SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Zakia Bouachraoui, Roger Strukhoff, David Linthicum

News Feed Item

Media Advisory: Nawaf Bitar of Juniper Networks to Deliver RSA Conference Keynote Address

Keynote Title: The Next World War Will Be Fought in Silicon Valley

SAN FRANCISCO, CA -- (Marketwired) -- 02/20/14 -- Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced the details of its participation at the 2014 RSA Conference, the world's leading information security event and B-SidesSF, a grass roots, open security conference taking place the day prior to RSA.

Juniper will participate in multiple security sessions during the RSA Conference and B-SidesSF including:

Keynote Highlight:

RSA Keynote Topic: The Next World War Will be Fought in Silicon Valley
Speaker:
Nawaf Bitar, senior vice president and general manager, Juniper Networks
When: Tuesday, February 25, 9:15 a.m. PT
Where: Moscone Center South, Esplandade
Details: Bitar will share thought-provoking perspectives about the state of security including what the end game might look like given the escalating nature of cyber malfeasance.

Session Highlights:

Panel Session: Mobile Device Security: Fact or Fiction
Speaker: Jason Conyard, vice president of information technology, Juniper Networks
When: Monday, February 24, 1:00 p.m. PT
Where: Moscone Center West, Room 2018
Details: Conyard will join a panel of industry experts to myth-bust existing perceptions around mobile security and discuss how IT and security teams can implement a number of technologies today to better protect their infrastructures from outside threats.

Special Topics Session: Your Pad or Mine? - Embracing and Securing BYOD
Speaker: Tamir Hardof, senior director of product marketing, Security Business Unit, Juniper Networks
When: Tuesday, February 25, 2014, 1:20 p.m. PT
Where: North Room 131
Details: Hardof will discuss how to turn the BYOD challenge into a business advantage and deploy a solution that can deliver the right balance between security and user productivity.

Cloud Security & Virtualization Session: Dueling Banjos - Cloud v. Enterprise Security: Using Automation & DevOps NOW
Speaker: Christofer Hoff, vice president, strategy & planning, Security Business Unit, Juniper Networks
When: Wednesday, February 26, 2014, 9:20 a.m. PT
Where: West Room 2002
Details: Hoff will discuss the similarities and differences of the future of "Software Defined Security."

Security Trends & Innovation Session: Network Security Smackdown: Which Technologies Will Survive?
Speaker: Christofer Hoff, vice president, strategy & planning, Security Business Unit, Juniper Networks
When: Thursday, February 27, 2014, 10:40 a.m. PT
Where: North Room 130
Details: Hoff will discuss the future of network security.

At its booth, #3105 in Moscone Center North, Juniper Networks will demonstrate the latest enterprise security technology including how to detect and deceive advanced malware infiltrations, secure Web applications, protect virtual and cloud resources, and how to implement mobile device security for BYOD environments. Juniper will also have a new mobile game available for download called Deception Force, a free game based on Juniper's intrusion deception technologies that takes the player into a data center to fight off the latest advanced attacks and malware. Attendees can play the game in the Juniper Networks booth and compete for a prize given to the top scoring player each hour.

For more information on Juniper's participation at RSA, please visit: http://www.juniper.net/us/en/events/rsa2014/

B-Sides Highlights:

B-Sides Topic: Thinking Outside the [Sand]box
Speaker:
Kyle Adams, chief software architect Counter Security Business Unit, Juniper Networks
When: Sunday, February 23 at 3:00 p.m. PT
Where: DNA Lounge (375 Eleventh Street, San Francisco, CA 94103)
Details: Adams will highlight the techniques modern malware uses to determine if it is running in a sandbox or being analyzed.

For more information on B-Sides, please visit: http://www.securitybsides.com/w/page/12194138/BSides

About Juniper Networks in Security
Juniper Networks builds secure and trusted networks with end-to-end security across every environment -- from the data center to campus and branch environments and to the device itself. Our security solutions give enterprise and service provider customers a competitive advantage as they set out to build the best networks on the planet.

About Juniper Networks
Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logo are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Relations:
Danielle Hamel
Juniper Networks
+1 408 936-7817
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Platform9, the leader in SaaS-managed hybrid cloud, has announced it will present five sessions at four upcoming industry conferences in June: BCS in London, DevOpsCon in Berlin, HPE Discover and Cloud Computing Expo 2019.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.