Hi [[ session.user.profile.firstName ]]

Protecting your Business with Juniper Security

Protecting your Business with Juniper Security
Recorded Oct 11 2013 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Juniper Networks
Presentation preview: Protecting your Business with Juniper Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Recorded: Nov 5 2013 63 mins
    Health Security Solutions & Juniper Networks
    Meaningful Use incentive programs. New HIPAA regulatory measures. Medical data explosion. Mobile health demands.

    Numerous factors are driving healthcare organizations to control who’s allowed to access the healthcare network and what resources –applications, data, patient records - they’re entitled to view or edit.

    But consider this: A doctor, who inadvertently picked up malicious code during a telemedicine event, can infect your entire network. A disgruntled employee can exfiltrate patient records. And cyber criminals are always looking for ways to steal and sell your valuable data.

    Is your network designed to identify the suspicious traffic and/or anomalous behavior to a specific user or device? Can your organization afford the painful penalties under the final HIPAA/HITECH omnibus rule due to a security breach?

    What happens next depends on the policies and controls you have in place to restrict and protect your assets and data from the vulnerabilities that openness and user mobility bring. Not to mention, the controls you need simply to comply with industry and government regulations.

    Take some time to join us for this free webinar. You’ll hear from Steve Spearman, HIPAA regulation specialist who will guide you through the in’s and out’s of the newly-announced Health Insurance Portability and Accountability Act. We’ll also provide an overview of Juniper’s network security portfolio, designed to help ensure secure, consistent access to data while reducing your risk associated with HIPAA and Meaningful Use mandates.
  • SDN vs. Network Automation – What Questions Should You Be Asking? Recorded: Oct 23 2013 46 mins
    Abner Germanow, Juniper Networks
    In this webcast, we’ll cover some of the capabilities offered by connecting networks to IT automation tools such as Puppet and Chef as well as capabilities offered by SDN solutions such as Junos vContrail.

    The end result will be an understanding of the questions you can ask about your data center to determine if you need to employ one or both of these technologies.

    Register now to attend!
  • Key Steps To A Sustained DDoS Protection Strategy Recorded: Oct 18 2013 49 mins
    Johnnie Konstantas, Juniper Networks
    Distributed Denial of Service (DDoS) attacks are not new, but terms like diversionary DDoS, slow loris and application layer DDoS offer ample evidence that DDoS has evolved. Attackers are clearly becoming more sophisticated at launching DDoS... Have your methods for mitigation kept up? Likely not.

    During this information packed session we'll explain the trends in DDoS attacks and mitigation tactics giving you a path for tipping the security scales back in your favor. Register now to attend!
  • Introduction to Enterprise Internet Edge Recorded: Oct 14 2013 13 mins
    Mohini S. Dukes, Juniper Networks
    The Internet Edge is the gateway between your Enterprise network and the public Internet. With the increase of cloud adoption and more remote branch locations of your enterprise connected over the Internet, how can you securely access public cloud applications or transfer data between remote locations through the Internet?
    Learn how the Internet Edge can protect your Enterprise networks and resources against attacks from the Internet.
  • SmartPass Connect Apple iPad/iOS onboarding experience Recorded: Oct 14 2013 5 mins
    Juniper Networks
    In this short video you will see how to easily onboard Apple iOS devices using Juniper's self-provisioning client-less BYOD solution for Apple iOS in action. In this demo we will show the complete start to finish process required to onboard a corporate users personal iOS device onto the network. This video highlights the simplicity and reduced demand on IT to securely provision user’s personal devices on the corporate network using Junipers SmartPass and WLAN products.
  • Mission-Critical WLAN in Healthcare: Designing It Right Recorded: Oct 13 2013 64 mins
    Jennifer Pulsifer & Sean Stanton
    Please join Juniper Networks for a 60 minute webinar to hear from two of our top Healthcare and Wireless LAN experts as to why healthcare organizations are standardizing on Juniper’s wireless solution. Whether your facility needs higher speed and performance to securely move large radiology image files across the network or superior and undisrupted coverage to support voice applications over wireless LAN or even newer WiFi video medical applications, then this webinar is for you!

    We’ll walk through best practices to designing or updating your Healthcare Network to scale and support these emerging trends.
  • Mission-Critical WLAN in K-12: Designing It Right Recorded: Oct 13 2013 62 mins
    Sean Stanton
    In this webinar we will discuss everything you need to know about designing new or upgrading your campus network to scale and support the emerging trends specific to K-12 including BYOD, rapid growth and device proliferation and how to optimize your network for 5Ghz. No matter whether you have a BYOD or 1:1 initiative, this webinar is for you!
  • Demo of Juniper High Availability WLAN Recorded: Oct 13 2013 7 mins
    Juniper Networks
    In the first part of this short video you will a live example of a video conference using Junipers high availability WLAN Clustering and what happens when there is a Wireless LAN Controller outage. In the second half of the video more technical detail is provided to show what happens behind the scenes when a Wireless LAN Controller fails and how Juniper seamlessly keeps users from being affected.
  • Enterprise Data Center Interconnect Recorded: Oct 13 2013 16 mins
    Mohini S. Dukes, Juniper Networks
    One of the keys to the business success of your Enterprise is your Data Centers. With the virtualization of Data Center resources, distribution of business locations, rise of a mobile workforce and rapidly increasing demand for network bandwidth, it is crucial for the network infrastructure to be able to scale, secure and seamlessly connect between data centers. Learn how can you interconnect your Data Centers to meet all these needs along with supporting plans for cloud adoption or agility and continuity of your business operations.
  • Optimizing Data Center for Business Continuity Recorded: Oct 11 2013 50 mins
    Michael Leonard, Senior Technical Marketing Manager Juniper Networks
    Ensure business continuity by learning the key pitfalls – and how to avoid them.

    In this increasingly virtualized and cloud-enabled world, your business continuity plan needs to be able to keep up with every mission-critical requirement. Our webinar, Key Considerations in Designing for Data Center Business Continuity, can help you:
    - Learn how to design for scalable data center business continuity
    - Identify IT components beyond server, apps, and security considerations
    - Optimize your data centers and infrastructure for 24/7 uptime
  • SmartPass Connect PC onboarding experience Recorded: Oct 11 2013 5 mins
    Juniper Networks
    In this short video you will see how to easily onboard PC devices using Juniper's self-provisioning client-less BYOD solution for Microsoft windows in action. In this demo we will show the complete start to finish process required to onboard a corporate users personal Windows PC onto the network. This video highlights the simplicity and reduced demand on IT to securely provision user’s personal devices on the corporate network using Junipers SmartPass and WLAN products.
    •Tags: juniper, BYOD, SmartPass Connect, PC, Windows, onboarding, clientless, wireless, provisioning, 802.1x, security
  • Protecting your Business with Juniper Security Recorded: Oct 11 2013 34 mins
    Juniper Networks
    Protecting your Business with Juniper Security
  • Next-Gen Security for the Data Center Recorded: Oct 10 2013 13 mins
    David Koretz
    12 minute video featuring David Koretz talking about Juniper’s approach to security, specifically how Juniper delivers next-gen security for data centers.
  • Advanced Data Center Security and What Is Replacing Next Generation Firewalls Recorded: Oct 10 2013 56 mins
    Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
    Your next gen firewall investment is giving you some peace of mind on egress (inside out) traffic but what about hacking attempts and DDoS attacks that aim to disrupt and steal from data center applications?

    Next generation firewalls can't address the outside in threat carried within web and SSL traffic, but Juniper's advanced technologies for intrusion deception and heuristic-based DDoS mitigation can.

    Join us for a discussion led by one of Juniper’s top security experts, Johnnie Konstantas to find out how to make your data center next generation security equipped.
  • The Simplified Data Center: Automation and Operational Efficiencies Recorded: Oct 10 2013 45 mins
    Brad Casemore, Research Director, Datacenter Networks & Harsh Singh, Senior Marketing Manager, Juniper Networks
    Automate & Orchestrate the Network – Build Simple and Agile Data Centers

    Watch this webinar with Juniper Networks and IDC and you will learn:
    - How automation eliminates data center complexities
    - How to achieve the operational efficiencies promised by virtualization
    - How to future proof your data center with open interfaces and flexible programmability
  • Securing the Cloud Recorded: Oct 10 2013 2 mins
    Michael Callahan, VP Security Product Marketing
    Business agility starts in the data center.
  • Can Your WLAN Handle the BYOD Explosion? Recorded: Oct 9 2013 55 mins
    Lane Timmons & Joe Bilbro (Texas Tech University Health Center); Phil Belanger & Ken Biba (Novarum); Tim McCarthy (Juniper)
    We have moved beyond how Wireless networks were originally designed. Today, IT teams are challenged with how to handle today's rich media demands or exponentially increasing traffic. Even now, WLANs are now faced with mission critical demands and user expectations to access resources anytime, anywhere, with no delays.

    Join us for this webinar with leading experts to learn more about:

    • How high quality wireless service is used in high density university environments, including how Texas Tech University Health Center’s vendor evaluation process works
    • Results of real-world high client density WLAN test with experts from Novarum
    • How Juniper optimizes high client density WLANs without sacrificing performance
  • Defend By Deception: Junos Web App Secure and Spotlight Overview & LIVE Demo Recorded: Oct 9 2013 70 mins
    Pete McMullen & Keir Asher
    Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?
    Join Juniper security experts, Pete McMullen & Keir Asher for a 60 minute Junos WebApp Secure (JWAS) overview and live demo to learn how Juniper can protect your web assets from the largest Internet security threats known!
  • Junos WebApp Secure Recorded: Oct 9 2013 3 mins
    The world's first web intrusion deception system that detects, tracks, profiles, and prevents hackers all in real time.
  • How Branch Offices and Data Centers Differ In Next Generation Security Needs Recorded: Oct 9 2013 52 mins
    Johnnie Konstantas, Juniper Sr. Director of Security, Business Development
    At your branch offices you worry about end users, their browsing behaviors and their devices. The security you employ to monitor and control users is critical in preventing valuable data exfiltration.
    And the data center? Protecting it is all about ensuring availability and continued operation against the mounting threats from targeted scans, botnets and DDoS attacks. Want to find out how your current and planned defenses stack up against best practices?

    Join us for a discussion led by one of Juniper’s top security experts, Johnnie Konstantas to review typical security deployments at branch offices and data centers. We'll cover the differences in design and where the two merge for maximum effectiveness and security.
Webcasts on technology solutions & services that solve IT challenges
BEAR Data solves business challenges for IT departments on a daily basis, and we want to share our knowledge, tips and trends on what technology solutions could work for you.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protecting your Business with Juniper Security
  • Live at: Oct 11 2013 8:00 pm
  • Presented by: Juniper Networks
  • From:
Your email has been sent.
or close