Welcome!

@DevOpsSummit Authors: Pat Romanski, Yeshim Deniz, Zakia Bouachraoui, Carmen Gonzalez, Liz McMillan

News Feed Item

Media Advisory: Nawaf Bitar of Juniper Networks to Deliver RSA Conference Keynote Address

Keynote Title: The Next World War Will Be Fought in Silicon Valley

SAN FRANCISCO, CA -- (Marketwired) -- 02/20/14 -- Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced the details of its participation at the 2014 RSA Conference, the world's leading information security event and B-SidesSF, a grass roots, open security conference taking place the day prior to RSA.

Juniper will participate in multiple security sessions during the RSA Conference and B-SidesSF including:

Keynote Highlight:

RSA Keynote Topic: The Next World War Will be Fought in Silicon Valley
Speaker:
Nawaf Bitar, senior vice president and general manager, Juniper Networks
When: Tuesday, February 25, 9:15 a.m. PT
Where: Moscone Center South, Esplandade
Details: Bitar will share thought-provoking perspectives about the state of security including what the end game might look like given the escalating nature of cyber malfeasance.

Session Highlights:

Panel Session: Mobile Device Security: Fact or Fiction
Speaker: Jason Conyard, vice president of information technology, Juniper Networks
When: Monday, February 24, 1:00 p.m. PT
Where: Moscone Center West, Room 2018
Details: Conyard will join a panel of industry experts to myth-bust existing perceptions around mobile security and discuss how IT and security teams can implement a number of technologies today to better protect their infrastructures from outside threats.

Special Topics Session: Your Pad or Mine? - Embracing and Securing BYOD
Speaker: Tamir Hardof, senior director of product marketing, Security Business Unit, Juniper Networks
When: Tuesday, February 25, 2014, 1:20 p.m. PT
Where: North Room 131
Details: Hardof will discuss how to turn the BYOD challenge into a business advantage and deploy a solution that can deliver the right balance between security and user productivity.

Cloud Security & Virtualization Session: Dueling Banjos - Cloud v. Enterprise Security: Using Automation & DevOps NOW
Speaker: Christofer Hoff, vice president, strategy & planning, Security Business Unit, Juniper Networks
When: Wednesday, February 26, 2014, 9:20 a.m. PT
Where: West Room 2002
Details: Hoff will discuss the similarities and differences of the future of "Software Defined Security."

Security Trends & Innovation Session: Network Security Smackdown: Which Technologies Will Survive?
Speaker: Christofer Hoff, vice president, strategy & planning, Security Business Unit, Juniper Networks
When: Thursday, February 27, 2014, 10:40 a.m. PT
Where: North Room 130
Details: Hoff will discuss the future of network security.

At its booth, #3105 in Moscone Center North, Juniper Networks will demonstrate the latest enterprise security technology including how to detect and deceive advanced malware infiltrations, secure Web applications, protect virtual and cloud resources, and how to implement mobile device security for BYOD environments. Juniper will also have a new mobile game available for download called Deception Force, a free game based on Juniper's intrusion deception technologies that takes the player into a data center to fight off the latest advanced attacks and malware. Attendees can play the game in the Juniper Networks booth and compete for a prize given to the top scoring player each hour.

For more information on Juniper's participation at RSA, please visit: http://www.juniper.net/us/en/events/rsa2014/

B-Sides Highlights:

B-Sides Topic: Thinking Outside the [Sand]box
Speaker:
Kyle Adams, chief software architect Counter Security Business Unit, Juniper Networks
When: Sunday, February 23 at 3:00 p.m. PT
Where: DNA Lounge (375 Eleventh Street, San Francisco, CA 94103)
Details: Adams will highlight the techniques modern malware uses to determine if it is running in a sandbox or being analyzed.

For more information on B-Sides, please visit: http://www.securitybsides.com/w/page/12194138/BSides

About Juniper Networks in Security
Juniper Networks builds secure and trusted networks with end-to-end security across every environment -- from the data center to campus and branch environments and to the device itself. Our security solutions give enterprise and service provider customers a competitive advantage as they set out to build the best networks on the planet.

About Juniper Networks
Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logo are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Relations:
Danielle Hamel
Juniper Networks
+1 408 936-7817
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@DevOpsSummit Stories
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lifecycle automation with freedom of choice and consumption models. Hybrid cloud applications and operations are controllable by the Nutanix Prism control plane with Calm automation, which can weave together the following: database as a service with Era, micro segmentation with Flow, event driven lifecycle operations with Epoch monitoring, and both financial and cloud governance with Beam. Combined together, the Nutanix Enterprise Cloud OS democratizes and accelerates every aspect of your business with simplicity, security, and scalability.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.
ScaleMP is the leader in virtualization for in-memory high-end computing, providing higher performance and lower total cost of ownership as compared with traditional shared-memory systems. The company's innovative Versatile SMP (vSMP) architecture aggregates multiple x86 systems into a single virtual x86 system, delivering an industry-standard, high-end shared-memory computer. Using software to replace custom hardware and components, ScaleMP offers a new, revolutionary computing paradigm. vSMP Foundation is a software-only solution that reduces overall system (CAPEX) and management complexities (OPEX) costs. vSMP Foundation aggregates up to 128 x86 systems to create a single system with up to 32,768 cpus and up to 2 PB of shared memory.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, discussed why containers should be paired with new architectural practices such as microservices rather than mimicking legacy server virtualization workflows and architectures.