Defend By Deception: Junos Web App Secure and Spotlight Overview & LIVE Demo
Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?
Join Juniper security experts, Pete McMullen & Keir Asher for a 60 minute Junos WebApp Secure (JWAS) overview and live demo to learn how Juniper can protect your web assets from the largest Internet security threats known!
RecordedOct 9 201370 mins
Your place is confirmed, we'll send you email reminders
Meaningful Use incentive programs. New HIPAA regulatory measures. Medical data explosion. Mobile health demands.
Numerous factors are driving healthcare organizations to control who’s allowed to access the healthcare network and what resources –applications, data, patient records - they’re entitled to view or edit.
But consider this: A doctor, who inadvertently picked up malicious code during a telemedicine event, can infect your entire network. A disgruntled employee can exfiltrate patient records. And cyber criminals are always looking for ways to steal and sell your valuable data.
Is your network designed to identify the suspicious traffic and/or anomalous behavior to a specific user or device? Can your organization afford the painful penalties under the final HIPAA/HITECH omnibus rule due to a security breach?
What happens next depends on the policies and controls you have in place to restrict and protect your assets and data from the vulnerabilities that openness and user mobility bring. Not to mention, the controls you need simply to comply with industry and government regulations.
Take some time to join us for this free webinar. You’ll hear from Steve Spearman, HIPAA regulation specialist who will guide you through the in’s and out’s of the newly-announced Health Insurance Portability and Accountability Act. We’ll also provide an overview of Juniper’s network security portfolio, designed to help ensure secure, consistent access to data while reducing your risk associated with HIPAA and Meaningful Use mandates.
In this webcast, we’ll cover some of the capabilities offered by connecting networks to IT automation tools such as Puppet and Chef as well as capabilities offered by SDN solutions such as Junos vContrail.
The end result will be an understanding of the questions you can ask about your data center to determine if you need to employ one or both of these technologies.
Distributed Denial of Service (DDoS) attacks are not new, but terms like diversionary DDoS, slow loris and application layer DDoS offer ample evidence that DDoS has evolved. Attackers are clearly becoming more sophisticated at launching DDoS... Have your methods for mitigation kept up? Likely not.
During this information packed session we'll explain the trends in DDoS attacks and mitigation tactics giving you a path for tipping the security scales back in your favor. Register now to attend!
The Internet Edge is the gateway between your Enterprise network and the public Internet. With the increase of cloud adoption and more remote branch locations of your enterprise connected over the Internet, how can you securely access public cloud applications or transfer data between remote locations through the Internet?
Learn how the Internet Edge can protect your Enterprise networks and resources against attacks from the Internet.
In this short video you will see how to easily onboard Apple iOS devices using Juniper's self-provisioning client-less BYOD solution for Apple iOS in action. In this demo we will show the complete start to finish process required to onboard a corporate users personal iOS device onto the network. This video highlights the simplicity and reduced demand on IT to securely provision user’s personal devices on the corporate network using Junipers SmartPass and WLAN products.
Please join Juniper Networks for a 60 minute webinar to hear from two of our top Healthcare and Wireless LAN experts as to why healthcare organizations are standardizing on Juniper’s wireless solution. Whether your facility needs higher speed and performance to securely move large radiology image files across the network or superior and undisrupted coverage to support voice applications over wireless LAN or even newer WiFi video medical applications, then this webinar is for you!
We’ll walk through best practices to designing or updating your Healthcare Network to scale and support these emerging trends.
In this webinar we will discuss everything you need to know about designing new or upgrading your campus network to scale and support the emerging trends specific to K-12 including BYOD, rapid growth and device proliferation and how to optimize your network for 5Ghz. No matter whether you have a BYOD or 1:1 initiative, this webinar is for you!
In the first part of this short video you will a live example of a video conference using Junipers high availability WLAN Clustering and what happens when there is a Wireless LAN Controller outage. In the second half of the video more technical detail is provided to show what happens behind the scenes when a Wireless LAN Controller fails and how Juniper seamlessly keeps users from being affected.
One of the keys to the business success of your Enterprise is your Data Centers. With the virtualization of Data Center resources, distribution of business locations, rise of a mobile workforce and rapidly increasing demand for network bandwidth, it is crucial for the network infrastructure to be able to scale, secure and seamlessly connect between data centers. Learn how can you interconnect your Data Centers to meet all these needs along with supporting plans for cloud adoption or agility and continuity of your business operations.
Michael Leonard, Senior Technical Marketing Manager Juniper Networks
Ensure business continuity by learning the key pitfalls – and how to avoid them.
In this increasingly virtualized and cloud-enabled world, your business continuity plan needs to be able to keep up with every mission-critical requirement. Our webinar, Key Considerations in Designing for Data Center Business Continuity, can help you:
- Learn how to design for scalable data center business continuity
- Identify IT components beyond server, apps, and security considerations
- Optimize your data centers and infrastructure for 24/7 uptime
In this short video you will see how to easily onboard PC devices using Juniper's self-provisioning client-less BYOD solution for Microsoft windows in action. In this demo we will show the complete start to finish process required to onboard a corporate users personal Windows PC onto the network. This video highlights the simplicity and reduced demand on IT to securely provision user’s personal devices on the corporate network using Junipers SmartPass and WLAN products.
•Tags: juniper, BYOD, SmartPass Connect, PC, Windows, onboarding, clientless, wireless, provisioning, 802.1x, security
12 minute video featuring David Koretz talking about Juniper’s approach to security, specifically how Juniper delivers next-gen security for data centers.
Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
Your next gen firewall investment is giving you some peace of mind on egress (inside out) traffic but what about hacking attempts and DDoS attacks that aim to disrupt and steal from data center applications?
Next generation firewalls can't address the outside in threat carried within web and SSL traffic, but Juniper's advanced technologies for intrusion deception and heuristic-based DDoS mitigation can.
Join us for a discussion led by one of Juniper’s top security experts, Johnnie Konstantas to find out how to make your data center next generation security equipped.
Automate & Orchestrate the Network – Build Simple and Agile Data Centers
Watch this webinar with Juniper Networks and IDC and you will learn:
- How automation eliminates data center complexities
- How to achieve the operational efficiencies promised by virtualization
- How to future proof your data center with open interfaces and flexible programmability
Lane Timmons & Joe Bilbro (Texas Tech University Health Center); Phil Belanger & Ken Biba (Novarum); Tim McCarthy (Juniper)
We have moved beyond how Wireless networks were originally designed. Today, IT teams are challenged with how to handle today's rich media demands or exponentially increasing traffic. Even now, WLANs are now faced with mission critical demands and user expectations to access resources anytime, anywhere, with no delays.
Join us for this webinar with leading experts to learn more about:
• How high quality wireless service is used in high density university environments, including how Texas Tech University Health Center’s vendor evaluation process works
• Results of real-world high client density WLAN test with experts from Novarum
• How Juniper optimizes high client density WLANs without sacrificing performance
Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?
Join Juniper security experts, Pete McMullen & Keir Asher for a 60 minute Junos WebApp Secure (JWAS) overview and live demo to learn how Juniper can protect your web assets from the largest Internet security threats known!
Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
At your branch offices you worry about end users, their browsing behaviors and their devices. The security you employ to monitor and control users is critical in preventing valuable data exfiltration.
And the data center? Protecting it is all about ensuring availability and continued operation against the mounting threats from targeted scans, botnets and DDoS attacks. Want to find out how your current and planned defenses stack up against best practices?
Join us for a discussion led by one of Juniper’s top security experts, Johnnie Konstantas to review typical security deployments at branch offices and data centers. We'll cover the differences in design and where the two merge for maximum effectiveness and security.
Webcasts on technology solutions & services that solve IT challenges
BEAR Data solves business challenges for IT departments on a daily basis, and we want to share our knowledge, tips and trends on what technology solutions could work for you.
Defend By Deception: Junos Web App Secure and Spotlight Overview & LIVE DemoPete McMullen & Keir Asher[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]69 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
Defend By Deception: Junos Web App Secure and Spotlight Overview & LIVE DemoPete McMullen & Keir Asher[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]69 mins