Hi [[ session.user.profile.firstName ]]

Juniper Networks (US)

  • Date
  • Rating
  • Views
  • Ask the Expert: Part 6 How to Win the Game of Security Cat and Mouse
    Ask the Expert: Part 6 How to Win the Game of Security Cat and Mouse
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Jan 22 2019 3 mins
    Laurence Pitt, Security Strategy Director at Juniper Networks explains why a key challenge for many security organizations, is the time required to simply maintain a baseline of security. Becoming overwhelmed in activity can prevent security teams from improving existing processes, which creates an ideal environment for cyber criminals who are typically on the offense and have studied the security model's vulnerabilities. Laurence makes the case that organisations need to use their internal data to establish baselines in behaviour, as this information will not be available to attackers.
  • Rethinking Security Models
    Rethinking Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Recorded: Dec 6 2018 23 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Dynamic, Adaptive Multicloud Security
    Dynamic, Adaptive Multicloud Security
    Prasad Raviraj Solutions Marketing SR Manager, Security Recorded: Nov 29 2018 14 mins
    Price, agility, scale, global footprint, and availability of emerging technologies (such as AI, Serverless, IOT, etc) within the cloud platforms have contributed to the rapid adoption of multicloud by businesses across the globe. However, helping business adopt these technologies and deployment models while keeping the network safe from attack is a major challenge for even the most seasoned of security professionals. In this session we will explore how a three-pronged approach using Juniper Networks Unified Cybersecurity Platform can help businesses get multicloud security right.
  • Dynamic, Adaptive Multicloud Security
    Dynamic, Adaptive Multicloud Security
    Prasad Raviraj Solutions Marketing SR Manager, Security Recorded: Nov 21 2018 14 mins
    Price, agility, scale, global footprint, and availability of emerging technologies (such as AI, Serverless, IOT, etc) within the cloud platforms have contributed to the rapid adoption of multicloud by businesses across the globe. However, helping business adopt these technologies and deployment models while keeping the network safe from attack is a major challenge for even the most seasoned of security professionals. In this session we will explore how a three-pronged approach using Juniper Networks Unified Cybersecurity Platform can help businesses get multicloud security right.
  • Harnessing Automation Against Advanced Threats
    Harnessing Automation Against Advanced Threats
    Frank Jas, Distinguished Engineer, Juniper Networks Recorded: Sep 19 2018 35 mins
    So, you've finally taken the mantra "Assume breach" to heart and deployed a security solution that detects the advanced threats that slip past your perimeter. Now what? The onslaught of new threat alerts could quickly overwhelm your already overextended SOC team.

    In this session, we'll discuss the how security automation can help you pinpoint the exact location and severity of an advanced attack and how to deploy automation with an eye to the time and cost savings relative to your unique SOC workflow.
  • Ponemon: The Challenge of Building the Right Security Automation Architecture
    Ponemon: The Challenge of Building the Right Security Automation Architecture
    Larry Ponemon, Chairman and Founder, Ponemon Institute; Amy James, Director of Security Portfolio Marketing Juliper Networ Recorded: Sep 6 2018 41 mins
    Companies are facing decisions on how to implement automation into their Security Infrastructure. They are looking to understand how, when, and where to implement the right automation capabilities in order to improve productivity, reduce costs, scale to support cloud deployments, and ultimately strengthen the security posture of the business.

    Juniper collaborated with Ponemon and discussed this problem with over 2,000 Security Practitioners, to see how they are addressing:
    •The importance of security automation to cybersecurity
    •Implementation of security automation architecture
    •Challenges and barriers to security automation adoption

    During this webinar, we will review the findings and discuss how your company can apply them to existing plans or where to start putting a plan together.
  • Ask the Expert: Part 3 Turning Data into Wisdom
    Ask the Expert: Part 3 Turning Data into Wisdom
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Aug 7 2018 2 mins
    Lee Fisher, Head of Security EMEA at Juniper Networks explains that before organisations can begin to harness machine learning and artificial intelligence in their operations, they first need data. A proliferation of devices and RFID tags has created an abundance of data, but Lee points out that organisations need to understand how to use this data to build knowledge and protect themselves by establishing a baseline of normal activity that will enable them to identify abnormal activity.
  • Ask the Expert: Part 2 It’s not what something is, it’s what it does
    Ask the Expert: Part 2 It’s not what something is, it’s what it does
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Jul 31 2018 3 mins
    Lee Fisher, Head of Security EMEA at Juniper Networks ask why some organisations take so long to respond to malware threats, even in cases where attacks are announced several months in advance. Security protocols are often built on the concept of time, giving security teams a head start to detect the threat in the future. Watch Lee discuss how this window of opportunity causes organisations to be less responsive, and what needs to be addresses to monitor the behaviour of malware.

    Part 1: https://www.brighttalk.com/webcast/16375/328243
  • Ask The Experts: Part 1 Using Automation to fight automation
    Ask The Experts: Part 1 Using Automation to fight automation
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Jul 24 2018 3 mins
    Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.

    Part 2: https://www.brighttalk.com/webcast/16375/328257
  • Harnessing Cybersecurity Automation
    Harnessing Cybersecurity Automation
    Holly Schipper, Product Marketing Manager, Cybersecurity. Juniper Networks Recorded: Jul 17 2018 21 mins
    An understaffed security workforce is struggling to protect your evolving enterprise from ever changing cyber threats. Automation could be the answer to hardening your security posture in these shifting sands. However, the task of implementing automation across such a diverse and continuously morphing environment presents a challenge.

    In this webinar, we will discuss the benefits, complexities and best practices of implementing security automation.

Embed in website or blog