|
Kate Adam Presented at Security Field Day |
This Presentation date is October 20, 2021 at 10:00-12:00.
Presenters: Calvin Remsburg, Irene Zhang, Kate Adam, Krystle Portocarrero, Laurent Paumelle, Mike Spanbauer, Rene Chavez, Robert Tafoya, Sandeep Rajan P
Follow on Twitter using the following hashtags or usernames: #XFD6
Juniper Connected Security Overview with Kate Adam
Watch on YouTube
Watch on Vimeo
in this video, get introductions to the Juniper team and why Juniper’s Connected Security strategy seeks to make defending the network easier by extending security services to all points of connection from client to workload.
Personnel: Kate Adam
Managing the Transition to SASE with Juniper Security Director Cloud
Watch on YouTube
Watch on Vimeo
Manage your security deployments, whether they’re on-premises, in the cloud, or delivered from the cloud as you make your journey towards a SASE architecture.
Personnel: Madhura Kumar, Sandeep Rajan P
Cover Your Apps with Juniper Cloud Workload Protection
Watch on YouTube
Watch on Vimeo
No application is invulnerable to attack, and all applications could use a safety net to help keep them secure, especially in production. Juniper Cloud Workload Protection does exactly that and integrates with the rest of your Zero Trust data center.
Personnel: Krystle Portocarrero, Laurent Paumelle
DDoS plus C2 Protection with Juniper MX + Corero & SecIntel
Watch on YouTube
Watch on Vimeo
Juniper doesn’t believe in routers as “dumb pipes” but instead that they can be used to detect and stop attacks. Find out how Juniper’s most widely-deployed MX Series router can stop volumetric DDoS attacks and block command-and-control communications to & from malicious servers.
Personnel: Irene Zhang, Laurent Paumelle
Defending OT Environments with the Juniper Converged Industrial Edge
Watch on YouTube
Watch on Vimeo
If anything has become clear from the cyberattacks this past year, it’s that critical infrastructure must be better protected. The Converged Industrial Edge automates and protects these environments from targeted attacks while maintaining uptime in trifecta of reliable connectivity, threat intelligence, and precision enforcement.
Personnel: Mike Spanbauer, Robert Tafoya