Hi [[ session.user.profile.firstName ]]

How Branch Offices and Data Centers Differ In Next Generation Security Needs

At your branch offices you worry about end users, their browsing behaviors and their devices. The security you employ to monitor and control users is critical in preventing valuable data exfiltration.
And the data center? Protecting it is all about ensuring availability and continued operation against the mounting threats from targeted scans, botnets and DDoS attacks. Want to find out how your current and planned defenses stack up against best practices?

Join us for a discussion led by one of Juniper’s top security experts, Johnnie Konstantas to review typical security deployments at branch offices and data centers. We'll cover the differences in design and where the two merge for maximum effectiveness and security.
Recorded Aug 20 2013 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
Presentation preview: How Branch Offices and Data Centers Differ In Next Generation Security Needs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Is Your Network Ready for K12 Common Core Online Assessment? Recorded: Apr 22 2014 38 mins
    Gavin Lee, Senior Business Development Manager – K12 Education, Juniper Networks
    Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Optimize Microsoft Lync Performance with Juniper Networks & Netrix LLC Recorded: Feb 4 2014 43 mins
    Tim McCarthy, Juniper Networks & Samir Patel, Netrix LLC
    You’ve decided to implement unified communications in your business and are mandated to deliver a flawless user experience. Phone services and chat collaboration technologies are critical to supporting your customers and conducting day-to-day business—dropped calls and missed messages can mean lost business. Have you architected your network to meet the rigid performance demands to deliver uninterrupted services? Join this session to learn about top technical considerations for your network when deploying unified communications.
    Register now to attend!
  • Key Success Factors for Delivering Unified Communications in Your Enterprise Recorded: Dec 10 2013 49 mins
    Gary Clark - Juniper Networks, David Grider - Microsoft, Tina Herrera - Juniper Networks
    Unified Communications and Collaborations (UCC) tools are revolutionizing the Enterprise. These tools enable greater connectivity among employees, customers and partners, while increasing efficiency and productivity and lowering costs. As a leading provider of unified communications Microsoft’s David Grider, Lync Technology Specialist, will share some of the trends he sees in UCC, discuss why enterprises are moving to unified communications technologies and the benefits for deploying these game-changing enterprise tools.

    Additionally, as organizations plan for UCC as a means for increasing productivity and collaboration there are numerous networking requirements to consider as well. Gary Clark, IT CTO and VP of Technology Services at Juniper Networks will share details of Juniper’s recent worldwide deployment of Microsoft Lync. He will discuss considerations for deploying cloud-based collaboration tools across a global enterprise—and how a well-designed wired and wireless infrastructure provides the critical foundation that ensures an exceptional user experience.
  • A Day In The Life Of A Mobile Clinician Recorded: Dec 3 2013 59 mins
    Jen Pulsifer, Healthcare Industry Principal and Director of Business Development, Juniper Networks
    Today’s Health IT leaders face a difficult task in handling mobile device security and policy compliance, particularly given the mobile transformation happening in healthcare today. Driven in part by the adoption of new care models like remote patient monitoring and telemedicine, and the Bring Your Own Device, or BYOD trend, the consumerization of IT is driving end-user demand for ubiquitous access – to networks, to clouds, to applications, to everything – from any device, anywhere at any time.

    In this webinar, we will highlight the challenges of mobile device security, management and policy today. We will consider the issues faced by Health IT teams when managing different operating systems across a myriad of devices, some of which are user-owned. Finally we’ll look at how Juniper Networks solutions address a broad spectrum of security and end-user experience issues, as we walk through a day in the life of a mobile clinician. Register now to attend!
  • Next-Generation Application Security for Today’s Modern Data Center Recorded: Nov 20 2013 60 mins
    Christian A. Christiansen, IDC and David Koretz, Juniper Networks
    Cyber attacks are on the rise. Particularly those aimed at Web applications and servers, which deal in high-value traffic and typically reside in data centers.

    Application-level DDoS attacks are exhausting data center infrastructure and hacking is exploiting vulnerabilities in the Web layer. Data centers are the victims of the outside-in threat and it’s only going to get worse. While signature-based solutions prevent from known attacks, detecting and mitigating unknown attacks requires a different approach.

    In this live webinar featuring speakers from IDC and Juniper Networks, you’ll learn:

    • New techniques for detecting and mitigating the outside-in threat
    • Why it’s vital to globally share data about attackers
    • How deception can be used to detect and block unknown and zero-day attacks
    • The difference between protecting the data center and campus edge—and the different security tools for each

    Register now! Post event, attendees will receive a copy of the just-published IDC white paper, Unique Security Challenges in the Data Center Demand Innovative Solutions.
  • Defend By Deception: Junos Web App Secure and Spotlight Overview & LIVE Demo Recorded: Aug 22 2013 70 mins
    Pete McMullen & Keir Asher
    Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?
    Join Juniper security experts, Pete McMullen & Keir Asher for a 60 minute Junos WebApp Secure (JWAS) overview and live demo to learn how Juniper can protect your web assets from the largest Internet security threats known!
  • Protecting your Business with Juniper Security Recorded: Aug 21 2013 34 mins
    Juniper Networks
    Protecting your Business with Juniper Security
  • The Advanced Attacker is Not Scared of Your Security Recorded: Aug 21 2013 45 mins
    Director Product Marketing, Counter Security at Juniper Networks
    Hacking is a business and is organized to monetize the information that is stolen. Advanced attackers are well versed in methods to evade traditional signature and IP address based security products. On this webinar you will hear about advanced security techniques that change the economics of hacking back towards the organizations favor and how Juniper is leading the way in a new form of security - Counter Security.
  • Protecting Web Applications Against Advanced Attacks Recorded: Aug 20 2013 40 mins
    Paul Bristow, Senior Director Security Business Unit, Juniper Networks; Edward Roberts, Director Product Marketing
    Application Security is an increasingly important aspect of an organizations security profile. In this webinar you will hear about advanced techniques being used by hackers to DDoS and exploit applications and understand how you can better protect yourself from the almost daily attacks many applications experience.
  • Be Ahead of the Changing Threats to Data Center Security Recorded: Aug 20 2013 58 mins
    Juniper Networks
    Be Ahead of the Changing Threats to Data Center Security
  • Defend By Deception: Junos Web App Secure and Spotlight Overview & LIVE Demo Recorded: Aug 20 2013 52 mins
    Pete McMullen & Ben Griffin
    Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?

    Join Juniper security experts, Pete McMullen & Ben Griffin for a 60 minute Junos WebApp Secure (JWAS) and Spotlight Secure overview and LIVE DEMO to learn how Juniper can protect your web assets from the largest Internet security threats known!
  • Defend By Deception: Junos Web App Secure and Spotlight Overview & LIVE Demo Recorded: Aug 20 2013 57 mins
    Pete McMullen & Keir Asher
    Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?
    Join Juniper security experts, Pete McMullen & Keir Asher for a 60 minute Junos WebApp Secure (JWAS) overview and live demo to learn how Juniper can protect your web assets from the largest Internet security threats known!
  • How Branch Offices and Data Centers Differ In Next Generation Security Needs Recorded: Aug 20 2013 53 mins
    Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
    At your branch offices you worry about end users, their browsing behaviors and their devices. The security you employ to monitor and control users is critical in preventing valuable data exfiltration.
    And the data center? Protecting it is all about ensuring availability and continued operation against the mounting threats from targeted scans, botnets and DDoS attacks. Want to find out how your current and planned defenses stack up against best practices?

    Join us for a discussion led by one of Juniper’s top security experts, Johnnie Konstantas to review typical security deployments at branch offices and data centers. We'll cover the differences in design and where the two merge for maximum effectiveness and security.
  • Advanced Data Center Security and What Is Replacing Next Generation Firewalls Recorded: Aug 20 2013 56 mins
    Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
    Your next gen firewall investment is giving you some peace of mind on egress (inside out) traffic but what about hacking attempts and DDoS attacks that aim to disrupt and steal from data center applications?

    Next generation firewalls can't address the outside in threat carried within web and SSL traffic, but Juniper's advanced technologies for intrusion deception and heuristic-based DDoS mitigation can.

    Join us for a discussion led by one of Juniper’s top security experts, Johnnie Konstantas to find out how to make your data center next generation security equipped.
  • Next-Gen Security for the Data Center Recorded: Aug 20 2013 13 mins
    David Koretz
    12 minute video featuring David Koretz talking about Juniper’s approach to security, specifically how Juniper delivers next-gen security for data centers.
  • Addressing the Evolving Threat Landscape Recorded: Jun 25 2013 4 mins
    Peter Lunk
    Enable your productivity gains without compromising security.
  • Securing the Virtualized Data Center Webcast Recorded: Jun 24 2013 29 mins
    Juniper Networks
    Securing the Virtualized Data Center Webcast
  • Secure your Enterprise Mobility; Connect, Protect, and Manage Recorded: Jan 28 2012 46 mins
    Jay Kelly, Product Manager Pulse BU
    Bring your own (mobile) device, or BYOD, is a rising trend, and with good reason — the business benefits and the increase in employee effectiveness are too big to ignore. However, it's all too easy to get bogged down in the details, like mobile OS versions, device types, location, allowed apps, not to mention malware infection and jail breaking and rooting risks.
    This presentation will offer a strategic, holistic vision for BYOD that focuses on a new framework for successful deployment: connect, protect, and manage. The framework allows you to focus on the most important piece of your overall security strategy policy while controlling your risk and staying compliant. It will also discuss the relevance of some of the latest findings of our mobile threat center research.
  • Enterprise Mobility - the Challenge, the Opportunity and the Approach Recorded: Jan 28 2012 4 mins
    Juniper Networks
    Juniper Networks discusses the upside and challenges in enabling mobile workforce and how Juniper's Simply Connected Solution simply and effectively addresses the challenges of a connected, wireless, mobile workforce
Delivering and Supporting End-to-End Communication Needs
Tune into AdvanTel's channel for the latest news in the Data Center, Security and Networking world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Branch Offices and Data Centers Differ In Next Generation Security Needs
  • Live at: Aug 20 2013 10:50 pm
  • Presented by: Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
  • From:
Your email has been sent.
or close