Welcome!

DevOps Journal Authors: Elizabeth White, Pat Romanski, Mike Kavis, Roger Strukhoff, Yeshim Deniz

News Feed Item

Media Advisory: Nawaf Bitar of Juniper Networks to Deliver RSA Conference Keynote Address

Keynote Title: The Next World War Will Be Fought in Silicon Valley

SAN FRANCISCO, CA -- (Marketwired) -- 02/20/14 -- Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced the details of its participation at the 2014 RSA Conference, the world's leading information security event and B-SidesSF, a grass roots, open security conference taking place the day prior to RSA.

Juniper will participate in multiple security sessions during the RSA Conference and B-SidesSF including:

Keynote Highlight:

RSA Keynote Topic: The Next World War Will be Fought in Silicon Valley
Speaker:
Nawaf Bitar, senior vice president and general manager, Juniper Networks
When: Tuesday, February 25, 9:15 a.m. PT
Where: Moscone Center South, Esplandade
Details: Bitar will share thought-provoking perspectives about the state of security including what the end game might look like given the escalating nature of cyber malfeasance.

Session Highlights:

Panel Session: Mobile Device Security: Fact or Fiction
Speaker: Jason Conyard, vice president of information technology, Juniper Networks
When: Monday, February 24, 1:00 p.m. PT
Where: Moscone Center West, Room 2018
Details: Conyard will join a panel of industry experts to myth-bust existing perceptions around mobile security and discuss how IT and security teams can implement a number of technologies today to better protect their infrastructures from outside threats.

Special Topics Session: Your Pad or Mine? - Embracing and Securing BYOD
Speaker: Tamir Hardof, senior director of product marketing, Security Business Unit, Juniper Networks
When: Tuesday, February 25, 2014, 1:20 p.m. PT
Where: North Room 131
Details: Hardof will discuss how to turn the BYOD challenge into a business advantage and deploy a solution that can deliver the right balance between security and user productivity.

Cloud Security & Virtualization Session: Dueling Banjos - Cloud v. Enterprise Security: Using Automation & DevOps NOW
Speaker: Christofer Hoff, vice president, strategy & planning, Security Business Unit, Juniper Networks
When: Wednesday, February 26, 2014, 9:20 a.m. PT
Where: West Room 2002
Details: Hoff will discuss the similarities and differences of the future of "Software Defined Security."

Security Trends & Innovation Session: Network Security Smackdown: Which Technologies Will Survive?
Speaker: Christofer Hoff, vice president, strategy & planning, Security Business Unit, Juniper Networks
When: Thursday, February 27, 2014, 10:40 a.m. PT
Where: North Room 130
Details: Hoff will discuss the future of network security.

At its booth, #3105 in Moscone Center North, Juniper Networks will demonstrate the latest enterprise security technology including how to detect and deceive advanced malware infiltrations, secure Web applications, protect virtual and cloud resources, and how to implement mobile device security for BYOD environments. Juniper will also have a new mobile game available for download called Deception Force, a free game based on Juniper's intrusion deception technologies that takes the player into a data center to fight off the latest advanced attacks and malware. Attendees can play the game in the Juniper Networks booth and compete for a prize given to the top scoring player each hour.

For more information on Juniper's participation at RSA, please visit: http://www.juniper.net/us/en/events/rsa2014/

B-Sides Highlights:

B-Sides Topic: Thinking Outside the [Sand]box
Speaker:
Kyle Adams, chief software architect Counter Security Business Unit, Juniper Networks
When: Sunday, February 23 at 3:00 p.m. PT
Where: DNA Lounge (375 Eleventh Street, San Francisco, CA 94103)
Details: Adams will highlight the techniques modern malware uses to determine if it is running in a sandbox or being analyzed.

For more information on B-Sides, please visit: http://www.securitybsides.com/w/page/12194138/BSides

About Juniper Networks in Security
Juniper Networks builds secure and trusted networks with end-to-end security across every environment -- from the data center to campus and branch environments and to the device itself. Our security solutions give enterprise and service provider customers a competitive advantage as they set out to build the best networks on the planet.

About Juniper Networks
Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logo are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories from DevOps Journal
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distribution, versions, network setup, and other details of this environment. This "containerization" has often been nicknamed "the new virtualization." But containers are more than lightweight virtual machines. Beyond their smaller footprint, shorter boot times, and higher consolidation factors, they also bring a lot of new features and use cases that were not possible with classical virtual machines.
High performing enterprise Software Quality Assurance (SQA) teams validate systems are ready for use – getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time – bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of Enterprise SQA? Does the SQA function become redundant?
Achieve continuous delivery of applications by leveraging ElasticBox and Jenkins. In his session at DevOps Summit, Monish Sharma, VP of Customer Success at ElasticBox, will demonstrate how you can achieve the following using ElasticBox and the ElasticBox Jenkins Plugin: Create consistency across dev, staging, and production environments Continuous delivery across multiple clouds to handle high loads Ensure consistent policy management across environments: tagging, admin boxes, traceability Spin up machines and environments quickly Deploy applications to any cloud Enable real-time collaboration between developers and operations
The old monolithic style of building enterprise applications just isn't cutting it any more. It results in applications and teams both that are complex, inefficient, and inflexible, with considerable communication overhead and long change cycles. Microservices architectures, while they've been around for a while, are now gaining serious traction with software organizations, and for good reasons: they enable small targeted teams, rapid continuous deployment, independent updates, true polyglot languages and persistence layers, and a host of other benefits. But truly adopting a microservices architecture requires dramatic changes across the entire organization, and a DevOps culture is absolutely essential.
WaveMaker CEO Samir Ghosh is taking a new pass at aPaas, and leveraging the increasingly popular Docker open-source platform, with the announcement of WaveMaker Enterprise. The new version of the company's eponymous software “enables instant, end-to-end custom web app creation and management by professional and non-professional developers (alike) and development teams,” according to the company. We asked Samir a few questions about this, and here's what he had to say: Cloud Computing Journal: You've mentioned the previous challenge of business-side developers making that jump from design to deployment. What sort of learning curve will they still face with Wavemaker Enterprise? Samir Ghosh: “Business-side developers” can include non-programming business users or professional developers under tight schedules or with limited mobile or front-end programming expertise. Both can use WaveMaker to meet their app development needs, but may have different deployment needs. I think business users just want their app to run as easily as possible. In WaveMaker, they can literally click a button and their application will run, either on our public cloud or on the enterprise’s private...
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additionally, the school sought a partner to provide OpenStack infrastructure deployment and operations expertise. They ultimately selected Blue Box’s Private Cloud as a Service, powered by OpenStack, leveraging Blue Box's Zurich, Switzerland data center.
In a world of ever-accelerating business cycles and fast-changing client expectations, the cloud increasingly serves as a growth engine and a path to new business models. Dynamic clouds enable businesses to continuously reinvent themselves, adapting their business processes, their service and software delivery and their operations to achieve speed-to-market and quick response to customer feedback. As the cloud evolves, the industry has multiple competing cloud technologies, offering on-premises and off-premises cloud platforms for both Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). In parallel, cloud standards are also evolving, including community standards like OpenStack and CloudFoundry. Most organizations who are adopting the Cloud today are ending up adopting it in complex ‘dynamic-hybrid’ environments. There is physical infrastructure that now co-exists along with the new dynamic-hybrid on-premises and off-premises Cloud hosted environments.
This story came in from Joseph – one of our fellow dynaTrace users and a performance engineer at a large fleet management service company. Their fleet management software runs on .NET, is developed in-house, is load tested with JMeter and monitored in Production with dynaTrace. A usage and configuration change of their dependency injection library turned out to dramatically impact CPU and memory usage while not yet impacting end user experience. Lessons learned: resource usage monitoring is as important as response time and throughput. On Wednesday, July 3, Joseph’s ops team deployed the latest version into their production environment. Load (=throughput) and response time are two key application health measures the application owner team has on their production dashboards.
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies. This model makes use of Composable Enterprise framework put forward by Jonathan Murray of WMG.
Software development, like manufacturing, is a craft that requires the application of creative approaches to solve problems given a wide range of constraints. However, while engineering design may be craftwork, the production of most designed objects relies on a standardized and automated manufacturing process. By contrast, much of moving an application from prototype to production and, indeed, maintaining the application through its lifecycle has often remained craftwork. In his session at DevOps Summit, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss the many lessons and processes that DevOps can learn from manufacturing and the assembly line-like tools, such as Platform-as-a-Service, that provide the necessary abstraction and automation to make industrialized DevOps possible.