Hi {{ session.user.profile.firstName }}

Securing the Cloud with Juniper vGW Virtual Gateway

Recorded Jun 27 2012 33 mins
Presented by
Johnnie Konstantas
Presentation preview: Securing the Cloud with Juniper vGW Virtual Gateway
Recommended for you:
  • Date
  • Rating
  • Views
  • Experience is the single most important factor to achieve service excellence and is one of the major challenges faced by every network provider’s be it within the Enterprise, Campus or TSP networks today. One of the major reasons for this is static configuration and selection of end-to-end paths based on certain configured criteria, not taking into consideration, the real-time network variables.

    Software Defined Networking (SDN) and Network Function Virtualization (NFV) can boost the agility of network, service provisioning and operations. They are designed to merge the network into the age of the Cloud to become a service creation platform that empowers end users and delivers customized experiences. The industry has reached an inflection point and the status quo of the today’s networks is not sustainable. Communication Service Providers must adapt these rising phenomenon towards an open and agile infrastructure that’s simple to manage, efficient and programmable

    ‘Creating Network of Tomorrow with SDN-NFV’ session will give a quick overview on SDN and NFV technologies with a focus on how they differentiate and complement each other in various use cases. We will briefly present the capabilities that Tech Mahindra brings in this space.
  • In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

    During this webcast, attendees will learn
    * Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise

    * How to foster a risk-aware security culture while still encouraging trust among your employees and partners

    * How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
  • In this presentation, solution providers learn simple steps to help build and grow their IT security practice. Attendees learn about compliance regulations, cloud integration, how to weave security into each opportunity, adherence to best practices, and re-educating customers.
  • Learn to predict, prepare for and pinpoint performance issues by combining HP OpsA and J9 Accelerators with Splunk. This webinar will cover how your IT operations teams will be able to extract the full value of their data.

    If you’ve made an investment in Splunk and want to increase functionality, while at the same time reducing maintenance costs, you need to attend.
  • Delivering software or device updates to a global user base is complex, with high expectations on the part of customers for a smooth trouble free experience on every device, every time. To meet those expectations, optimization cannot be an afterthought for software and device manufacturers. This webinar will use real customer examples to illustrate how leading companies have built optimization into every stage of the file distribution workflow. We’ll take a close look at how a global security solutions company successfully publishes security updates to tens of millions of customers every 4 hours.

    We’ll also explore: |

    • How regional versions of software can be distributed to the right users with Geo-fencing
    • Strategies for near real-time purging of software files from global cache, ensuring that purged content is never served to end users
    • How to deliver device updates without impacting customer’s data plan charges
    • The importance of optimizing the entire experience, from the download portal to instructional video delivery, for customers on a range of devices

    The latest trends in using downloads and updates as branding reinforcement opportunities, file protection, and access control will also be shared.
  • The first webinar in the high speed/DWDM series discusses the problem of dispersion and the impact it can have on the network. It explains the two types of dispersion (chromatic dispersion and polarization mode dispersion) and why they can cause network failures, the typical dispersion tests and the applicable standards and dispersion thresholds for several types of services.
  • This webinar takes top to bottom approach on deep dive training of Data Plane Development Kit. The attendees will learn as how various Data Plane Development Kit (DPDK) components fit together in delivering final vertical applications such as a router, a security appliance, QoS and load balancer.

    Most of the customers and developers are familiar with L2fwd and L3fwd sample applications. However one of the questions that is frequently asked is regarding availability of not only 1) run to completion applications but also 2) pipeline mode applications or 3) a combination of run to completion and pipeline mode application. To clarify, the webinar will classify the key sample applications into the above three categories. We will take two key applications – 1) IP Pipeline and 2) Packet Ordering Sample application and drill down deeper as how customers can map their own application with these architectural usage models. We will do a brief code walk through of one of the application to showcase how professionally the coding is done with great commenting.

    While earlier release features were focused on CapEx improvement, such as thread pinning, only polled mode driver, the latest releases are including OpEx improvements also. The audience will learn Release 2.1 and Release 2.2 features from the point of view both CapEx and OpEx improvement.

    Data Plane Development Kit is spelled as “P-E-R-F-O-R-M-A-N-C-E”. So, any deep dive presentation is complete only with key performance optimization techniques. So, the attendees will learn top 3 key optimization techniques that they can use while integrating their applications with DPDK.
  • As organizations become more and more data-centric, the way this data is put to use and delivered via applications and services holds the key to the organization’s overall competitiveness and success.

    A consolidated data center environment provides an optimized platform for innovation, applications and services delivery, cost reduction and efficiency.

    Consolidation in the data center has multiple facets, all introducing security challenges and risks that must be recognized and dealt with.

    This session will introduce the consolidated data center environment, the technologies deployed, their related security challenges and the possible solutions available.
  • See how CA manages and monitors our own CA SAP environment

    SAP applications and the business processes they enable often represent the very core of your business. Customers, partners, and employees expect availability, responsiveness and secure access, while the CEO expects that budget objectives will be met and efficiencies exploited to improve the bottom line. CA Technologies provides a robust portfolio of SAP certified IT management solutions which help reduce the cost and risk associated with delivering your SAP enabled business processes, while helping to enable the service levels needed for more optimal business operations.

    In this session you’ll learn:
    • The business drivers, technical challenges and importance of SAP in the daily works of CA
    • How CA manages its own SAP implementation with CA APM solutions
  • Network-dense, interconnection-oriented facilities are not easy to replicate and are typically able to charge higher prices for colocation, as well as charge for cross-connects and, in some cases, access to public Internet exchange platforms and cloud platforms. Mobility, the Internet of Things, SaaS, IaaS and content delivery all depend on network performance. This presentation will look at the following issues:

    - How will Open-IX and the launch of European-model exchanges impact the interconnection market?
    - What are the networking and datacenter technologies that can disrupt this market?
    - What are the advantages of Direct Connect services?

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing the Cloud with Juniper vGW Virtual Gateway
  • Live at: Jun 27 2012 2:00 pm
  • Presented by: Johnnie Konstantas
  • From:
Your email has been sent.
or close
You must be logged in to email this