Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Appearances / Juniper Networks Presents at Security Field Day 3

Juniper Networks Presents at Security Field Day 3



Security Field Day 3

Krystle Portocarrero of Juniper Networks Presents at Security Field Day 3

This Presentation date is May 15, 2020 at 8:00-10:00.

Presenters: Josh McKenzie, Krystle Portocarrero, Oliver Schuermann


Follow on Twitter using the following hashtags or usernames: #XFD3

Juniper Connected Security Overview


Watch on YouTube
Watch on Vimeo

Join Oliver Schuermann as he gives a brief overview of the Juniper Connected Security strategy, which allows customers to take advantage of their Juniper infrastructure, as well as other components to create a Threat Aware Network. Juniper Connected Security is about Safeguarding Users, Applications, and Infrastructure by extending security to all points of connection across the network. Security, or classic perimeter-based security, is now converging with the network.

Personnel: Oliver Schuermann

Juniper AI for a Threat Aware Network


Watch on YouTube
Watch on Vimeo

Enterprises have to strike a delicate balance between business agility and security which can often be seen at odds with one another. By leveraging machine learning data driven improvements can be made by providing more efficient and effective security models. Combining signals from both the network and security infrastructure you already have in place, you can start to not only automate the detection but also the defense against malicious activity. You need context to accurately determine the full severity of an event before you can start remediating the threat. By correlating multiple events into high fidelity signals we can more accurately confirm what devices have been compromised and effectively use automation to remediate, reducing your risk and shorten time to resolution.

Personnel: Krystle Portocarrero

Juniper Multicloud Connected Security


Watch on YouTube
Watch on Vimeo

Enterprises are increasingly shifting workloads to the cloud to take advantage of dynamic scaling and flexible deployment options. This also introduces new challenges for security administrators, especially when multiple cloud environments need to work together. Learn how we can leverage the metadata features across various cloud environments to describe workloads and extend security policies that adapt alongside your services no matter what cloud provider hosts them.

Personnel: Josh McKenzie

Juniper Demo Multicloud Connected Security


Watch on YouTube
Watch on Vimeo

SRX-enforced security policies, enabling L4-L7 traffic inspection for known and unknown malware, are deployed across AWS and Azure using a single set of metadata tags to follow instances as they are created. After a threat is detected, effected hosts are automatically isolated from the rest of the network.

Personnel: Josh McKenzie

Juniper Encrypted Traffic Analysis Overview


Watch on YouTube
Watch on Vimeo

With encryption on the rise and challenges in decryption for both privacy and technical reasons, this presentation and demonstration show one of Juniper’s most recent product announcements for ETA, or Encrypted Traffic Analysis. Juniper is introducing the ability to detect malicious activity over encrypted traffic without the need for interception and decryption. We will describe Juniper’s approach and the technology that makes it all possible.

Personnel: Krystle Portocarrero


  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • May 28-May 29 — Security Field Day 13
  • Jun 4-Jun 5 — Cloud Field Day 23
  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Exploring Cloud Resilience, AI, and Data at Cloud Field Day 23
  • Compliance Does Not Equal Security
  • Meraki Campus Gateway: Cloud-Managed Overlay for Complex Networks
  • Exploring the Future of Cybersecurity at Security Field Day 13
  • 5G Neutral Host: Solving Enterprise Cellular Coverage Gaps

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in