Hi [[ session.user.profile.firstName ]]

Automating your AI for IT™ Network with Mist

In this webinar, we will discuss how Mist has brought a unique user-centric approach to Wi-Fi using 100% APIs while leveraging an AI-driven, modern microservices cloud architecture. Learn how this AI for IT™ automation solution brings the power of APIs across the Juniper enterprise switching, SD-WAN and Mist wireless portfolios.

We will share several best practices and how, by leveraging Mist’s APIs, customers like you can enable a seamless integration experience across the IT stack and experience proactive operations that will deliver a better user experience.

You will see hands-on examples of how easy it is to create thousands of customer sites through automation and hear about experiences from some of Mist’s Fortune 100 customers in how they have leveraged Mist APIs to transform their business with automation and insights. We will also share an innovative customer example of complete API integration using OpenConfig of which Mist is the first Wi-Fi vendor to support this open standard.

Finally, we will share several example automated scripts that expose Mist APIs to customers who are new to this software model through easy to use tools like Postman. You will learn about several simple Python templates that are publicly available for customers to experiment with and begin their automation and API journey.
Recorded Jun 20 2019 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Christian Gilby
Presentation preview: Automating your AI for IT™ Network with Mist

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building a Secure SD-WAN Solution Sep 24 2019 5:00 pm UTC 21 mins
    Melchior Aelmans, Routing Security at Juniper Networks
    In this webinar Melchior will talk about how to build a secure SD-WAN solution.

    We will look at what products Juniper offers, what hardware and software we have available for this and what extra features a Service Provider gets with the Juniper solution.
  • Building a Secure SD-WAN Solution [EMEA] Sep 24 2019 9:00 am UTC 21 mins
    Melchior Aelmans, Routing Security at Juniper Networks
    In this webinar Melchior will talk about how to build a secure SD-WAN solution.

    We will look at what products Juniper offers, what hardware and software we have available for this and what extra features a Service Provider gets with the Juniper solution.
  • SD-WAN: Use Cases, Features & Latest Solutions Sep 17 2019 5:00 pm UTC 60 mins
    Denis Zotov Business Development for SD-WAN Solutions, Juniper Networks
    With the broad market interest in SD-WAN there is also a large number of SD-WAN solutions to choose from. In this session we will provide an overview of Juniper Contrail SD-WAN solution. We will look at key differentiators and the unique value Juniper solution provides to the service providers.

    In particular, we will discuss:

    • Solution building blocks
    • Solution architecture
    • Key features
    • Use cases, including SD-WAN, Security, LAN and WiFi
    • Portals for administration and customer self-management
    • Deployment and pricing models

    We will also highlight a few customer deployments.
  • SD-WAN: Use Cases, Features & Latest Solutions [EMEA] Sep 17 2019 9:00 am UTC 60 mins
    Denis Zotov Business Development for SD-WAN Solutions, Juniper Networks
    With the broad market interest in SD-WAN there is also a large number of SD-WAN solutions to choose from. In this session we will provide an overview of Juniper Contrail SD-WAN solution. We will look at key differentiators and the unique value Juniper solution provides to the service providers.

    In particular, we will discuss:

    • Solution building blocks
    • Solution architecture
    • Key features
    • Use cases, including SD-WAN, Security, LAN and WiFi
    • Portals for administration and customer self-management
    • Deployment and pricing models

    We will also highlight a few customer deployments.
  • The Network of the Next Decade: AI-Driven WLAN Sep 5 2019 5:00 pm UTC 45 mins
    Jan Van de Laer, Senior Consulting Engineer at Mist Systems - A Juniper Company
    Traditional WLAN platforms are over fifteen years old, leveraging monolithic code bases that are expensive to scale, prone to bugs, and difficult to manage. They are not equipped for the scale and complexity of today’s mobile users, and do not provide the reliability needed for business-critical wireless operations.

    This all changes with Mist.

    With a modern microservices cloud architecture, Mist delivers unprecedented scale and agility, and offers ground-breaking subscription services for Wi-Fi assurance, AI-driven assistance, user engagement, and asset visibility. Mist has an inline AI engine for unprecedented insight and automation. And enterprise-grade Access Points combine Wi-Fi, BLE and IoT for amazing wireless experiences in a cost effective manner.
  • The Network of the Next Decade: AI-Driven WLAN [EMEA] Sep 5 2019 9:00 am UTC 45 mins
    Jan Van de Laer, Senior Consulting Engineer at Mist Systems - A Juniper Company
    Traditional WLAN platforms are over fifteen years old, leveraging monolithic code bases that are expensive to scale, prone to bugs, and difficult to manage. They are not equipped for the scale and complexity of today’s mobile users, and do not provide the reliability needed for business-critical wireless operations.

    This all changes with Mist.

    With a modern microservices cloud architecture, Mist delivers unprecedented scale and agility, and offers ground-breaking subscription services for Wi-Fi assurance, AI-driven assistance, user engagement, and asset visibility. Mist has an inline AI engine for unprecedented insight and automation. And enterprise-grade Access Points combine Wi-Fi, BLE and IoT for amazing wireless experiences in a cost effective manner.
  • SD-WAN: Key Benefits & Deployment Best Practices Aug 29 2019 5:00 pm UTC 44 mins
    Steve Liput SD-WAN Business Development Manager, Juniper Networks
    SD-WAN is the biggest trend in enterprise networking, with almost every business exploring how they can deploy SD-WAN.

    In this webinar, you will learn about:
    • The key drivers for SD-WAN
    • Essentials features for a SD-WAN solution
    • The requirements of enterprise buyers
    • How service providers can position a managed service against other competitors
  • SD-WAN: Key Benefits & Deployment Best Practices [EMEA] Aug 29 2019 9:00 am UTC 44 mins
    Steve Liput SD-WAN Business Development Manager, Juniper Networks
    SD-WAN is the biggest trend in enterprise networking, with almost every business exploring how they can deploy SD-WAN.

    In this webinar, you will learn about:
    • The key drivers for SD-WAN
    • Essentials features for a SD-WAN solution
    • The requirements of enterprise buyers
    • How service providers can position a managed service against other competitors
  • Juniper's Multicloud Container Platform - Juke 2.2 Preview Recorded: Aug 19 2019 21 mins
    Brian Gladden, Sales Director at Juniper Networks, Chuck Piercey, PLM Director at Juniper Networks
    Imagine being able to easily manage core storage objects and create multiple nodes in a single Kubernetes cluster.

    In this webinar, you’ll learn:

    •What Juke is all about
    •Demos
    •Volume snapshots and clone management to boost reliability and enable mobility
    •Kubernetes cluster scale out with compute and storage nodes that can now span clouds and sites or stay local to one cluster availability zone .
  • Design, Implement, Operate, Automate: Getting from Automation to Automated Recorded: Aug 13 2019 60 mins
    Steven Veneman, Director of Marketing, Juniper Networks, Javier Antich Romaguera, Product Line Manager, Juniper Networks
    Automation has been a buzzword in our industry for well over a decade as service providers and vendors have developed technology to simplify networks, including network programmability, SDN, NFV, APIs, and other tools. While progress is certainly being made, these solutions are still prescriptive in nature, falling short of the true intent of network automation. Making the pivot to a fully automated network will require a pivot from a prescriptive to a more autonomous, intent-based network management approach. The business benefit of doing so, is the simplification of the network management lifecycle, from design, through implementation, and ongoing operations. More importantly, with the right partner and solutions, you can simplify your adoption by taking an incremental approach, adopting and deployment solutions where they provide immediate value first and then moving along to the next stage.

    In this webinar, we will demystify automation by exploring five steps service providers should take to implement automation into their network environment and move toward the realization of a network that is driven by desired engineering outcomes. As we step through the journey, we will discuss solutions available in the market today, that will help you progress from each step to the next.
  • Trends in Cyber Crime: The Last 18 Months Recorded: Jul 15 2019 54 mins
    Trevor Pott, Security Product Marketing Director, Juniper Networks
    There are three key trends in cybercrime that have been observed over the past 18 months: very long dwell time attacks, advanced spear phishing (especially of executives), and the growing use of both automation and machine learning by malicious actors. This session will explore these trends, what they mean for enterprises, and how defenders can respond to them by using the technologies and techniques of the attackers against them.
  • [PANEL] Prevailing Trends in Cyber Crime Recorded: Jul 15 2019 45 mins
    Robin Smith (Rosint Labs), Bob Rudis (Rapid7), Monique Becenti (SiteLock), Trevor Pott (Juniper)
    The average cost of a malware attack on a company is $2.4 million, according to Accenture. Organizations need to ensure they are following cybersecurity best practices in order to mitigate risk.

    Join this interactive Q&A panel to learn more about:
    • What’s new on the threatscape
    • The latest hacking tools, strategies and methods and how to protect against them
    • How to implement proactive strategies rather than reactive
    • Recommendations for improving security and steps to take today

    Speakers:
    Robin Smith, Presales Consultant, Gospel Technology
    Bob Rudis, Chief Data Scientist, Rapid7
    Monique Becenti, Product & Channel Marketing Specialist, SiteLock
    Trevor Pott, Product Marketing Director, Juniper Networks
  • Transport Architecture Simplification with Segment Routing (SR) & EVPN Recorded: Jul 10 2019 59 mins
    Ron Bonica, Distinguished Engineer
    In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.

    In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
  • What Nature Can Tell Us About IoT Security at Scale Recorded: Jul 8 2019 28 mins
    Ben Baker, Director, Strategic Marketing, Juniper Networks
    The scale and complexity of networks supporting IoT will quickly outstrip human capabilities to defend them. Devices can be elusive; they will hide behind gateways and roaming arrangements. The challenge is how to monitor and learn the behavior of the different classes of devices. IoT devices are like flocks of birds: they move in large groups in the same direction; when one deviates, usually the rest of the group deviates. We can use unsupervised machine learning techniques with a 5-step process to help solve the IoT Security problem. 1. Observe; 2. Cluster; 3. Detect Anomalies; 4. Root Cause Analysis; 5. Remediate.
  • Juniper Connected Security Recorded: Jul 2 2019 20 mins
    Marco Martinez
    Organizations continue to evolve beyond just premises-based IT deployments and are leveraging multicloud to transform IT. As this transformation takes place, it increases the speed they can move, but also the complexity of their environment, heightening the need for fast and elastic protection from advanced threats. Organizations need automated, repeatable security across their entire network. Juniper Connected Security gives organizations the ability to safeguard users, applications and infrastructure by extending security to all points of connection across the network.
    Key validation points:
    -Safeguard users, applications and infrastructure against advanced threats
    -Automate security coverage from endpoints to edge and every cloud in between
    -Multicloud-ready with fast and elastic protection
    -See who and what is on your network and enforce policy across all connection points
    -End-to-end, top-to-bottom best-in-class secure networking
    -Open, since no one has a security green field and we must build on security solutions and infrastructure already in play
  • Automating your AI for IT™ Network with Mist Recorded: Jun 20 2019 32 mins
    Christian Gilby
    In this webinar, we will discuss how Mist has brought a unique user-centric approach to Wi-Fi using 100% APIs while leveraging an AI-driven, modern microservices cloud architecture. Learn how this AI for IT™ automation solution brings the power of APIs across the Juniper enterprise switching, SD-WAN and Mist wireless portfolios.

    We will share several best practices and how, by leveraging Mist’s APIs, customers like you can enable a seamless integration experience across the IT stack and experience proactive operations that will deliver a better user experience.

    You will see hands-on examples of how easy it is to create thousands of customer sites through automation and hear about experiences from some of Mist’s Fortune 100 customers in how they have leveraged Mist APIs to transform their business with automation and insights. We will also share an innovative customer example of complete API integration using OpenConfig of which Mist is the first Wi-Fi vendor to support this open standard.

    Finally, we will share several example automated scripts that expose Mist APIs to customers who are new to this software model through easy to use tools like Postman. You will learn about several simple Python templates that are publicly available for customers to experiment with and begin their automation and API journey.
  • Transport Architecture Simplification with Segment Routing (SR) & EVPN Recorded: Jun 17 2019 60 mins
    Ron Bonica, Distinguished Engineer
    In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.

    In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
  • Codifying Network Configuration Through Simple Declarative Automation Recorded: Jun 12 2019 32 mins
    David Gee
    This webinar will take users through a brief journey to introduce imperative- and configuration-driven automation, and how they can move to declarative automation where we ask ‘what’ to automate rather than ‘how’. We are using a tool called Terraform to achieve this, and currently developing Terraform Junos providers with the initial release for QFX Series switches being set for Q2/2019.

    In this online session we will cover a simple use case showing the difference between an imperative lead approach and the powerful gains achieved by using the declarative approach. By the end of the webinar, attendees will understand the CRUD (Create, Read, Update, Delete) pattern used and its enormous power for automation pipelines.

    Demonstrations will be provided on the webinar with links so attendees can repeat in their own time.

    Introduction to declarative automation
    Difference from imperative automation
    Introduction to Terraform
    Exploration of CRUD
    Observing a CI/CD pipeline with declarative
  • Test-Driven Network Automation Recorded: Jun 11 2019 39 mins
    Matthew Oswalt
    One of the key tenets of network reliability engineering (NRE) is the ability to test that your network is doing the thing it should be doing. There are numerous tools you can use to accomplish this, but these are spread over several levels of testing and verification tasks you may want to be conducting. In addition, the types of things you'll want to test will vary between the different areas of your network.

    In this webinar, we'll explore all of these aspects, and explore the kinds of tools and techniques you'll need to proactively guarantee that your network is providing the services your organization needs it to provide.
  • The Combination of Automated Detection with Automated Enforcement Recorded: Jun 11 2019 22 mins
    Dwann Hall
    Security automation is getting all the attention and focus, but this doesn’t mean the transition will occur overnight. Current efforts have focused on addressing the alert fatigue being experienced in the SOC – putting it simply they have too much data and not enough people. Advances in automation will sift through this barrage of data, detecting threats and in terms of security automation making life easier for the SOC. However, this optimisation of detection means that the constraint has moved from detection to enforcement.

    In this webinar we will look at this next stage of the security automation journey; combining automated detection with automated enforcement to improve the overall throughput and response of this workflow.
Juniper Networks
Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live. We remove the traditional constraints of networking to enable our customers and partners to deliver automated, scalable, and secure networks that connect the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automating your AI for IT™ Network with Mist
  • Live at: Jun 20 2019 5:20 pm
  • Presented by: Christian Gilby
  • From:
Your email has been sent.
or close