{"id":2673,"date":"2019-06-05T16:48:25","date_gmt":"2019-06-05T14:48:25","guid":{"rendered":"https:\/\/relnet.hu\/?post_type=tribe_events&#038;p=2673"},"modified":"2019-06-19T12:06:08","modified_gmt":"2019-06-19T10:06:08","slug":"juniper-networks-sales-technical-security-workshop-for-juniper-partners","status":"publish","type":"tribe_events","link":"https:\/\/relnet.hu\/en\/rendezveny\/juniper-networks-sales-technical-security-workshop-for-juniper-partners\/","title":{"rendered":"Juniper Networks Sales &#038; Technical Security Workshop for Juniper Partners"},"content":{"rendered":"<p>Juniper Networks is continuously enhancing its, second to none, security offer to provide the best possible protection against the evolving cyber threat landscape with advanced threat detection, consolidated security analytics and one-touch threat mitigation. In this session you will be given an overview of the Juniper Networks security vision and strategy during the sales session. We will cover how Juniper\u2019s security proposition addresses the enterprise cloud transformation and how we are revolutionizing SecOps to address the skill gap with SoC automation.<\/p>\n<p><strong>In the tech session, we will cover the following topics:<\/strong><\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Simplifying SecOps with Juniper Networks Connected Security Platform and our open Integration strategy.<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Antimalware everywhere \u2013 learn about Juniper Networks latest Advanced Threat Prevention platform JATP with a live demo<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Juniper Networks security vision for multi cloud infrastructure and how to unify security across multiple domains such as campus, private cloud DC and public cloud<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enterprise use cases for management and next-gen branch connectivity.<\/p>\n<p>08:00 &#8211; 09:00\u00a0\u00a0\u00a0 Registration &amp; Refreshments<\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong><u>Sales Track<\/u><\/strong><\/p>\n<p>09:00 \u2013 09:30\u00a0\u00a0\u00a0 Security Exec Overview<\/p>\n<ul>\n<li>Cybersecurity and the evolving Threat Landscape<\/li>\n<li>The Juniper Security Vision<\/li>\n<li>Preparing for a Secure &amp; Multicloud Future<\/li>\n<\/ul>\n<p>09:30 \u2013 10:30\u00a0\u00a0\u00a0 Juniper Security Portfolio for Sales \u2013 Key Products and Positioning<\/p>\n<ul>\n<li>Next-Gen Firewall and Unified Threat Management<\/li>\n<li>Advanced Malware Detection, Prevention and Response<\/li>\n<li>Putting it all together \u2013 Automation<\/li>\n<li>Sales Opportunities and Tools<\/li>\n<\/ul>\n<p>10:30 &#8211; 10:45\u00a0\u00a0\u00a0 Coffee Break<\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong><u>Technical Track<\/u><\/strong><\/p>\n<p>10:45 \u2013 11:45\u00a0\u00a0\u00a0 Simplifying Security Operations<\/p>\n<ul>\n<li>The customer perspective<\/li>\n<li>Security Orchestration, Automation and Response workflow<\/li>\n<li>Simplifying security management (Security Director)<\/li>\n<li>Demo: How can Connected Security Platform help?<\/li>\n<\/ul>\n<p>11:45-12:30\u00a0\u00a0\u00a0\u00a0\u00a0 Threat Analytics<\/p>\n<ul>\n<li>Current threat landscape overview<\/li>\n<li>Advanced threat prevention with JATP &amp; SkyATP<\/li>\n<li>Anti-malware use-cases &amp; BOM building \u2013 real world scenarios<\/li>\n<\/ul>\n<p>12:30-13:15\u00a0\u00a0\u00a0\u00a0\u00a0 Lunch<\/p>\n<p>13:15-13:45\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Threat Analytics (cont.)<\/p>\n<ul>\n<li>The role of the SIEM &#8211; Juniper Secure Analytics<\/li>\n<li>Demo: JATP in action!<\/li>\n<\/ul>\n<p>13:45-14:45\u00a0\u00a0\u00a0\u00a0\u00a0 Multi-cloud Security<\/p>\n<ul>\n<li>Cloud security Essentials<\/li>\n<li>What is Intent-based policy?<\/li>\n<li>Contrail security revealed \u2013 it\u2019s all related!<\/li>\n<li>Demo: Why does micro-segmentation matter?<\/li>\n<\/ul>\n<p>14:45-15:00\u00a0\u00a0\u00a0\u00a0\u00a0 Break<\/p>\n<p>15:00-15:30\u00a0\u00a0\u00a0\u00a0\u00a0 Security Roadmap<\/p>\n<p>15:30 \u2013 16:00\u00a0\u00a0\u00a0 Wrap-up \/ Q&amp;A<\/p>\n<p><strong><span style=\"display: inline !important; float: none; background-color: #ffffff; color: #222222; cursor: text; font-family: 'Roboto',Arial,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\"><hr class=\" hr_color\" style=\"margin:0 auto 30px;\"\/>\n<\/span><\/strong><\/p>\n<p>Speakers: Michael Berkovitch (Cyber Security Sales &amp; Partner Sales Leader, EMEA, Juniper) and Jaume Baltasar Galiana (Security Partner Systems Engineer, EMEA, Juniper).<\/p>\n<p>Registrer now on Juniper&#8217;s partnesite!<\/p>\n<p><span style=\"display: inline !important; float: none; background-color: #ffffff; color: #222222; cursor: text; font-family: 'Roboto',Arial,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\"><a class=\"button  button_size_2\" href=\"https:\/\/juni.pr\/2Wnpeyg\"     style=\"color:#6179a1;\" target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISTER NOW<\/span><\/a>\n<\/span><\/p>\n<p><span style=\"display: inline !important; float: none; background-color: #ffffff; color: #222222; cursor: text; font-family: 'Roboto',Arial,sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\"><hr class=\" hr_color\" style=\"margin:0 auto 30px;\"\/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Juniper Networks is continuously enhancing its, second to none, security offer to provide the best possible protection against the evolving cyber threat landscape with advanced threat detection, consolidated security analytics and one-touch threat mitigation. In this session you will be given an overview of the Juniper Networks security vision and strategy during the sales session. We will cover how Juniper\u2019s security proposition addresses the enterprise cloud transformation and how we are revolutionizing SecOps to address the skill gap with SoC automation.<\/p>\n","protected":false},"author":1086,"featured_media":2548,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[543,544,230],"tribe_events_cat":[33,550,36,488,35,252,46],"yst_prominent_words":[],"class_list":["post-2673","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tag-connected-security-platform-en","tag-jatp-en","tag-juniper-en","tribe_events_cat-event","tribe_events_cat-jatp-en","tribe_events_cat-juniper-networks-en","tribe_events_cat-relnet-en","tribe_events_cat-reseller","tribe_events_cat-training","tribe_events_cat-vendor","cat_event","cat_jatp-en","cat_juniper-networks-en","cat_relnet-en","cat_reseller","cat_training","cat_vendor"],"_links":{"self":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events\/2673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/users\/1086"}],"replies":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/comments?post=2673"}],"version-history":[{"count":0,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events\/2673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media\/2548"}],"wp:attachment":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media?parent=2673"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tags?post=2673"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events_cat?post=2673"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/yst_prominent_words?post=2673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}