Hi [[ session.user.profile.firstName ]]

Juniper Networks (US)

  • Date
  • Rating
  • Views
  • Transport Architecture Simplification with Segment Routing (SR) & EVPN
    Transport Architecture Simplification with Segment Routing (SR) & EVPN
    Ron Bonica, Distinguished Engineer Recorded: Jun 17 2019 60 mins
    In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.

    In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
  • Codifying Network Configuration Through Simple Declarative Automation
    Codifying Network Configuration Through Simple Declarative Automation
    David Gee Recorded: Jun 12 2019 32 mins
    This webinar will take users through a brief journey to introduce imperative- and configuration-driven automation, and how they can move to declarative automation where we ask ‘what’ to automate rather than ‘how’. We are using a tool called Terraform to achieve this, and currently developing Terraform Junos providers with the initial release for QFX Series switches being set for Q2/2019.

    In this online session we will cover a simple use case showing the difference between an imperative lead approach and the powerful gains achieved by using the declarative approach. By the end of the webinar, attendees will understand the CRUD (Create, Read, Update, Delete) pattern used and its enormous power for automation pipelines.

    Demonstrations will be provided on the webinar with links so attendees can repeat in their own time.

    Introduction to declarative automation
    Difference from imperative automation
    Introduction to Terraform
    Exploration of CRUD
    Observing a CI/CD pipeline with declarative
  • Test-Driven Network Automation
    Test-Driven Network Automation
    Matthew Oswalt Recorded: Jun 11 2019 39 mins
    One of the key tenets of network reliability engineering (NRE) is the ability to test that your network is doing the thing it should be doing. There are numerous tools you can use to accomplish this, but these are spread over several levels of testing and verification tasks you may want to be conducting. In addition, the types of things you'll want to test will vary between the different areas of your network.

    In this webinar, we'll explore all of these aspects, and explore the kinds of tools and techniques you'll need to proactively guarantee that your network is providing the services your organization needs it to provide.
  • The Combination of Automated Detection with Automated Enforcement
    The Combination of Automated Detection with Automated Enforcement
    Dwann Hall Recorded: Jun 11 2019 22 mins
    Security automation is getting all the attention and focus, but this doesn’t mean the transition will occur overnight. Current efforts have focused on addressing the alert fatigue being experienced in the SOC – putting it simply they have too much data and not enough people. Advances in automation will sift through this barrage of data, detecting threats and in terms of security automation making life easier for the SOC. However, this optimisation of detection means that the constraint has moved from detection to enforcement.

    In this webinar we will look at this next stage of the security automation journey; combining automated detection with automated enforcement to improve the overall throughput and response of this workflow.
  • Network Automation: Network Automation is About Reliability
    Network Automation: Network Automation is About Reliability
    Derick Winkworth Recorded: Jun 10 2019 32 mins
    During this first webinar Derick Winkworth will discuss the on-going transformation of network automation into Network Reliability Engineering.

    Automation, first and foremost, is about reliability. Learn how network engineers have an important role to play in the reliability engineering space, bringing their expertise to bear on the tools and practices used to make network operations more reliable.

    Learn how you can use automation today to help you be more effective as a network engineer
    Learn how to talk to other network engineers and operations managers about reliability engineering
  • Delivering an Application Led Network
    Delivering an Application Led Network
    John Orbe Recorded: Jun 10 2019 61 mins
    Enterprises are adopting cloud at an increasing pace, and with it their expectations from network services are changing. There has been a shift of focus away from bandwidth-based connectivity services. Instead, enterprises are looking for providers that can promise simplicity and flexibility in how they design, deploy, secure, monitor and manage networking services in a “multicloud” world. This means delivering secure, managed networking – not just in the WAN, but in the LAN and datacenter as well.


    In this session STL Partners will join Juniper and IBM to share our latest analysis on enterprise network trends. We will argue that the current appetite for SD-WAN is an opportunity for service providers to play a bigger role in helping enterprises to make the transition to multicloud and set out the pathways to making this happen.
  • What Nature Can Tell Us About IoT Security at Scale
    What Nature Can Tell Us About IoT Security at Scale
    Ben Baker, Director, Strategic Marketing, Juniper Networks Recorded: Jun 4 2019 29 mins
    The scale and complexity of networks supporting IoT will quickly outstrip human capabilities to defend them. Devices can be elusive; they will hide behind gateways and roaming arrangements. The challenge is how to monitor and learn the behavior of the different classes of devices. IoT devices are like flocks of birds: they move in large groups in the same direction; when one deviates, usually the rest of the group deviates. We can use unsupervised machine learning techniques with a 5-step process to help solve the IoT Security problem. 1. Observe; 2. Cluster; 3. Detect Anomalies; 4. Root Cause Analysis; 5. Remediate.
  • Mist vs Meraki - Not All Clouds are Created Equal
    Mist vs Meraki - Not All Clouds are Created Equal
    Wes Purvis and Gene Sawyer Recorded: May 27 2019 69 mins
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Mist vs Meraki - Not All Clouds are Created Equal
    Mist vs Meraki - Not All Clouds are Created Equal
    Wes Purvis and Gene Sawyer Recorded: May 22 2019 69 mins
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Light Reading Webinar: Key Considerations for 5G Security Strategy
    Light Reading Webinar: Key Considerations for 5G Security Strategy
    Irene Zhang and Jim Hodges Recorded: Apr 26 2019 62 mins
    5G promises to be a game changer. It is not just about faster, but also about enabling a diverse new set of services and vertical use cases, including the support of IoT. Security is fundamental to the successful delivery of 5G networks and services. This heterogeneity of applications and scale of 5G communication will be challenging to balance the efficiency and accuracy of security management and policy control. In addition, the use of edge computing, virtualization, CUPS and network slicing creates new attack vectors that service providers need to consider. Join this webinar to learn: What’s new and different from 4G to 5G? What are the security implications from evolving to 5G and IoT? What needs to change? Here's what service providers need to consider when planning for 5G security strategy.

Embed in website or blog