Hi [[ session.user.profile.firstName ]]

Juniper Connected Security

Organizations continue to evolve beyond just premises-based IT deployments and are leveraging multicloud to transform IT. As this transformation takes place, it increases the speed they can move, but also the complexity of their environment, heightening the need for fast and elastic protection from advanced threats. Organizations need automated, repeatable security across their entire network. Juniper Connected Security gives organizations the ability to safeguard users, applications and infrastructure by extending security to all points of connection across the network.
Key validation points:
-Safeguard users, applications and infrastructure against advanced threats
-Automate security coverage from endpoints to edge and every cloud in between
-Multicloud-ready with fast and elastic protection
-See who and what is on your network and enforce policy across all connection points
-End-to-end, top-to-bottom best-in-class secure networking
-Open, since no one has a security green field and we must build on security solutions and infrastructure already in play
Recorded Apr 19 2019 21 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Marco Martinez
Presentation preview: Juniper Connected Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Mist vs Meraki - Not All Clouds are Created Equal May 23 2019 8:00 am UTC 69 mins
    Wes Purvis and Gene Sawyer
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Mist vs Meraki - Not All Clouds are Created Equal May 22 2019 3:00 pm UTC 69 mins
    Wes Purvis and Gene Sawyer
    The cloud brings a variety of benefits to network management – from simplified configuration to faster troubleshooting. But, not all clouds are created equal.

    In the past 10+ years, new technologies like microservices and AI have emerged that have made first-generation cloud platforms obsolete.

    Join us for a deep dive into both the Mist and Meraki solutions, comparing/contrasting how you can leverage the different cloud architectures to do the following:

    -Deploy access points simply and quickly
    -Roll out new features on an ongoing basis
    -Monitor and optimize the wired/wireless user experience
    -Proactively troubleshoot problems
    -Collect and use detailed analytics
  • Light Reading Webinar: Key Considerations for 5G Security Strategy Recorded: Apr 26 2019 62 mins
    Irene Zhang and Jim Hodges
    5G promises to be a game changer. It is not just about faster, but also about enabling a diverse new set of services and vertical use cases, including the support of IoT. Security is fundamental to the successful delivery of 5G networks and services. This heterogeneity of applications and scale of 5G communication will be challenging to balance the efficiency and accuracy of security management and policy control. In addition, the use of edge computing, virtualization, CUPS and network slicing creates new attack vectors that service providers need to consider. Join this webinar to learn: What’s new and different from 4G to 5G? What are the security implications from evolving to 5G and IoT? What needs to change? Here's what service providers need to consider when planning for 5G security strategy.
  • Dartmouth College's Network of the Future is Powered by AI Recorded: Apr 23 2019 60 mins
    Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    -Gain visibility into the Wi-Fi user experience
    -Quickly troubleshoot network problems with an AI-driven virtual assistant
    -Predict network problems before they arise
    -Implement personalized location services, such as wayfinding and proximity notifications
  • Juniper Connected Security Recorded: Apr 19 2019 21 mins
    Marco Martinez
    Organizations continue to evolve beyond just premises-based IT deployments and are leveraging multicloud to transform IT. As this transformation takes place, it increases the speed they can move, but also the complexity of their environment, heightening the need for fast and elastic protection from advanced threats. Organizations need automated, repeatable security across their entire network. Juniper Connected Security gives organizations the ability to safeguard users, applications and infrastructure by extending security to all points of connection across the network.
    Key validation points:
    -Safeguard users, applications and infrastructure against advanced threats
    -Automate security coverage from endpoints to edge and every cloud in between
    -Multicloud-ready with fast and elastic protection
    -See who and what is on your network and enforce policy across all connection points
    -End-to-end, top-to-bottom best-in-class secure networking
    -Open, since no one has a security green field and we must build on security solutions and infrastructure already in play
  • Harnessing Machine Learning and Automation Against Advanced Threats Recorded: Apr 16 2019 48 mins
    Frank Jas, Distinguished Engineer
    So, you've finally taken the mantra "Assume breach" to heart and deployed a security solution that detects the advanced threats that slip past your perimeter. Now what? In this session, we describe how advanced threat detection solutions impact incident response and how to deploy security automation to reduce that impact with an eye to time and cost savings relative to your unique SOC workflow.
  • Trends in Advanced Threat Detection & Vulnerability Management Recorded: Apr 16 2019 61 mins
    Wade Woolwine, Rapid7, Ajay Uggirala, Juniper Networks & O'Shea Bowens, Null Hat Security & Paul Crichard, BT Global Services
    As cyber attacks become increasingly common, it is vital for organisations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

    - Trends in Advanced Threat Detection & Vulnerability Management
    - How to use analytics to fight against cyber attacks – patching, detection and response
    - What are the common mistakes made when it comes to Advanced Threat Detection implementation
    - Best practices and recommendations for improving your security posture

    Panel moderated by:
    Michele Drolet, CEO, Towerwall

    Panelists:
    Wade Woolwine, Director of Managed Services, Rapid7
    Ajay Uggirala, Sr. Manager, Product Marketing, Juniper Networks
    O'Shea Bowens, CEO & Founder, Null Hat Security
    Paul Crichard, Security CTO, BT Global Services
  • Rethinking Enterprise Security Models Recorded: Apr 9 2019 22 mins
    Lee Fisher, Head of Security Business EMEA, Juniper Networks
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Network Automation: Getting from Automatable to Automated Recorded: Apr 8 2019 50 mins
    James Kelly
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • How Edge Clouds Will Drive 5G Era Revenue Recorded: Apr 2 2019 64 mins
    Marc Rapoport and Pierre Bichon
    The edge has been a speculative topic for far too long. Service providers have exclusive "beachfront property" in their networks that can be leveraged to drive revenue through innovative service delivery. While edge cloud deployments must align with constrained capital resources by making the most of existing space, compute, power and bandwidth, they have the untapped potential for generating revenue from differentiated capabilities like multicloud connectivity, IoT, video caching, etc. This webinar will explore the specifics of the edge cloud architecture and production-ready deployment strategies that are an imperative part of service provider business models in the 5G era.
  • SD-WAN: Simplify Your Enterprise Customers’ Digital Transformation Recorded: Apr 1 2019 60 mins
    Matt Pooley and CK Lam
    As enterprise organizations look to remain competitive in today’s fast paced market, many are developing digital strategies to reduce cost and increase productivity. As a result, connectivity demands are skyrocketing, and networks are becoming more complex. Enterprises are looking to service providers, like you, to simplify their Wide Area Network, and help ease their transition to digital. In this session, we will discuss how you can leverage an SD-WAN solution, to deliver a secure, managed WAN service to your customers, independent analyst house STL Partners will share their insights into today's enterprise WAN market, and discuss how SD-WAN forms part of a platform for delivering a much broader portfolio of managed services.
  • Rethinking Enterprise Security Models Recorded: Mar 21 2019 22 mins
    Lee Fisher, Head of Security Business EMEA, Juniper Networks
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Rethinking Enterprise Security Models Recorded: Mar 20 2019 22 mins
    Lee Fisher, Head of Security Business EMEA, Juniper Networks
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Network Automation: Getting from Automatable to Automated Recorded: Mar 19 2019 50 mins
    James Kelly
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • Network Automation: Getting from Automatable to Automated Recorded: Mar 19 2019 50 mins
    James Kelly, Enterprise Marketing, Juniper Networks
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • Driving Architectural Transformation with Routing Innovation Recorded: Mar 5 2019 65 mins
    Thomas DiMicelli
    This session introduces innovative, open standard routing technologies that help service providers and large enterprises modernize and simplify their networks by extending cloud principles to their traditional network architectures. The session will explain how highly-efficient fabric technologies, including EVPN, Segment Routing (aka source packet routing or SPRING), and Routing in Fat Trees (RIFT), can be non-disruptively implemented in order to provide the network efficiency, performance, and resource utilization needed to address the demands of the cloud-era.
  • Stages of Automation Journey Recorded: Mar 4 2019 38 mins
    Robert Tang
    Automation means different things to different people. For industrial vendors, it's about the manufacturing process automation on the production line. IT vendors see automation at a higher level within a company's systems. This webinar will explore how service providers can embark on the automation journey, in particular the reference architecture used to define and to develop autonomous cars: from telemetry components (such as parking sensors) to macro-level autonomous systems (self-driving cars).
  • A New Frontier Where SP Transformation Meets Cloudification Recorded: Mar 4 2019 56 mins
    Wayne Cheung
    Service providers are staring at the new era of cloudification, as a result digital transformation is now mandatory for them, but difficult. To survive service providers that embark on a digital transformation will benefit by accelerating business agility, enhancing customer experiences and engineering better economics. This webinar will explore critical market trends, best practice on transformation principles measured with result and the evolution towards a secure automated SP Cloud
  • How Cloud Services can Unify a Distributed Enterprise Recorded: Mar 4 2019 53 mins
    Perry Correll and Tarek Radwan
    Enterprises are increasingly challenged to deliver a high-quality user experience for applications and network resources—especially for distributed remote locations with little or no IT expertise, making management difficult. Juniper and Aerohive deliver a simple-to-deploy, easy-to-manage cloud-based wired and wireless enterprise network infrastructure. Aerohive provides simplified cloud management for its high-capacity 802.11ac-based WLAN access points, while Juniper offers high-performance cloud managed campus and branch switching, routing, and security.

    Join us for this 1 hour webinar where we discuss the challenges of the distributed enterprise environment, and how the Juniper / Aerohive cloud managed solution is helping organizations such as yourselves ease the planning, deployment and management of a wired / wireless campus or branch.

    Additionally in this webinar, we will preview the cities that we are coming to in the first half of 2019. Juniper and Aerohive will be teaming up to deliver a 3 hour networking event in major cities throughout the United States that will be announced during this webinar.
  • Ask the Expert: Part 6 How to Win the Game of Security Cat and Mouse Recorded: Jan 22 2019 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher
    Laurence Pitt, Security Strategy Director at Juniper Networks explains why a key challenge for many security organizations, is the time required to simply maintain a baseline of security. Becoming overwhelmed in activity can prevent security teams from improving existing processes, which creates an ideal environment for cyber criminals who are typically on the offense and have studied the security model's vulnerabilities. Laurence makes the case that organisations need to use their internal data to establish baselines in behaviour, as this information will not be available to attackers.
Juniper Networks
Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live. We remove the traditional constraints of networking to enable our customers and partners to deliver automated, scalable, and secure networks that connect the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Juniper Connected Security
  • Live at: Apr 19 2019 9:00 pm
  • Presented by: Marco Martinez
  • From:
Your email has been sent.
or close