enforce different
policies for different applications.
vSRX has enabled Expedient to introduce new products and
services to customers. “One of the big positives of vSRX is the
different services we can offer to customers,” says Bryan Smith,
regional vice president at Expedient. “Using virtual security
services has freed up engineering cycles and support time, which
has allowed us to introduce services faster.”
Expedient uses full automation to fail over a customer’s site from
one data center to another in a matter of minutes. No changes
to Domain Name System (DNS) or IP addresses are made
at the failover site, which vastly simplifies disaster recovery.
This service leverages both vSRX and VMware vCenter Site
Recovery Manager. “Customers can push a button and move
their environment from one Expedient location to another, and
bring it back up immediately,” says Smith. “It’s important to make
disaster recovery easier, because you don’t know what your
employees will be focused on when the time comes.”
Expedient customers can take advantage of comprehensive
security services, including intrusion detection and prevention
and antivirus and antispam protection, based on the advanced
security capabilities of vSRX. Advanced services are critical, as
threats are increasingly sophisticated and organizations of all
types are under constant attack.
With vSRX, Expedient can better protect each customer from
cyberthreats. In a multitenant model with traditional firewalls, if
one customer experiences a cyberattack, the attack could impact
all customers sharing the same physical firewall. Now with vSRX,
an attack or a spike in traffic is isolated to that customer only.
“Not only has vSRX allowed us to speed service delivery to our
customers, but it also has reduced operational complexity,” says
Kevin Meyer, director of product engineering at Expedient. For
instance, with vSRX, Expedient’s operation staff works with a
much smaller firewall rule set, which simplifies operations and
mitigates the risk of error.
Next Steps
Expedient is expanding data center locations and offering new
services. Its managed security service is contributing to that growth,
as Expedient migrates more customers to the service based on
vSRX. Expedient and Juniper Networks also are working closely
together to explore the boundaries of scalability and performance
of virtual security for cloud services as well as across multiple
hypervisors. Expedient is looking to test higher speed throughput
in the next-generation vSRX as well as expand the service to
include multiple hypervisors. Expedient plans to take advantage of
advances in Intel processor technology to accelerate encryption,
and Juniper Networks tools to provide its 24x7 operation support
team with a single, easy-to-use interface to manage its ever-
growing technology infrastructure.
For More Information
To find out more about Juniper Networks products and solutions,
please visit www.juniper.net.
About Juniper Networks
Juniper Networks is in the business of network innovation. From
devices to data centers, from consumers to cloud providers,
Juniper Networks delivers the software, silicon and systems that
transform the experience and economics of networking. The
company serves customers and partners worldwide. Additional
information can be found at www.juniper.net.

More Related Content

What's hot

Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Happiest Minds Technologies
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threatswhite paper
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudJohn Atchison
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCholavaram Sai
 
V mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paperV mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paperEMC
 
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Kanishka Ramyar
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technologyrosswilks1
 
IN PICTURES: Software Defined Networking from IBM_Next Generation Network Ag...
IN PICTURES:  Software Defined Networking from IBM_Next Generation Network Ag...IN PICTURES:  Software Defined Networking from IBM_Next Generation Network Ag...
IN PICTURES: Software Defined Networking from IBM_Next Generation Network Ag...Kanishka Ramyar
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix
 

What's hot (20)

Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
V mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paperV mware sddc-micro-segmentation-white-paper
V mware sddc-micro-segmentation-white-paper
 
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...Software Defined Networking from IBM_Next Generation Network Agility_ White P...
Software Defined Networking from IBM_Next Generation Network Agility_ White P...
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Datacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter SchjøttDatacenter 2014: Symantec - Peter Schjøtt
Datacenter 2014: Symantec - Peter Schjøtt
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Product Assessment and Consulting Offerings
Product Assessment and Consulting OfferingsProduct Assessment and Consulting Offerings
Product Assessment and Consulting Offerings
 
IN PICTURES: Software Defined Networking from IBM_Next Generation Network Ag...
IN PICTURES:  Software Defined Networking from IBM_Next Generation Network Ag...IN PICTURES:  Software Defined Networking from IBM_Next Generation Network Ag...
IN PICTURES: Software Defined Networking from IBM_Next Generation Network Ag...
 
Citrix Netscaler Deployment Guide
Citrix Netscaler Deployment GuideCitrix Netscaler Deployment Guide
Citrix Netscaler Deployment Guide
 

Similar to Case_Study__Juniper_Expedient_2015

Virtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyVirtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyoneneckitservices
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)VMware
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareSelena829218
 
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...Juniper Networks UKI
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochureSteve Tester
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data CenterJason Basye
 
The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.Tech Data
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentationNAISales2
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture Italia
 
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...online Marketing
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 

Similar to Case_Study__Juniper_Expedient_2015 (20)

Document case study-Systweak - Go4Hosting
Document case study-Systweak - Go4HostingDocument case study-Systweak - Go4Hosting
Document case study-Systweak - Go4Hosting
 
Virtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case studyVirtual Private Servers (vps)- a case study
Virtual Private Servers (vps)- a case study
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
 
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
Cloud Dynamics levearges SDN to speed customers journey to the Cloud - Case S...
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
 
NewStar NIMS Profile
NewStar NIMS ProfileNewStar NIMS Profile
NewStar NIMS Profile
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Arup
ArupArup
Arup
 
The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.The changing landscape of SDN. What your customers need to know.
The changing landscape of SDN. What your customers need to know.
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 

Case_Study__Juniper_Expedient_2015

  • 1. Case Study 1 Expedient Data Centers provides IT infrastructure outsourcing services, including managed services, private and public cloud, colocation, and enterprise access to businesses. Expedient is known for its highly reliable and interconnected facilities, leading-edge services, and technically competent customer service. The privately-held company has data centers in Boston, Baltimore, Cleveland, Columbus, Indianapolis, Memphis, and Pittsburgh. Business Challenge Businesses, schools, and government agencies rely on Expedient’s managed network security services to keep their data safe and available and to keep sophisticated threats from interrupting their businesses. Expedient wanted to offer customers greater control over their managed security services so that customers could tailor their protection to their business needs and compliance requirements. Technology Solution To support a more flexible and customizable managed security service, Expedient wanted to migrate from its physical firewalls to a virtual firewall solution. A year ago, Expedient deployed Juniper Networks® vSRX Services Gateway to support its managed security service, allowing each customer to have its own dedicated firewall. With vSRX, customers can leave the traditional, monolithic firewall environment behind for a new solution with granular security control. vSRX provides strong security with the performance and scale needed in today’s virtualized world, with advanced security and rich networking and routing delivered in a virtual machine. Business Results Expedient can now offer security services that are tailored to customers’ specific needs and accelerate service delivery. More than 50 Expedient customers use vSRX and the company expects significant growth as other customers are migrated from its physical firewall infrastructure. “One of the big positives of vSRX is the different services we can offer to customers. Using virtual security services has freed up engineering cycles and support time, which has allowed us to introduce services faster.” Bryan Smith, Regional Vice President, Expedient Expedient Keeps Customers’ Networks Safe and Highly Available with vSRX Summary Company: Expedient Data Centers Industry: Technology Business Challenge: Quickly provision managed security services that are tailored to customer needs Technology Solution: Juniper Networks MetaFabric Architecture, which includes: • vSRX • Junos Space Virtual Director • Junos Space Security Director Business Results: • Offered highly customized managed security services • Used automation to deploy security services in minutes, not hours • Simplified security operations
  • 2. Corporate and Sales Headquarters Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or +1.408.745.2000 Fax: +1.408.745.2100 www.juniper.net Copyright 2015 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. APAC and EMEA Headquarters Juniper Networks International B.V. Boeing Avenue 240 1119 PZ Schiphol-Rijk Amsterdam, The Netherlands Phone: +31.0.207.125.700 Fax: +31.0.207.125.701 Case StudyExpedient Keeps Customers’ Networks Safe and Highly Available with vSRX 3520505-002-EN Feb 2015 To handle the demand, Expedient has customized and automated the deployment of its managed security service, cutting provisioning from hours to minutes. Security automation allows Expedient to get customers connected and protected faster—and significantly reduces the workload of the security operations center. That efficiency is important for the security operations team, which provides around-the-clock service, support, and monitoring of customers’ networks. In addition, customers can manage their own security rules with Expedient’s self-service option to meet specific business needs or compliance requirements. Customers have such granular control over their security policies that they can even enforce different policies for different applications. vSRX has enabled Expedient to introduce new products and services to customers. “One of the big positives of vSRX is the different services we can offer to customers,” says Bryan Smith, regional vice president at Expedient. “Using virtual security services has freed up engineering cycles and support time, which has allowed us to introduce services faster.” Expedient uses full automation to fail over a customer’s site from one data center to another in a matter of minutes. No changes to Domain Name System (DNS) or IP addresses are made at the failover site, which vastly simplifies disaster recovery. This service leverages both vSRX and VMware vCenter Site Recovery Manager. “Customers can push a button and move their environment from one Expedient location to another, and bring it back up immediately,” says Smith. “It’s important to make disaster recovery easier, because you don’t know what your employees will be focused on when the time comes.” Expedient customers can take advantage of comprehensive security services, including intrusion detection and prevention and antivirus and antispam protection, based on the advanced security capabilities of vSRX. Advanced services are critical, as threats are increasingly sophisticated and organizations of all types are under constant attack. With vSRX, Expedient can better protect each customer from cyberthreats. In a multitenant model with traditional firewalls, if one customer experiences a cyberattack, the attack could impact all customers sharing the same physical firewall. Now with vSRX, an attack or a spike in traffic is isolated to that customer only. “Not only has vSRX allowed us to speed service delivery to our customers, but it also has reduced operational complexity,” says Kevin Meyer, director of product engineering at Expedient. For instance, with vSRX, Expedient’s operation staff works with a much smaller firewall rule set, which simplifies operations and mitigates the risk of error. Next Steps Expedient is expanding data center locations and offering new services. Its managed security service is contributing to that growth, as Expedient migrates more customers to the service based on vSRX. Expedient and Juniper Networks also are working closely together to explore the boundaries of scalability and performance of virtual security for cloud services as well as across multiple hypervisors. Expedient is looking to test higher speed throughput in the next-generation vSRX as well as expand the service to include multiple hypervisors. Expedient plans to take advantage of advances in Intel processor technology to accelerate encryption, and Juniper Networks tools to provide its 24x7 operation support team with a single, easy-to-use interface to manage its ever- growing technology infrastructure. For More Information To find out more about Juniper Networks products and solutions, please visit www.juniper.net. About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at www.juniper.net.